SlideShare a Scribd company logo
1 of 34
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Network Fundamentals
Last Update: 12/6/2010
Abdekhalik Elsaid Mosa
abdu.elsaid@yahoo.com
http://abdelkhalik.staff.scuegypt.edu.eg/
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• OSI: is a layered, abstract representation created as a guideline
for network protocol design.
• Application Layer, provides human interface to the network.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• Application Layer, functions:
Provides the interface between the applications and network.
• Presentation Layer functions:
Handles the conversion of data between different formats.
 Encoding and decoding.
 Encryption and decryption.
 Compression and decompression.
• Session Layer functions:
Maintains dialogs between source and destination applications.
 Create session
 Manage and maintain session
 Terminate session
Most applications, like web browsers
Include functionality of the OSI
layers 5, 6 and 7.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer Software
• The 2 forms of S/W programs that provide access to the network.
1.Network-Aware applications:
are able to communicate directly
with the protocol stack.
Ex: E-mail clients, and web browser
2.Application layer services:
are the programs that interface
with the network and prepare the
data for transfer.
Ex: network print spooling
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
User Applications, Services, and Protocols
• Applications: Provide the human interface.
• Services: Establish an interface to the network.
• Protocols: Are rules and formats that govern how data is treated.
• The (applications,
services, and protocols)
may be used by a single
exe. Program.
Ex: Telnet, FTP
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Servers
• Servers usually are repositories of data.
• The server runs a service, sometimes called a server daemon.
• Daemons run in the background and are not under an end user's
direct control.
• Daemons are described as "listening"
for a request from a client.
• When a daemon "hears"
a request from a client:
It exchanges appropriate
messages with the client,
and then sends the
requested data to the client.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Client-Server Model
• Client: the device requesting Information.
• Server: the device which responds to the request.
• Centralized Administration.
• Security is easier to enforce.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer (P2P) Networking and Applications
• Peer-to-peer networking involves two distinct forms:
1. Peer-to-peer network design
2. Peer-to-peer applications.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Network Design
• Two or more computers are connected via a network and can
share resources without having a dedicated server.
• End device (peer) can function as either a server or a client.
• Decentralized Administration.
• Security is difficult to enforce.
• Used in small home networks
for file sharing and games.
• One computer might
assume the role of
server for one transaction
while simultaneously serving as a client for another.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Applications
• P2P applications allows a device to act as both a client and a
server within the same communication.
• Every client is a server and every server a client.
• Peer-to-peer applications can be used on peer-to-peer
networks, client/server networks, and across the Internet.
• Some P2P applications use a hybrid system.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application layer Protocols and Port numbers
• The Transport layer uses port number addressing .
• Port numbers identify applications and Application layer services.
• Server programs generally use predefined port numbers that are
commonly known by clients.
• Examples:
Telnet - TCP Port 23DNS - TCP/UDP Port 53
DHCP - UDP Port 67HTTP - TCP Port 80
FTP - TCP Ports 20 and 21SMTP - TCP Port 25
POP - UDP Port 110
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Domain Name System (DNS)
• Devices are labeled with numeric IP addresses.
• Domain Names were created to convert the numeric address into
a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com
• DNS client is sometimes called DNS Resolver.
• A DNS Server provides name resolution using the name daemon.
• The DNS server stores different types of resource records (RRs)
used to resolve names.
• These records contain the
name, address, and others.
nslookup
• Displays default DNS server for
your host.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Servers Hierarchy
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Name Resolution
Step 1:
• The DNS resolver sends a
recursive query to its Local
DNS server.
• Requests IP address for "www.example.com".
• The Local DNS server is responsible for resolving the name.
– Cannot refer the DNS client to another DNS server.
1
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 2:
• Local DNS Server forwards
the query to a
Root DNS server.
Step 3:
• Root DNS server
Makes note of .com suffix
Returns a list of IP addresses for TLD Servers responsible for
.com.
DNS Name Resolution
1
2
2
3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Root DNS Servers: There are
13 Root DNS servers (labeled
A through M)
• TLD Servers
– Responsible for domains
such as .com, edu, org,
.net, .uk.
– There are redundant
servers throughout the
world.
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 4:
• The local DNS server sends
query for www.example.com
to one of the TLD servers.
Step 5:
• TLD Server
– Makes note of example.com
– Returns IP address for authoritative server example.com
(such as dns.example.com server)
4
4
5
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 6:
• Local DNS server sends
query directly to DNS server
for example.com
Step 7:
• example.com DNS server
responds with its IP address
for www.example.com
6
6
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 8:
• Local DNS server sends the IP
of www.example.com to the
DNS client.
• DNS Caching: When a DNS
server receives a DNS reply ,
it can cache the information
in its local memory.
• ipconfig /displaydns: Displays cashed DNS entries.
• ipconfig /flushdns: Manually deletes entries.
8
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP – Dynamic Host Configuration Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP
• DHCP automates the assignment
of IP address, Subnet mask, Default
gateway, DNS Server
• DHCP servers can be:
–Server on LAN
–Router
–Server at ISP
• DHCP addresses are not
permanently assigned to hosts but
are leased for a period of time
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Telnet
• Allows a user to remotely
access another device.
• A connection using Telnet is
called a Virtual Terminal (VTY)
session.
• Telnet clients (Teraterm
,Hyperterm)
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• The Telnet server runs a service called Telnet daemon.
• Telnet supports user authentication, but does not encrypt data.
• Telnet transfers data as plain text.
• Secure Shell (SSH) protocol offers an alternate and secure
method for server access.
• SSH benefits over Telnet
– Stronger authentication
– Encryption
• As a best practice, network professionals should always use SSH
in place of Telnet, whenever possible.
Telnet and SSH
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP (HyperText Transfer Protocol)
HTTP: developed to publish and retrieve HTML pages, “data
transfer”.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Request Message
Request Line
• GET: Browser/client is requesting an object.
• /~index/: Browser is requesting this object in this directory
(default is index.html).
• HTTP/1.1: Browser implements the HTTP/1.1.
GET /~index/ HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Request line
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Header Lines
• Accept-Language: User prefers this language of the object
• User-Agent: The browser type making the request
• Host: Host on which the object resides
• Connection: Client/browser is telling the server to keep this TCP
connection Open, known as a persistent connection.
GET /~ index / HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Response Message
HTTP/1.1 200 OK
Date: Fri, 22 Feb 2008 16:34:18 GMT
Server: Apache/2.0.52 (Red Hat)
Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT
Content-Length: 15137
Connection: close
Content-Type: text/html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
 Response message:
Status line
Header lines
Entity body
 HTTP is not a secure protocol.
 For secure communication, the HTTP Secure
(HTTPS) is used for accessing or posting web server
information.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
FTP (File Transfer Protocol)
• FTP was developed to allow for file transfers between a client
and a server.
• Used to push and pull files from a server running the FTP
daemon (FTPd).
• FTP requires two connections:
1. Control Connection:
- For commands and replies.
- Port 21.
2. Data Connection:
- For the actual file transfer.
- Port 20.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
– Mail User agent (MUA) “Mail Client”
• Allows messages to be sent and
places received messages into the
client's mailbox.
• GUI user agents: Outlook, Eudora,
Messenger
– Mail servers: Stores user mail boxes,
communicates with local user agents and
other mail servers.
– SMTP: allows you to send e-mail from
either a client or a server.
– POP: allows you to receive e-mail
messages from an e-mail server ,
(Mail access protocol)
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
The e-mail server operates two separate processes:
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)
MTA: is used to forward
e-mail either to another MTA
or to a MDA.
MTA uses SMTP to
route email between
servers.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
MDA: governs transfer of email
from mail servers to clients.
SMTP: an outbound e-mail
delivery protocol.
POP/POP3: an inbound e-mail
delivery protocol.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
SMB: is a client/server file sharing protocol.
Developed by IBM to describe the structure of shared network
resources, such as directories, files, printers, and serial ports.
Microsoft windows and Apple Macintosh operating systems
support resource sharing using the SMB protocol.
SMB Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Peers (hosts) act as both clients and servers.
• The actual file transfer usually rely on HTTP services.
• No centralized file server.
• Many client applications are available for accessing the Gnutella network, including:
BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX
P2P File Sharing and Gnutella Protocol
The Gnutella protocol defines five
different packet types:
1. Ping: for device discovery
2. Pong: as a reply to a ping
3. Query: for file location
4. query hit: as a reply to a query
5. Push: as a download request
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy

More Related Content

What's hot

Transmission media ppt
Transmission media pptTransmission media ppt
Transmission media pptShubham Singh
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their workingrockingprashik
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Transmission media
Transmission mediaTransmission media
Transmission mediakinish kumar
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridgeskeyur Nandaniya
 
Data Communication 1
Data Communication 1Data Communication 1
Data Communication 1admercano101
 
Sonet Sdh Dwdm
Sonet Sdh DwdmSonet Sdh Dwdm
Sonet Sdh Dwdmdeven l
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & SoftwareMuhammadRizaHilmi
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of NetworkingVivin NL
 
What Is Power Over Ethernet 102909
What Is Power Over Ethernet 102909What Is Power Over Ethernet 102909
What Is Power Over Ethernet 102909Morty Eisen
 
Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

What's hot (20)

Transmission media ppt
Transmission media pptTransmission media ppt
Transmission media ppt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their working
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Data Communication 1
Data Communication 1Data Communication 1
Data Communication 1
 
Sonet Sdh Dwdm
Sonet Sdh DwdmSonet Sdh Dwdm
Sonet Sdh Dwdm
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & Software
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of Networking
 
Private Branch Exchange
Private Branch ExchangePrivate Branch Exchange
Private Branch Exchange
 
What Is Power Over Ethernet 102909
What Is Power Over Ethernet 102909What Is Power Over Ethernet 102909
What Is Power Over Ethernet 102909
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Viewers also liked

Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Application Layer
Application LayerApplication Layer
Application Layerrosmida
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAbdelkhalik Mosa
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerAbdelkhalik Mosa
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkAbdelkhalik Mosa
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 

Viewers also liked (20)

Application Layer
Application Layer Application Layer
Application Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programmingdifatta
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process CommunicationAbhishek Sagar
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Abdelkhalik Mosa
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxhishamousl
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumSteven Miller
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxSmithaV19
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Jack Zheng
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols (20)

Chapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).pptChapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).ppt
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Iso model
Iso modelIso model
Iso model
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programming
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming Curriculum
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Web Fendamentals
Web FendamentalsWeb Fendamentals
Web Fendamentals
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Ch10
Ch10Ch10
Ch10
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016
 

More from Abdelkhalik Mosa

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Abdelkhalik Mosa
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)Abdelkhalik Mosa
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Abdelkhalik Mosa
 

More from Abdelkhalik Mosa (11)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
IPv6
IPv6IPv6
IPv6
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

  • 1. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals Last Update: 12/6/2010 Abdekhalik Elsaid Mosa abdu.elsaid@yahoo.com http://abdelkhalik.staff.scuegypt.edu.eg/
  • 2. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • OSI: is a layered, abstract representation created as a guideline for network protocol design. • Application Layer, provides human interface to the network.
  • 3. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • Application Layer, functions: Provides the interface between the applications and network. • Presentation Layer functions: Handles the conversion of data between different formats.  Encoding and decoding.  Encryption and decryption.  Compression and decompression. • Session Layer functions: Maintains dialogs between source and destination applications.  Create session  Manage and maintain session  Terminate session Most applications, like web browsers Include functionality of the OSI layers 5, 6 and 7.
  • 4. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer Software • The 2 forms of S/W programs that provide access to the network. 1.Network-Aware applications: are able to communicate directly with the protocol stack. Ex: E-mail clients, and web browser 2.Application layer services: are the programs that interface with the network and prepare the data for transfer. Ex: network print spooling
  • 5. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy User Applications, Services, and Protocols • Applications: Provide the human interface. • Services: Establish an interface to the network. • Protocols: Are rules and formats that govern how data is treated. • The (applications, services, and protocols) may be used by a single exe. Program. Ex: Telnet, FTP
  • 6. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Servers • Servers usually are repositories of data. • The server runs a service, sometimes called a server daemon. • Daemons run in the background and are not under an end user's direct control. • Daemons are described as "listening" for a request from a client. • When a daemon "hears" a request from a client: It exchanges appropriate messages with the client, and then sends the requested data to the client.
  • 7. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Client-Server Model • Client: the device requesting Information. • Server: the device which responds to the request. • Centralized Administration. • Security is easier to enforce.
  • 8. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer (P2P) Networking and Applications • Peer-to-peer networking involves two distinct forms: 1. Peer-to-peer network design 2. Peer-to-peer applications.
  • 9. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Network Design • Two or more computers are connected via a network and can share resources without having a dedicated server. • End device (peer) can function as either a server or a client. • Decentralized Administration. • Security is difficult to enforce. • Used in small home networks for file sharing and games. • One computer might assume the role of server for one transaction while simultaneously serving as a client for another.
  • 10. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Applications • P2P applications allows a device to act as both a client and a server within the same communication. • Every client is a server and every server a client. • Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and across the Internet. • Some P2P applications use a hybrid system.
  • 11. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application layer Protocols and Port numbers • The Transport layer uses port number addressing . • Port numbers identify applications and Application layer services. • Server programs generally use predefined port numbers that are commonly known by clients. • Examples: Telnet - TCP Port 23DNS - TCP/UDP Port 53 DHCP - UDP Port 67HTTP - TCP Port 80 FTP - TCP Ports 20 and 21SMTP - TCP Port 25 POP - UDP Port 110
  • 12. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Domain Name System (DNS) • Devices are labeled with numeric IP addresses. • Domain Names were created to convert the numeric address into a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com • DNS client is sometimes called DNS Resolver. • A DNS Server provides name resolution using the name daemon. • The DNS server stores different types of resource records (RRs) used to resolve names. • These records contain the name, address, and others. nslookup • Displays default DNS server for your host.
  • 13. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Servers Hierarchy
  • 14. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Name Resolution Step 1: • The DNS resolver sends a recursive query to its Local DNS server. • Requests IP address for "www.example.com". • The Local DNS server is responsible for resolving the name. – Cannot refer the DNS client to another DNS server. 1
  • 15. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 2: • Local DNS Server forwards the query to a Root DNS server. Step 3: • Root DNS server Makes note of .com suffix Returns a list of IP addresses for TLD Servers responsible for .com. DNS Name Resolution 1 2 2 3
  • 16. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Root DNS Servers: There are 13 Root DNS servers (labeled A through M) • TLD Servers – Responsible for domains such as .com, edu, org, .net, .uk. – There are redundant servers throughout the world. DNS Name Resolution
  • 17. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 4: • The local DNS server sends query for www.example.com to one of the TLD servers. Step 5: • TLD Server – Makes note of example.com – Returns IP address for authoritative server example.com (such as dns.example.com server) 4 4 5 DNS Name Resolution
  • 18. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 6: • Local DNS server sends query directly to DNS server for example.com Step 7: • example.com DNS server responds with its IP address for www.example.com 6 6 7 DNS Name Resolution
  • 19. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 8: • Local DNS server sends the IP of www.example.com to the DNS client. • DNS Caching: When a DNS server receives a DNS reply , it can cache the information in its local memory. • ipconfig /displaydns: Displays cashed DNS entries. • ipconfig /flushdns: Manually deletes entries. 8 7 DNS Name Resolution
  • 20. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP – Dynamic Host Configuration Protocol
  • 21. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP • DHCP automates the assignment of IP address, Subnet mask, Default gateway, DNS Server • DHCP servers can be: –Server on LAN –Router –Server at ISP • DHCP addresses are not permanently assigned to hosts but are leased for a period of time
  • 22. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Telnet • Allows a user to remotely access another device. • A connection using Telnet is called a Virtual Terminal (VTY) session. • Telnet clients (Teraterm ,Hyperterm)
  • 23. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • The Telnet server runs a service called Telnet daemon. • Telnet supports user authentication, but does not encrypt data. • Telnet transfers data as plain text. • Secure Shell (SSH) protocol offers an alternate and secure method for server access. • SSH benefits over Telnet – Stronger authentication – Encryption • As a best practice, network professionals should always use SSH in place of Telnet, whenever possible. Telnet and SSH
  • 24. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP (HyperText Transfer Protocol) HTTP: developed to publish and retrieve HTML pages, “data transfer”.
  • 25. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Request Message Request Line • GET: Browser/client is requesting an object. • /~index/: Browser is requesting this object in this directory (default is index.html). • HTTP/1.1: Browser implements the HTTP/1.1. GET /~index/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive Request line
  • 26. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Header Lines • Accept-Language: User prefers this language of the object • User-Agent: The browser type making the request • Host: Host on which the object resides • Connection: Client/browser is telling the server to keep this TCP connection Open, known as a persistent connection. GET /~ index / HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive
  • 27. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Response Message HTTP/1.1 200 OK Date: Fri, 22 Feb 2008 16:34:18 GMT Server: Apache/2.0.52 (Red Hat) Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT Content-Length: 15137 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">  Response message: Status line Header lines Entity body  HTTP is not a secure protocol.  For secure communication, the HTTP Secure (HTTPS) is used for accessing or posting web server information.
  • 28. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy FTP (File Transfer Protocol) • FTP was developed to allow for file transfers between a client and a server. • Used to push and pull files from a server running the FTP daemon (FTPd). • FTP requires two connections: 1. Control Connection: - For commands and replies. - Port 21. 2. Data Connection: - For the actual file transfer. - Port 20.
  • 29. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy – Mail User agent (MUA) “Mail Client” • Allows messages to be sent and places received messages into the client's mailbox. • GUI user agents: Outlook, Eudora, Messenger – Mail servers: Stores user mail boxes, communicates with local user agents and other mail servers. – SMTP: allows you to send e-mail from either a client or a server. – POP: allows you to receive e-mail messages from an e-mail server , (Mail access protocol) SMTP – POP3
  • 30. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy The e-mail server operates two separate processes:  Mail Transfer Agent (MTA)  Mail Delivery Agent (MDA) MTA: is used to forward e-mail either to another MTA or to a MDA. MTA uses SMTP to route email between servers. SMTP – POP3
  • 31. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy MDA: governs transfer of email from mail servers to clients. SMTP: an outbound e-mail delivery protocol. POP/POP3: an inbound e-mail delivery protocol. SMTP – POP3
  • 32. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy SMB: is a client/server file sharing protocol. Developed by IBM to describe the structure of shared network resources, such as directories, files, printers, and serial ports. Microsoft windows and Apple Macintosh operating systems support resource sharing using the SMB protocol. SMB Protocol
  • 33. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Peers (hosts) act as both clients and servers. • The actual file transfer usually rely on HTTP services. • No centralized file server. • Many client applications are available for accessing the Gnutella network, including: BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX P2P File Sharing and Gnutella Protocol The Gnutella protocol defines five different packet types: 1. Ping: for device discovery 2. Pong: as a reply to a ping 3. Query: for file location 4. query hit: as a reply to a query 5. Push: as a download request
  • 34. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy