SlideShare a Scribd company logo
Introduction to Networks v5.1
Chapter 10:
Application Layer
EAV DARAPISAL
4 March 2016
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
10.0 Introduction
10.1 Application Layer Protocols
10.2 Well-Known Application
Layer Protocols and Services
10.3 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Explain how the functions of the application layer, session layer, and
presentation layer work together to provide network services to end user
applications.
• Explain how common application layer protocols interact with end user
applications.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
• The application layer is closest to the end user.
• Network applications enable users to send and receive data with ease.
• The application layer acts as interface between the applications and the
underlying network.
• Application layer protocols help
exchange data between programs
running on the source and
destination hosts.
• The TCP/IP application layer
performs the functions of the upper
three layers of the OSI model.
• Common application layer protocols
include: HTTP, FTP, TFTP, DNS.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
• The presentation layer has three primary functions:
o Format data
o Compress data
o Encrypt data
• Common standards for video include QuickTime and Motion Picture
Experts Group (MPEG).
• Common graphic image formats are:
• Graphics Interchange Format (GIF)
• Joint Photographic Experts Group (JPEG)
• Portable Network Graphics (PNG) format
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
• The session layer creates and maintains dialogs between source and
destination applications.
• The session layer handles the exchange of information to initiate
dialogs, keep them active, and to restart sessions that are disrupted or
idle for a long period of time.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
• TCP/IP application protocols specify the format and control information
necessary for common Internet functions.
• Application layer protocols must be implemented in both the source and
destination devices.
• Application layer protocols implemented on the source and destination
host must be compatible to allow communication.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
• The device requesting the information is called a client.
• The device responding to the request is called a server.
• Client and server processes are considered to be in the application layer.
• The client initiates the exchange by requesting data from the server.
• The server responds by sending one
or more streams of data to the client.
• Application layer protocols describe
the format of the requests and
responses between clients and
servers.
• The contents of the data exchange
will depend of the application in use.
• Email is an example of a
Client-Server interaction.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
• In the peer-to-peer (P2P) networking model, the data is accessed
without the use of a dedicated server.
• Two or more computers can be connected to a P2P network to share
resources.
• Every connected end device (a peer) can function as both a server and
a client.
• The roles of client and
server are set on a per
request basis.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
• Some P2P applications use a hybrid system.
• In hybrid P2P, resource sharing is decentralized.
• Indexes that point to resource locations are stored in a centralized
directory.
• In a hybrid system, each
peer accesses an index
server to get the location
of a resource stored on
another peer.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
• Common P2P networks include: eDonkey, G2, BitTorrent, Bitcoin.
• Many P2P applications allow users to share pieces of many files with
each other at the same time.
• A small torrent file contains information about the location of other users
and tracker computers.
• Trackers are computers keeping
track of the files hosted by users.
• This technology is called BitTorrent.
• There are many BitTorrent clients,
including BitTorrent, uTorrent,
Frostwire, and qBittorrent.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Upon completion of this section, you should be able to:
• Explain how web and email protocols operate.
• Explain how the IP addressing protocols operate.
• Explain how file transfer protocols operate.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
• A web address or uniform resource locator (URL) is a reference to a web server.
A URL allows a web browser to establish a connection to that web server.
• URLs and Uniform Resource Identifier (URIs) are the names most people
associate with web addresses.
• The URL http://cisco.com/index.html has three basic parts:
o http (the protocol or scheme)
o www.cisco.com (the server name)
o index.html (the specific filename requested)
• Using DNS, the server name portion of
the URL is then translated to the
associated IP address before the server
can be contacted.
HTTP Protocol Step 1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
• The browser sends a GET request
to the server’s IP address and asks
for the index.html file.
• The server sends the requested file
to the client.
• The index.html was specified in
the URL and contains the HTML
code for this web page.
• The browser processes the HTML
code and formats the page for the
browser window based on the code
in the file.
HTTP Protocol Step 3
HTTP Protocol Step 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
• HTTP
o Is a request/response protocol.
o Has three common message types: GET, POST, PUT.
o Is not secure. Messages can be intercepted.
• HTTPS uses authentication and
encryption to secure data.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
• Email is a store-and-forward method of sending, storing, and retrieving
electronic messages.
• Email messages are stored in databases on mail servers.
• Email clients communicate with mail
servers to send and receive email.
• Mail servers communicate with other
mail servers to transport messages
from one domain to another.
• Email clients do not communicate
directly when sending email.
• Email relies on three separate protocols
for operation: SMTP (sending),POP (retrieving),
IMAP (retrieving).
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
• SMTP message formats require a message header and body.
• The body can contain any amount of text.
• The header must have a properly formatted recipient email address and a
sender address.
• An SMTP client sends an email by
connecting to a SMTP server on
port 25.
• The server receives the message and
stores it message in a local mailbox or
relays the message to another mail server.
• Users use email clients to retrieve messages
stored on the server.
• IMAP and POP are two protocols commonly
used by email clients to retrieve messages.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
• Messages are downloaded from the server to the client.
• The server listens on port 110 TCP for client requests.
• Email clients direct their POP requests to mail servers on port TCP 110.
• The POP client and server exchange commands and responses until
the connection is closed or aborted.
• POP allows for email messages
to be downloaded to the client’s
device (computer or phone) and
removed from the server.
• There is no centralized location
where email messages are kept.
• A downloaded message resides on
the device that triggered the download.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
• IMAP is another protocol used to retrieve email messages.
• Allows for messages to be displayed to the user rather than downloaded.
• The original messages reside on the server until manually deleted by the user.
• Users view copies of the messages in their email client software.
• Users can create a folder hierarchy on
the server to organize and store mail.
• That file structure is displayed on the
email client.
• When a user decides to delete a message,
the server synchronizes that action and
deletes the message from the server.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
• While IP addresses are crucial for network communication, they are not
easy to memorize.
• Domain names are created to make server addresses more user-
friendly.
• Domain names such as http://www.cisco.com are user-friendly
addresses associated with the IP address of a specific server.
• However, computers still need the actual numeric address before they
can communicate.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Examples top-
level domains:
.au - Australia
.co - Colombia
.com - business
or industry
.jp - Japan
.org - non-profit
organization
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
28
• User types http://www.example.com
Step 1.
• The DNS resolver on the DNS client sends a recursive query to its
configured Local DNS server.
• The DNS server for that client is responsible for resolving the name
Cannot refer the DNS client to another DNS server.
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
29
Step 2.
• Local DNS Server forwards the query to a Root DNS server.
Step 3.
• Root DNS server
Makes note of .com suffix
Returns a list of IP addresses for TLD (Top Level Domain Servers)
responsible for .com.
1
2
2
3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
30
Step 4.
• The local DNS server sends query for www.example.com to one of the TLD
servers.
Step 5.
• TLD Server
Makes note of example.com
Returns IP address for authoritative server example.com (such as
dns.example.com server)
4
4
5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
31
Step 6.
• Local DNS server sends query for www.example.com directly to DNS
server for example.com
Step 7.
• example.com DNS server responds with its IP address for
www.example.com
6
6
7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
32
Step 8.
• Local DNS server sends the IP address of www.example.com to the DNS
client.
DNS Caching
• When a DNS server receives a DNS reply (mapping hostname to an IP
address) it can cache the information in its local memory.
• DNS servers discard cached information after a period of time (usually 2
days)
8
7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
33
• In the worst cases, you'll get a dialog
box that says the domain name doesn't
exist - even though you know it does.
• This happens because the authoritative
server is slow replying to the first, and
your computer gets tired of waiting so it
times-out (drops the connection) or the
domain name does not exist.
• But if you try again, there's a good
chance it will work, because the
authoritative server has had enough
time to reply, and your name server has
stored the information in its cache.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
• Operating system utility called nslookup allows the user to manually
query the name servers to resolve a given host name
• Utility can be used to troubleshoot name resolution issues and to verify
the current status of the name servers
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 39
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
 DHCP allows a host to
obtain an IP address
dynamically
 DHCP server is
contacted and address
requested - chooses
address from a
configured range of
addresses called a pool
and “leases” it to the
host for a set period
 DHCP used for general
purpose hosts such as
end user devices, and
static addressing is
used for network
devices such as
gateways, switches,
servers and printers
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Client Boots
Client DHCP
Server
DHCP Request
IP, MAC Address
DHCP Discover
Mac Address
DHCP Offer
IP, Lease time
DHCP Ack
IP, Lease time
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
• FTP was developed to allow the transfer of files over the network.
• An FTP client is an application that runs on a client computer used to
push and pull data from an FTP server.
• FTP requires two connections between the client and the server: one
connection for commands and replies and another connection for the
actual file transfer.
• The client initiates and establishes the
first connection to the server for control
traffic on TCP port 21.
• The client then establishes the second
connection to the server for the actual
data transfer on TCP port 20.
• The client can download (pull) data from
the server or upload (push) data to the server.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
• SMB is a client/server file sharing protocol.
• All SMB messages share a common format.
• SMB file-sharing and print services have become the mainstay of
Windows networking.
• Microsoft products now support
TCP/IP protocols to directly support
SMB resource sharing.
• After the connection is established,
the user of the client can access the resources
on the server as if the resource is local to the
client host.
• The Mac, LINUX, and UNIX operating systems
have their own implementation of SMB.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Chapter Objectives:
• Explain the operation of the application layer in providing support to end-user
applications.
• Explain how well-known TCP/IP application layer protocols and services
operate.
Thank you.

More Related Content

What's hot

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
newbie2019
 
Application layer
Application layerApplication layer
Application layer
Mukesh Chinta
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
Dr. C.V. Suresh Babu
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 
Application Layer
Application LayerApplication Layer
Application Layer
ushabarad142
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
N.Jagadish Kumar
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
Jaimin Jani
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
Kritika Purohit
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
Vigneshkumar Ponnusamy
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04
Ankit Dubey
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
FabMinds
 
Application layer chapter-9
Application layer chapter-9Application layer chapter-9
Application layer chapter-9
Student
 
Application layer
Application layerApplication layer
Application layer
AnithaRaj31
 
Application protocols
Application protocolsApplication protocols
Application protocols
Online
 
Unit III
Unit IIIUnit III
Unit III
APARNA P
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 

What's hot (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
 
Application layer
Application layerApplication layer
Application layer
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
Chapter3
Chapter3Chapter3
Chapter3
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Application layer chapter-9
Application layer chapter-9Application layer chapter-9
Application layer chapter-9
 
Application layer
Application layerApplication layer
Application layer
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Unit III
Unit IIIUnit III
Unit III
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 

Viewers also liked

Shyam c.v. 29.01.16
Shyam c.v. 29.01.16Shyam c.v. 29.01.16
Shyam c.v. 29.01.16
Shyam Kumar yadav
 
Jessica Delaney My Dream
Jessica Delaney My DreamJessica Delaney My Dream
Jessica Delaney My DreamJessAnn93
 
EGDPortfolioPackagePROOF01
EGDPortfolioPackagePROOF01EGDPortfolioPackagePROOF01
EGDPortfolioPackagePROOF01Edward Gansen
 
GTECH NASPL Photos
GTECH NASPL PhotosGTECH NASPL Photos
GTECH NASPL Photos
Michael Joaquim
 
20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...
20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...
20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...
R.O.C.Executive Yuan
 
Before beginning
Before beginningBefore beginning
Before beginning
let's go to study
 
やめよう外国人参政権
やめよう外国人参政権やめよう外国人参政権
やめよう外国人参政権
内田 啓太郎
 
Recorrido por digital 2015
Recorrido por digital 2015Recorrido por digital 2015
Recorrido por digital 2015
coloradita123
 
Én vagyok az életnek kenyere jános 6,35
Én vagyok az életnek kenyere jános 6,35Én vagyok az életnek kenyere jános 6,35
Én vagyok az életnek kenyere jános 6,35
deeep33
 
240513 viavia presentation finale
240513 viavia presentation finale240513 viavia presentation finale
240513 viavia presentation finalepirlet
 
Shade sails
Shade sailsShade sails
Shade sails
Alison Lohman
 
Chapter 3 (validation control)
Chapter 3 (validation control)Chapter 3 (validation control)
Chapter 3 (validation control)
let's go to study
 
Medios y recursos instruccionales
Medios y recursos instruccionalesMedios y recursos instruccionales
Medios y recursos instruccionales
lapekis_17
 
What i do daily english
What i do daily  englishWhat i do daily  english
What i do daily english
SnowySnowball
 
Dongeradeel byda aestersiida der pasen, deel 2
Dongeradeel byda aestersiida der pasen, deel 2Dongeradeel byda aestersiida der pasen, deel 2
Dongeradeel byda aestersiida der pasen, deel 2
Historische Vereniging Noordoost Friesland
 
As origens da presença europeia no Brasil
As origens da presença europeia no BrasilAs origens da presença europeia no Brasil
As origens da presença europeia no Brasil
Elton Zanoni
 
Seminar 12 jan 2016
Seminar 12 jan 2016Seminar 12 jan 2016
Seminar 12 jan 2016
munnianwar
 

Viewers also liked (18)

Shyam c.v. 29.01.16
Shyam c.v. 29.01.16Shyam c.v. 29.01.16
Shyam c.v. 29.01.16
 
Jessica Delaney My Dream
Jessica Delaney My DreamJessica Delaney My Dream
Jessica Delaney My Dream
 
EGDPortfolioPackagePROOF01
EGDPortfolioPackagePROOF01EGDPortfolioPackagePROOF01
EGDPortfolioPackagePROOF01
 
GTECH NASPL Photos
GTECH NASPL PhotosGTECH NASPL Photos
GTECH NASPL Photos
 
20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...
20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...
20160128本院人事行政總處簽陳為配合「原住民族委員會原住民族文化發展中心組織法」之施行,原住民族委員會函擬廢止「行政院原住民族委員會文化園區管理局組...
 
Before beginning
Before beginningBefore beginning
Before beginning
 
Naspl photos
Naspl photosNaspl photos
Naspl photos
 
やめよう外国人参政権
やめよう外国人参政権やめよう外国人参政権
やめよう外国人参政権
 
Recorrido por digital 2015
Recorrido por digital 2015Recorrido por digital 2015
Recorrido por digital 2015
 
Én vagyok az életnek kenyere jános 6,35
Én vagyok az életnek kenyere jános 6,35Én vagyok az életnek kenyere jános 6,35
Én vagyok az életnek kenyere jános 6,35
 
240513 viavia presentation finale
240513 viavia presentation finale240513 viavia presentation finale
240513 viavia presentation finale
 
Shade sails
Shade sailsShade sails
Shade sails
 
Chapter 3 (validation control)
Chapter 3 (validation control)Chapter 3 (validation control)
Chapter 3 (validation control)
 
Medios y recursos instruccionales
Medios y recursos instruccionalesMedios y recursos instruccionales
Medios y recursos instruccionales
 
What i do daily english
What i do daily  englishWhat i do daily  english
What i do daily english
 
Dongeradeel byda aestersiida der pasen, deel 2
Dongeradeel byda aestersiida der pasen, deel 2Dongeradeel byda aestersiida der pasen, deel 2
Dongeradeel byda aestersiida der pasen, deel 2
 
As origens da presença europeia no Brasil
As origens da presença europeia no BrasilAs origens da presença europeia no Brasil
As origens da presença europeia no Brasil
 
Seminar 12 jan 2016
Seminar 12 jan 2016Seminar 12 jan 2016
Seminar 12 jan 2016
 

Similar to Ch10

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
newbie2019
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
Dr. Shivashankar
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
teknetir
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
Vuz Dở Hơi
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
MochamadSyaifulAnwar2
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
AASTHAJAJOO
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
argost1003
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
Mohammed Ilyas
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
ssuserf7cd2b
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
bhagyavantrajapur88
 

Similar to Ch10 (20)

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
 

More from let's go to study

Rs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_finalRs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_final
let's go to study
 
Chapter 8 (security)
Chapter 8 (security)Chapter 8 (security)
Chapter 8 (security)
let's go to study
 
Chapter 7 (ado.net)
Chapter 7 (ado.net)Chapter 7 (ado.net)
Chapter 7 (ado.net)
let's go to study
 
Chapter 6 (data binding)
Chapter 6 (data binding)Chapter 6 (data binding)
Chapter 6 (data binding)
let's go to study
 
Chapter 5 (master page)
Chapter 5 (master page)Chapter 5 (master page)
Chapter 5 (master page)
let's go to study
 
Chapter 4 (navigater)
Chapter 4 (navigater)Chapter 4 (navigater)
Chapter 4 (navigater)
let's go to study
 
Chapter 2 (web servercontrol)
Chapter 2 (web servercontrol)Chapter 2 (web servercontrol)
Chapter 2 (web servercontrol)
let's go to study
 
Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)
let's go to study
 
Before beginning
Before beginningBefore beginning
Before beginning
let's go to study
 
Sadchap04
Sadchap04Sadchap04
Sadchap03
Sadchap03Sadchap03
Sadchap02
Sadchap02Sadchap02
Sadchap01
Sadchap01Sadchap01
009 sql server management studio
009 sql server management studio009 sql server management studio
009 sql server management studiolet's go to study
 
Chapter 2-html-tage
Chapter 2-html-tageChapter 2-html-tage
Chapter 2-html-tage
let's go to study
 
Chapter 0 before you start
Chapter 0   before you startChapter 0   before you start
Chapter 0 before you start
let's go to study
 
Java 2 chapter 10 - basic oop in java
Java 2   chapter 10 - basic oop in javaJava 2   chapter 10 - basic oop in java
Java 2 chapter 10 - basic oop in javalet's go to study
 

More from let's go to study (20)

Rs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_finalRs instructor ppt_chapter11_final
Rs instructor ppt_chapter11_final
 
Chapter 8 (security)
Chapter 8 (security)Chapter 8 (security)
Chapter 8 (security)
 
Chapter 7 (ado.net)
Chapter 7 (ado.net)Chapter 7 (ado.net)
Chapter 7 (ado.net)
 
Chapter 6 (data binding)
Chapter 6 (data binding)Chapter 6 (data binding)
Chapter 6 (data binding)
 
Chapter 5 (master page)
Chapter 5 (master page)Chapter 5 (master page)
Chapter 5 (master page)
 
Chapter 4 (navigater)
Chapter 4 (navigater)Chapter 4 (navigater)
Chapter 4 (navigater)
 
Chapter 2 (web servercontrol)
Chapter 2 (web servercontrol)Chapter 2 (web servercontrol)
Chapter 2 (web servercontrol)
 
Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)Chapter 1 (asp.net over view)
Chapter 1 (asp.net over view)
 
Before beginning
Before beginningBefore beginning
Before beginning
 
Sadchap04
Sadchap04Sadchap04
Sadchap04
 
Sadchap03
Sadchap03Sadchap03
Sadchap03
 
Sadchap02
Sadchap02Sadchap02
Sadchap02
 
Sadchap01
Sadchap01Sadchap01
Sadchap01
 
database design process
database design processdatabase design process
database design process
 
009 sql server management studio
009 sql server management studio009 sql server management studio
009 sql server management studio
 
007 sql server-installation
007 sql server-installation007 sql server-installation
007 sql server-installation
 
Chapter 2-html-tage
Chapter 2-html-tageChapter 2-html-tage
Chapter 2-html-tage
 
Chapter 0 before you start
Chapter 0   before you startChapter 0   before you start
Chapter 0 before you start
 
Java 2 chapter 10 - basic oop in java
Java 2   chapter 10 - basic oop in javaJava 2   chapter 10 - basic oop in java
Java 2 chapter 10 - basic oop in java
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 

Recently uploaded

Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Ch10

  • 1. Introduction to Networks v5.1 Chapter 10: Application Layer EAV DARAPISAL 4 March 2016
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 10.0 Introduction 10.1 Application Layer Protocols 10.2 Well-Known Application Layer Protocols and Services 10.3 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications. • Explain how common application layer protocols interact with end user applications.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 • The application layer is closest to the end user. • Network applications enable users to send and receive data with ease. • The application layer acts as interface between the applications and the underlying network. • Application layer protocols help exchange data between programs running on the source and destination hosts. • The TCP/IP application layer performs the functions of the upper three layers of the OSI model. • Common application layer protocols include: HTTP, FTP, TFTP, DNS.
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 • The presentation layer has three primary functions: o Format data o Compress data o Encrypt data • Common standards for video include QuickTime and Motion Picture Experts Group (MPEG). • Common graphic image formats are: • Graphics Interchange Format (GIF) • Joint Photographic Experts Group (JPEG) • Portable Network Graphics (PNG) format
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 • The session layer creates and maintains dialogs between source and destination applications. • The session layer handles the exchange of information to initiate dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time.
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 • TCP/IP application protocols specify the format and control information necessary for common Internet functions. • Application layer protocols must be implemented in both the source and destination devices. • Application layer protocols implemented on the source and destination host must be compatible to allow communication.
  • 9. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 9
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 • The device requesting the information is called a client. • The device responding to the request is called a server. • Client and server processes are considered to be in the application layer. • The client initiates the exchange by requesting data from the server. • The server responds by sending one or more streams of data to the client. • Application layer protocols describe the format of the requests and responses between clients and servers. • The contents of the data exchange will depend of the application in use. • Email is an example of a Client-Server interaction.
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 • In the peer-to-peer (P2P) networking model, the data is accessed without the use of a dedicated server. • Two or more computers can be connected to a P2P network to share resources. • Every connected end device (a peer) can function as both a server and a client. • The roles of client and server are set on a per request basis.
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 • Some P2P applications use a hybrid system. • In hybrid P2P, resource sharing is decentralized. • Indexes that point to resource locations are stored in a centralized directory. • In a hybrid system, each peer accesses an index server to get the location of a resource stored on another peer.
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 • Common P2P networks include: eDonkey, G2, BitTorrent, Bitcoin. • Many P2P applications allow users to share pieces of many files with each other at the same time. • A small torrent file contains information about the location of other users and tracker computers. • Trackers are computers keeping track of the files hosted by users. • This technology is called BitTorrent. • There are many BitTorrent clients, including BitTorrent, uTorrent, Frostwire, and qBittorrent.
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Upon completion of this section, you should be able to: • Explain how web and email protocols operate. • Explain how the IP addressing protocols operate. • Explain how file transfer protocols operate.
  • 15. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 • A web address or uniform resource locator (URL) is a reference to a web server. A URL allows a web browser to establish a connection to that web server. • URLs and Uniform Resource Identifier (URIs) are the names most people associate with web addresses. • The URL http://cisco.com/index.html has three basic parts: o http (the protocol or scheme) o www.cisco.com (the server name) o index.html (the specific filename requested) • Using DNS, the server name portion of the URL is then translated to the associated IP address before the server can be contacted. HTTP Protocol Step 1
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 • The browser sends a GET request to the server’s IP address and asks for the index.html file. • The server sends the requested file to the client. • The index.html was specified in the URL and contains the HTML code for this web page. • The browser processes the HTML code and formats the page for the browser window based on the code in the file. HTTP Protocol Step 3 HTTP Protocol Step 2
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 • HTTP o Is a request/response protocol. o Has three common message types: GET, POST, PUT. o Is not secure. Messages can be intercepted. • HTTPS uses authentication and encryption to secure data.
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 • Email is a store-and-forward method of sending, storing, and retrieving electronic messages. • Email messages are stored in databases on mail servers. • Email clients communicate with mail servers to send and receive email. • Mail servers communicate with other mail servers to transport messages from one domain to another. • Email clients do not communicate directly when sending email. • Email relies on three separate protocols for operation: SMTP (sending),POP (retrieving), IMAP (retrieving).
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 • SMTP message formats require a message header and body. • The body can contain any amount of text. • The header must have a properly formatted recipient email address and a sender address. • An SMTP client sends an email by connecting to a SMTP server on port 25. • The server receives the message and stores it message in a local mailbox or relays the message to another mail server. • Users use email clients to retrieve messages stored on the server. • IMAP and POP are two protocols commonly used by email clients to retrieve messages.
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 • Messages are downloaded from the server to the client. • The server listens on port 110 TCP for client requests. • Email clients direct their POP requests to mail servers on port TCP 110. • The POP client and server exchange commands and responses until the connection is closed or aborted. • POP allows for email messages to be downloaded to the client’s device (computer or phone) and removed from the server. • There is no centralized location where email messages are kept. • A downloaded message resides on the device that triggered the download.
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 • IMAP is another protocol used to retrieve email messages. • Allows for messages to be displayed to the user rather than downloaded. • The original messages reside on the server until manually deleted by the user. • Users view copies of the messages in their email client software. • Users can create a folder hierarchy on the server to organize and store mail. • That file structure is displayed on the email client. • When a user decides to delete a message, the server synchronizes that action and deletes the message from the server.
  • 23. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 23
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 • While IP addresses are crucial for network communication, they are not easy to memorize. • Domain names are created to make server addresses more user- friendly. • Domain names such as http://www.cisco.com are user-friendly addresses associated with the IP address of a specific server. • However, computers still need the actual numeric address before they can communicate.
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 A human legible name is resolved to its numeric network device address by the DNS protocol
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 A human legible name is resolved to its numeric network device address by the DNS protocol
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 Examples top- level domains: .au - Australia .co - Colombia .com - business or industry .jp - Japan .org - non-profit organization
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28 28 • User types http://www.example.com Step 1. • The DNS resolver on the DNS client sends a recursive query to its configured Local DNS server. • The DNS server for that client is responsible for resolving the name Cannot refer the DNS client to another DNS server. 1
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 29 Step 2. • Local DNS Server forwards the query to a Root DNS server. Step 3. • Root DNS server Makes note of .com suffix Returns a list of IP addresses for TLD (Top Level Domain Servers) responsible for .com. 1 2 2 3
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 30 Step 4. • The local DNS server sends query for www.example.com to one of the TLD servers. Step 5. • TLD Server Makes note of example.com Returns IP address for authoritative server example.com (such as dns.example.com server) 4 4 5
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31 31 Step 6. • Local DNS server sends query for www.example.com directly to DNS server for example.com Step 7. • example.com DNS server responds with its IP address for www.example.com 6 6 7
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 32 Step 8. • Local DNS server sends the IP address of www.example.com to the DNS client. DNS Caching • When a DNS server receives a DNS reply (mapping hostname to an IP address) it can cache the information in its local memory. • DNS servers discard cached information after a period of time (usually 2 days) 8 7
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 33 • In the worst cases, you'll get a dialog box that says the domain name doesn't exist - even though you know it does. • This happens because the authoritative server is slow replying to the first, and your computer gets tired of waiting so it times-out (drops the connection) or the domain name does not exist. • But if you try again, there's a good chance it will work, because the authoritative server has had enough time to reply, and your name server has stored the information in its cache.
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 • Operating system utility called nslookup allows the user to manually query the name servers to resolve a given host name • Utility can be used to troubleshoot name resolution issues and to verify the current status of the name servers
  • 35. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 39
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40  DHCP allows a host to obtain an IP address dynamically  DHCP server is contacted and address requested - chooses address from a configured range of addresses called a pool and “leases” it to the host for a set period  DHCP used for general purpose hosts such as end user devices, and static addressing is used for network devices such as gateways, switches, servers and printers
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42 Client Boots Client DHCP Server DHCP Request IP, MAC Address DHCP Discover Mac Address DHCP Offer IP, Lease time DHCP Ack IP, Lease time
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43 • FTP was developed to allow the transfer of files over the network. • An FTP client is an application that runs on a client computer used to push and pull data from an FTP server. • FTP requires two connections between the client and the server: one connection for commands and replies and another connection for the actual file transfer. • The client initiates and establishes the first connection to the server for control traffic on TCP port 21. • The client then establishes the second connection to the server for the actual data transfer on TCP port 20. • The client can download (pull) data from the server or upload (push) data to the server.
  • 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47 • SMB is a client/server file sharing protocol. • All SMB messages share a common format. • SMB file-sharing and print services have become the mainstay of Windows networking. • Microsoft products now support TCP/IP protocols to directly support SMB resource sharing. • After the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host. • The Mac, LINUX, and UNIX operating systems have their own implementation of SMB.
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48 Chapter Objectives: • Explain the operation of the application layer in providing support to end-user applications. • Explain how well-known TCP/IP application layer protocols and services operate.