SlideShare a Scribd company logo
1 of 24
Network Fundamentals – Application Layer Functionality and Protocols
1
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
By
Ahmed Hamed Attia Kotb
ahmed_hamed@ci.suez.edu.eg
+201227253795
Application Layer Functionality
and Protocols
chapter 3
Agenda
• Application layer functionality
• Presentation layer functionality
• Session layer functionality
• Communication types over Application layer
• Application layer components
• Application layer protocol functions
• Application layer protocols
2
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
Network Fundamentals – Application Layer Functionality and Protocols
Application Layer
3
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Interface between end
users and the
underlying network
infrastructure
• Used to exchange data
between the running
applications in both
sender and receiver.
Network Fundamentals – Application Layer Functionality and Protocols
Presentation Layer
4
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Coding and conversion of Application layer data to
ensure data from source can be interpreted by the
destination.
• Compression.
• Encryption.
Network Fundamentals – Application Layer Functionality and Protocols
Session Layer
5
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Create and maintain the dialogs
between the source host and the
destination host.
Network Fundamentals – Application Layer Functionality and Protocols
Communication types over Application
layer
6
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Client / Server model.
• Daemon process.
• Data transfer from a client
to a server is referred to as
an upload and data from a
server to a client as a
download.
Network Fundamentals – Application Layer Functionality and Protocols
Communication types over Application
layer
7
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Peer to Peer (p2p) model.
• All Share resources
• Each device operates as
client and server in the
same time
Network Fundamentals – Application Layer Functionality and Protocols
Application Layer Components
8
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Application software.
• Network aware application
• Processes / Services.
• Protocols.
Network Fundamentals – Application Layer Functionality and Protocols
9
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Application layer protocol functions
• Define the process on either ends.
• Defines the type of the message.
• Define the syntax of the message.
• Define how the messages are sent and the
excepted response.
Network Fundamentals – Application Layer Functionality and Protocols
Application Layer Protocols
Application Layer Protocols
10
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Examples of Application layer protocols:
• DNS
• HTTP
• SMTP / POP
• FTP
• DHCP
• SMB
• Telnet
Network Fundamentals – Application Layer Functionality and Protocols
Domain Name System (DNS)
11
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• DNS resolver: Resolves names to its associated IP
Network Fundamentals – Application Layer Functionality and Protocols
Domain Name System (DNS)
12
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• DNS resolver: Resolves names to its associated IP
Network Fundamentals – Application Layer Functionality and Protocols
Domain Name System (DNS)
13
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Nslookup command.
Network Fundamentals – Application Layer Functionality and Protocols
Domain Name System (DNS)
14
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• DNS records
• A – end device
• NS – authoritative Name System
• CNAME – Canonical Name.
• MX – Mail Exchange
• ipconfig / displaydns
Network Fundamentals – Application Layer Functionality and Protocols
Domain Name System (DNS)
15
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• DNS resolving process
• www.mail.cisco.com
Network Fundamentals – Application Layer Functionality and Protocols
Hyper Text Transfer Protocol
(HTTP)
16
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• HTTP specifies a request/response protocol. When a client, typically
a web browser, sends a request message to a server, the HTTP
protocol defines the message types the client uses to request the web
page and also the message types the server uses to respond.
• The three common message types are GET, POST, and PUT.
• No authentication, No encryption.
• HTTPS uses both authentication and encryption.
Network Fundamentals – Application Layer Functionality and Protocols
Simple Mail Transfer Protocol
(SMTP) / Post Office Protocol (POP)
17
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Both together are used to provide the E-mail services.
• MUA
• MTA
• MDA
Network Fundamentals – Application Layer Functionality and Protocols
Simple Mail Transfer Protocol
(SMTP) / Post Office Protocol (POP)
18
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Both together are used to provide the E-mail services.
• MUA
• MTA
• MDA
Network Fundamentals – Application Layer Functionality and Protocols
Simple Mail Transfer Protocol
(SMTP) / Post Office Protocol (POP)
19
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• SMTP uses set of commands to support the mailing services
• HELO
• EHLO
• Mail From
• RCPT To
• DATA
Network Fundamentals – Application Layer Functionality and Protocols
File Transfer Protocol (FTP)
20
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• FTP was developed to allow for file transfers between a client and a
server.
• An FTP client is an application that runs on a computer that is used to
push and pull files from a server running the FTP daemon (FTPd).
• The client establishes the first connection to the server on TCP port 21.
This connection is used for control traffic, consisting of client commands
and server replies.
• The client establishes the second connection to the server over TCP port
20. This connection is for the actual file transfer and is created every time
there is a file transferred.
Network Fundamentals – Application Layer Functionality and Protocols
Dynamic Host Configuration Protocol
21
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
Network Fundamentals – Application Layer Functionality and Protocols
Server Message Block
22
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Once the connection is established, the user of the client can access the
resources on the server as if the resource is local to the client host.
Network Fundamentals – Application Layer Functionality and Protocols
Telnet
23
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
• Connection using Telnet is called a Virtual Terminal
(VTY) session, or connection. Rather than using a physical
device to connect to the server, Telnet uses software to
create a virtual device that provides the same features of a
terminal session with access to the server command line
interface (CLI).
• Not secure, No Encryption
• Secure Shell (SSH)
Network Fundamentals – Application Layer Functionality and Protocols
Thank you
24
Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department
Network Fundamentals – Application Layer Functionality and Protocols

More Related Content

What's hot

Network topology
Network topologyNetwork topology
Network topologylekshmik
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domainNetProtocol Xpert
 
Osi model
Osi modelOsi model
Osi modelOnline
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network FundamentalsN.Jagadish Kumar
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing modelsishmecse13
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol conceptsRaji Lakshmi
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layersumit gyawali
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)waqasahmad1995
 

What's hot (20)

Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Network topology
Network topologyNetwork topology
Network topology
 
Collision & broadcast domain
Collision & broadcast domainCollision & broadcast domain
Collision & broadcast domain
 
Osi model
Osi modelOsi model
Osi model
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
 
Tcp/ip
Tcp/ipTcp/ip
Tcp/ip
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
 
Network software
Network softwareNetwork software
Network software
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Csma
CsmaCsma
Csma
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 

Similar to Application layer

Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptKristopher Hefner
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaSDr. Shivashankar
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.pptMohammed Ilyas
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
network basics
network basicsnetwork basics
network basicsAvin Ash
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
Computer design and Architechure and Algorithm
Computer design and Architechure and AlgorithmComputer design and Architechure and Algorithm
Computer design and Architechure and Algorithmmirzaahmadali
 
02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.pptstriker78669
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 

Similar to Application layer (20)

Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.ppt
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
network basics
network basicsnetwork basics
network basics
 
Application Layer
Application Layer Application Layer
Application Layer
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Iso model
Iso modelIso model
Iso model
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer design and Architechure and Algorithm
Computer design and Architechure and AlgorithmComputer design and Architechure and Algorithm
Computer design and Architechure and Algorithm
 
02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt
 
Application layer
Application layerApplication layer
Application layer
 

Recently uploaded

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 

Recently uploaded (20)

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 

Application layer

  • 1. Network Fundamentals – Application Layer Functionality and Protocols 1 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department By Ahmed Hamed Attia Kotb ahmed_hamed@ci.suez.edu.eg +201227253795 Application Layer Functionality and Protocols chapter 3
  • 2. Agenda • Application layer functionality • Presentation layer functionality • Session layer functionality • Communication types over Application layer • Application layer components • Application layer protocol functions • Application layer protocols 2 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department Network Fundamentals – Application Layer Functionality and Protocols
  • 3. Application Layer 3 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Interface between end users and the underlying network infrastructure • Used to exchange data between the running applications in both sender and receiver. Network Fundamentals – Application Layer Functionality and Protocols
  • 4. Presentation Layer 4 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Coding and conversion of Application layer data to ensure data from source can be interpreted by the destination. • Compression. • Encryption. Network Fundamentals – Application Layer Functionality and Protocols
  • 5. Session Layer 5 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Create and maintain the dialogs between the source host and the destination host. Network Fundamentals – Application Layer Functionality and Protocols
  • 6. Communication types over Application layer 6 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Client / Server model. • Daemon process. • Data transfer from a client to a server is referred to as an upload and data from a server to a client as a download. Network Fundamentals – Application Layer Functionality and Protocols
  • 7. Communication types over Application layer 7 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Peer to Peer (p2p) model. • All Share resources • Each device operates as client and server in the same time Network Fundamentals – Application Layer Functionality and Protocols
  • 8. Application Layer Components 8 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Application software. • Network aware application • Processes / Services. • Protocols. Network Fundamentals – Application Layer Functionality and Protocols
  • 9. 9 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Application layer protocol functions • Define the process on either ends. • Defines the type of the message. • Define the syntax of the message. • Define how the messages are sent and the excepted response. Network Fundamentals – Application Layer Functionality and Protocols Application Layer Protocols
  • 10. Application Layer Protocols 10 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Examples of Application layer protocols: • DNS • HTTP • SMTP / POP • FTP • DHCP • SMB • Telnet Network Fundamentals – Application Layer Functionality and Protocols
  • 11. Domain Name System (DNS) 11 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • DNS resolver: Resolves names to its associated IP Network Fundamentals – Application Layer Functionality and Protocols
  • 12. Domain Name System (DNS) 12 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • DNS resolver: Resolves names to its associated IP Network Fundamentals – Application Layer Functionality and Protocols
  • 13. Domain Name System (DNS) 13 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Nslookup command. Network Fundamentals – Application Layer Functionality and Protocols
  • 14. Domain Name System (DNS) 14 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • DNS records • A – end device • NS – authoritative Name System • CNAME – Canonical Name. • MX – Mail Exchange • ipconfig / displaydns Network Fundamentals – Application Layer Functionality and Protocols
  • 15. Domain Name System (DNS) 15 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • DNS resolving process • www.mail.cisco.com Network Fundamentals – Application Layer Functionality and Protocols
  • 16. Hyper Text Transfer Protocol (HTTP) 16 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • HTTP specifies a request/response protocol. When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and also the message types the server uses to respond. • The three common message types are GET, POST, and PUT. • No authentication, No encryption. • HTTPS uses both authentication and encryption. Network Fundamentals – Application Layer Functionality and Protocols
  • 17. Simple Mail Transfer Protocol (SMTP) / Post Office Protocol (POP) 17 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Both together are used to provide the E-mail services. • MUA • MTA • MDA Network Fundamentals – Application Layer Functionality and Protocols
  • 18. Simple Mail Transfer Protocol (SMTP) / Post Office Protocol (POP) 18 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Both together are used to provide the E-mail services. • MUA • MTA • MDA Network Fundamentals – Application Layer Functionality and Protocols
  • 19. Simple Mail Transfer Protocol (SMTP) / Post Office Protocol (POP) 19 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • SMTP uses set of commands to support the mailing services • HELO • EHLO • Mail From • RCPT To • DATA Network Fundamentals – Application Layer Functionality and Protocols
  • 20. File Transfer Protocol (FTP) 20 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • FTP was developed to allow for file transfers between a client and a server. • An FTP client is an application that runs on a computer that is used to push and pull files from a server running the FTP daemon (FTPd). • The client establishes the first connection to the server on TCP port 21. This connection is used for control traffic, consisting of client commands and server replies. • The client establishes the second connection to the server over TCP port 20. This connection is for the actual file transfer and is created every time there is a file transferred. Network Fundamentals – Application Layer Functionality and Protocols
  • 21. Dynamic Host Configuration Protocol 21 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department Network Fundamentals – Application Layer Functionality and Protocols
  • 22. Server Message Block 22 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Once the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host. Network Fundamentals – Application Layer Functionality and Protocols
  • 23. Telnet 23 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department • Connection using Telnet is called a Virtual Terminal (VTY) session, or connection. Rather than using a physical device to connect to the server, Telnet uses software to create a virtual device that provides the same features of a terminal session with access to the server command line interface (CLI). • Not secure, No Encryption • Secure Shell (SSH) Network Fundamentals – Application Layer Functionality and Protocols
  • 24. Thank you 24 Ahmed Hamed Attia Kotb Hussein Teaching Assistant CS Department Network Fundamentals – Application Layer Functionality and Protocols