SlideShare a Scribd company logo
Introduction to Networks v5.1
Chapter 10:
Application Layer
Jupriyadi
Juli 2020
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
10.0 Introduction
10.1 Application Layer Protocols
10.2 Well-Known Application
Layer Protocols and Services
10.3 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Explain how the functions of the application layer, session layer, and
presentation layer work together to provide network services to end user
applications.
• Explain how common application layer protocols interact with end user
applications.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
• The application layer is closest to the end user.
• Network applications enable users to send and receive data with ease.
• The application layer acts as interface between the applications and the
underlying network.
• Application layer protocols help
exchange data between programs
running on the source and
destination hosts.
• The TCP/IP application layer
performs the functions of the upper
three layers of the OSI model.
• Common application layer protocols
include: HTTP, FTP, TFTP, DNS.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
• The presentation layer has three primary functions:
o Format data
o Compress data
o Encrypt data
• Common standards for video include QuickTime and Motion Picture
Experts Group (MPEG).
• Common graphic image formats are:
• Graphics Interchange Format (GIF)
• Joint Photographic Experts Group (JPEG)
• Portable Network Graphics (PNG) format
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
• The session layer creates and maintains dialogs between source and
destination applications.
• The session layer handles the exchange of information to initiate dialogs,
keep them active, and to restart sessions that are disrupted or idle for a
long period of time.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
• TCP/IP application protocols specify the format and control information
necessary for common Internet functions.
• Application layer protocols must be implemented in both the source and
destination devices.
• Application layer protocols implemented on the source and destination
host must be compatible to allow communication.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
• The device requesting the information is called a client.
• The device responding to the request is called a server.
• Client and server processes are considered to be in the application layer.
• The client initiates the exchange by requesting data from the server.
• The server responds by sending one
or more streams of data to the client.
• Application layer protocols describe
the format of the requests and
responses between clients and
servers.
• The contents of the data exchange
will depend of the application in use.
• Email is an example of a
Client-Server interaction.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
• In the peer-to-peer (P2P) networking model, the data is accessed
without the use of a dedicated server.
• Two or more computers can be connected to a P2P network to share
resources.
• Every connected end device (a peer) can function as both a server and
a client.
• The roles of client and
server are set on a per
request basis.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
• Some P2P applications use a hybrid system.
• In hybrid P2P, resource sharing is decentralized.
• Indexes that point to resource locations are stored in a centralized
directory.
• In a hybrid system, each
peer accesses an index
server to get the location
of a resource stored on
another peer.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
• Common P2P networks include: eDonkey, G2, BitTorrent, Bitcoin.
• Many P2P applications allow users to share pieces of many files with
each other at the same time.
• A small torrent file contains information about the location of other users
and tracker computers.
• Trackers are computers keeping
track of the files hosted by users.
• This technology is called BitTorrent.
• There are many BitTorrent clients,
including BitTorrent, uTorrent,
Frostwire, and qBittorrent.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Upon completion of this section, you should be able to:
• Explain how web and email protocols operate.
• Explain how the IP addressing protocols operate.
• Explain how file transfer protocols operate.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
• A web address or uniform resource locator (URL) is a reference to a web server.
A URL allows a web browser to establish a connection to that web server.
• URLs and Uniform Resource Identifier (URIs) are the names most people
associate with web addresses.
• The URL http://cisco.com/index.html has three basic parts:
o http (the protocol or scheme)
o www.cisco.com (the server name)
o index.html (the specific filename requested)
• Using DNS, the server name portion of
the URL is then translated to the
associated IP address before the server
can be contacted.
HTTP Protocol Step 1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
• The browser sends a GET request
to the server’s IP address and asks
for the index.html file.
• The server sends the requested file
to the client.
• The index.html was specified in
the URL and contains the HTML
code for this web page.
• The browser processes the HTML
code and formats the page for the
browser window based on the code
in the file.
HTTP Protocol Step 3
HTTP Protocol Step 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
• HTTP
o Is a request/response protocol.
o Has three common message types: GET, POST, PUT.
o Is not secure. Messages can be intercepted.
• HTTPS uses authentication and
encryption to secure data.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
• Email is a store-and-forward method of sending, storing, and retrieving
electronic messages.
• Email messages are stored in databases on mail servers.
• Email clients communicate with mail
servers to send and receive email.
• Mail servers communicate with other
mail servers to transport messages
from one domain to another.
• Email clients do not communicate
directly when sending email.
• Email relies on three separate protocols
for operation: SMTP (sending),POP (retrieving),
IMAP (retrieving).
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
• SMTP message formats require a message header and body.
• The body can contain any amount of text.
• The header must have a properly formatted recipient email address and a
sender address.
• An SMTP client sends an email by
connecting to a SMTP server on
port 25.
• The server receives the message and
stores it message in a local mailbox or
relays the message to another mail server.
• Users use email clients to retrieve messages
stored on the server.
• IMAP and POP are two protocols commonly
used by email clients to retrieve messages.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
• Messages are downloaded from the server to the client.
• The server listens on port 110 TCP for client requests.
• Email clients direct their POP requests to mail servers on port TCP 110.
• The POP client and server exchange commands and responses until
the connection is closed or aborted.
• POP allows for email messages
to be downloaded to the client’s
device (computer or phone) and
removed from the server.
• There is no centralized location
where email messages are kept.
• A downloaded message resides on
the device that triggered the download.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
• IMAP is another protocol used to retrieve email messages.
• Allows for messages to be displayed to the user rather than downloaded.
• The original messages reside on the server until manually deleted by the user.
• Users view copies of the messages in their email client software.
• Users can create a folder hierarchy on
the server to organize and store mail.
• That file structure is displayed on the
email client.
• When a user decides to delete a message,
the server synchronizes that action and
deletes the message from the server.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
• While IP addresses are crucial for network communication, they are not
easy to memorize.
• Domain names are created to make server addresses more user-
friendly.
• Domain names such as http://www.cisco.com are user-friendly
addresses associated with the IP address of a specific server.
• However, computers still need the actual numeric address before they
can communicate.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
• The DNS protocol allows for the
dynamic translation of a domain
name into the correct IP address.
• The DNS protocol communications
using a single format called a
message.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
• DNS supports different types of records. Some of these record types are:
o A - An end device IPv4 address
o NS - An authoritative name server
o AAAA - An end device IPv6 address (pronounced quad-A)
o MX - A mail exchange record
• DNS servers will first look at its own records to resolve the name. If the server is
unable to resolve the name using its locally stored records, it relays the query to
other servers.
• The response is then forwarded to
the requesting client.
• The DNS Client service on Windows
PCs also stores previously resolved
names in memory.
• ipconfig /displaydns displays all of
the cached DNS entries on Windows.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
• The DNS protocol uses a hierarchical system, with the root at the top
and branches below. The naming structure is broken down into small,
manageable zones.
• Each DNS server is only responsible for managing name-to-IP mappings
for that small portion of the DNS structure.
• Requests for zones not stored in a specific DNS server are forwarded to
other servers for translation.
• Top-level domains represent either the type
of domain or the country of origin.
Examples of top-level domains are:
o .com - a business or industry
o .org - a non-profit organization
o .au - Australia
o .co - Colombia
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
• Allows the user to manually place DNS queries.
• It can also be used to troubleshoot name resolution issues.
• Has many options available for extensive testing and verification of the
DNS process.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
• Computers need network addresses to communicate over a network.
• Additional crucial information includes gateway address, subnet mask,
and DNS server.
• Manually configuring end devices is not scalable. DHCP allows for
automated distribution of network information.
• DHCP-distributed addresses are
leased for a set period of time.
• Addresses are returned to the pool
for reuse when no longer in use.
• DHCP supports IPv4 and DHCPv6
supports IPv6.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
• A DHCP client goes through the following basic steps to request an IP:
o The client broadcasts a DHCPDISCOVER.
o A DHCP server replies with a DHCPOFFER message
o The client sends a DHCPREQUEST message to the server it wants to use (in case of
multiple offers).
• A client may also choose to request an address that it had previously
been allocated by the server.
• The server returns a DHCPACK
message to confirm the lease has
been finalized.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
• The server would respond with a DHCPNAK if the offer is no longer
valid
• Leases must be renewed before its expiration through another
DHCPREQUEST.
• DHCPv6 has a similar set of messages:
o SOLICIT
o ADVERTISE
o INFORMATION REQUEST
o REPLY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
• FTP was developed to allow the transfer of files over the network.
• An FTP client is an application that runs on a client computer used to
push and pull data from an FTP server.
• FTP requires two connections between the client and the server: one
connection for commands and replies and another connection for the
actual file transfer.
• The client initiates and establishes the
first connection to the server for control
traffic on TCP port 21.
• The client then establishes the second
connection to the server for the actual
data transfer on TCP port 20.
• The client can download (pull) data from
the server or upload (push) data to the server.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
• SMB is a client/server file sharing protocol.
• All SMB messages share a common format.
• SMB file-sharing and print services have become the mainstay of
Windows networking.
• Microsoft products now support
TCP/IP protocols to directly support
SMB resource sharing.
• After the connection is established,
the user of the client can access the resources
on the server as if the resource is local to the
client host.
• The Mac, LINUX, and UNIX operating systems
have their own implementation of SMB.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Chapter Objectives:
• Explain the operation of the application layer in providing support to end-user
applications.
• Explain how well-known TCP/IP application layer protocols and services operate.
Thank you.

More Related Content

What's hot

CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5
newbie2019
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
Irsandi Hasan
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
Irsandi Hasan
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
Waqas Ahmed Nawaz
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
newbie2019
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
Waqas Ahmed Nawaz
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
Nil Menon
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
Waqas Ahmed Nawaz
 

What's hot (20)

CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
 

Similar to It nv51 instructor_ppt_ch10

Ch10
Ch10Ch10
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
Đô GiẢn
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
Đô GiẢn
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
Dr. Shivashankar
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
teknetir
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
Vuz Dở Hơi
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
MochamadSyaifulAnwar2
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
argost1003
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
AASTHAJAJOO
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
Mohammed Ilyas
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
ssuserf7cd2b
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
Jhoniel Viloria
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
bhagyavantrajapur88
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
Nidhitransport
 

Similar to It nv51 instructor_ppt_ch10 (20)

Ch10
Ch10Ch10
Ch10
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
newbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
newbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
newbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
newbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
newbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
newbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
newbie2019
 
C02
C02C02
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
newbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Recently uploaded

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 

Recently uploaded (20)

BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 

It nv51 instructor_ppt_ch10

  • 1. Introduction to Networks v5.1 Chapter 10: Application Layer Jupriyadi Juli 2020
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 10.0 Introduction 10.1 Application Layer Protocols 10.2 Well-Known Application Layer Protocols and Services 10.3 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications. • Explain how common application layer protocols interact with end user applications.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 • The application layer is closest to the end user. • Network applications enable users to send and receive data with ease. • The application layer acts as interface between the applications and the underlying network. • Application layer protocols help exchange data between programs running on the source and destination hosts. • The TCP/IP application layer performs the functions of the upper three layers of the OSI model. • Common application layer protocols include: HTTP, FTP, TFTP, DNS.
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 • The presentation layer has three primary functions: o Format data o Compress data o Encrypt data • Common standards for video include QuickTime and Motion Picture Experts Group (MPEG). • Common graphic image formats are: • Graphics Interchange Format (GIF) • Joint Photographic Experts Group (JPEG) • Portable Network Graphics (PNG) format
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 • The session layer creates and maintains dialogs between source and destination applications. • The session layer handles the exchange of information to initiate dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time.
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 • TCP/IP application protocols specify the format and control information necessary for common Internet functions. • Application layer protocols must be implemented in both the source and destination devices. • Application layer protocols implemented on the source and destination host must be compatible to allow communication.
  • 9. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 9
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 • The device requesting the information is called a client. • The device responding to the request is called a server. • Client and server processes are considered to be in the application layer. • The client initiates the exchange by requesting data from the server. • The server responds by sending one or more streams of data to the client. • Application layer protocols describe the format of the requests and responses between clients and servers. • The contents of the data exchange will depend of the application in use. • Email is an example of a Client-Server interaction.
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 • In the peer-to-peer (P2P) networking model, the data is accessed without the use of a dedicated server. • Two or more computers can be connected to a P2P network to share resources. • Every connected end device (a peer) can function as both a server and a client. • The roles of client and server are set on a per request basis.
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 • Some P2P applications use a hybrid system. • In hybrid P2P, resource sharing is decentralized. • Indexes that point to resource locations are stored in a centralized directory. • In a hybrid system, each peer accesses an index server to get the location of a resource stored on another peer.
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 • Common P2P networks include: eDonkey, G2, BitTorrent, Bitcoin. • Many P2P applications allow users to share pieces of many files with each other at the same time. • A small torrent file contains information about the location of other users and tracker computers. • Trackers are computers keeping track of the files hosted by users. • This technology is called BitTorrent. • There are many BitTorrent clients, including BitTorrent, uTorrent, Frostwire, and qBittorrent.
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Upon completion of this section, you should be able to: • Explain how web and email protocols operate. • Explain how the IP addressing protocols operate. • Explain how file transfer protocols operate.
  • 15. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 • A web address or uniform resource locator (URL) is a reference to a web server. A URL allows a web browser to establish a connection to that web server. • URLs and Uniform Resource Identifier (URIs) are the names most people associate with web addresses. • The URL http://cisco.com/index.html has three basic parts: o http (the protocol or scheme) o www.cisco.com (the server name) o index.html (the specific filename requested) • Using DNS, the server name portion of the URL is then translated to the associated IP address before the server can be contacted. HTTP Protocol Step 1
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 • The browser sends a GET request to the server’s IP address and asks for the index.html file. • The server sends the requested file to the client. • The index.html was specified in the URL and contains the HTML code for this web page. • The browser processes the HTML code and formats the page for the browser window based on the code in the file. HTTP Protocol Step 3 HTTP Protocol Step 2
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 • HTTP o Is a request/response protocol. o Has three common message types: GET, POST, PUT. o Is not secure. Messages can be intercepted. • HTTPS uses authentication and encryption to secure data.
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 • Email is a store-and-forward method of sending, storing, and retrieving electronic messages. • Email messages are stored in databases on mail servers. • Email clients communicate with mail servers to send and receive email. • Mail servers communicate with other mail servers to transport messages from one domain to another. • Email clients do not communicate directly when sending email. • Email relies on three separate protocols for operation: SMTP (sending),POP (retrieving), IMAP (retrieving).
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 • SMTP message formats require a message header and body. • The body can contain any amount of text. • The header must have a properly formatted recipient email address and a sender address. • An SMTP client sends an email by connecting to a SMTP server on port 25. • The server receives the message and stores it message in a local mailbox or relays the message to another mail server. • Users use email clients to retrieve messages stored on the server. • IMAP and POP are two protocols commonly used by email clients to retrieve messages.
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 • Messages are downloaded from the server to the client. • The server listens on port 110 TCP for client requests. • Email clients direct their POP requests to mail servers on port TCP 110. • The POP client and server exchange commands and responses until the connection is closed or aborted. • POP allows for email messages to be downloaded to the client’s device (computer or phone) and removed from the server. • There is no centralized location where email messages are kept. • A downloaded message resides on the device that triggered the download.
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 • IMAP is another protocol used to retrieve email messages. • Allows for messages to be displayed to the user rather than downloaded. • The original messages reside on the server until manually deleted by the user. • Users view copies of the messages in their email client software. • Users can create a folder hierarchy on the server to organize and store mail. • That file structure is displayed on the email client. • When a user decides to delete a message, the server synchronizes that action and deletes the message from the server.
  • 23. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 23
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 • While IP addresses are crucial for network communication, they are not easy to memorize. • Domain names are created to make server addresses more user- friendly. • Domain names such as http://www.cisco.com are user-friendly addresses associated with the IP address of a specific server. • However, computers still need the actual numeric address before they can communicate.
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 • The DNS protocol allows for the dynamic translation of a domain name into the correct IP address. • The DNS protocol communications using a single format called a message.
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 • DNS supports different types of records. Some of these record types are: o A - An end device IPv4 address o NS - An authoritative name server o AAAA - An end device IPv6 address (pronounced quad-A) o MX - A mail exchange record • DNS servers will first look at its own records to resolve the name. If the server is unable to resolve the name using its locally stored records, it relays the query to other servers. • The response is then forwarded to the requesting client. • The DNS Client service on Windows PCs also stores previously resolved names in memory. • ipconfig /displaydns displays all of the cached DNS entries on Windows.
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 • The DNS protocol uses a hierarchical system, with the root at the top and branches below. The naming structure is broken down into small, manageable zones. • Each DNS server is only responsible for managing name-to-IP mappings for that small portion of the DNS structure. • Requests for zones not stored in a specific DNS server are forwarded to other servers for translation. • Top-level domains represent either the type of domain or the country of origin. Examples of top-level domains are: o .com - a business or industry o .org - a non-profit organization o .au - Australia o .co - Colombia
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28 • Allows the user to manually place DNS queries. • It can also be used to troubleshoot name resolution issues. • Has many options available for extensive testing and verification of the DNS process.
  • 29. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 29
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 • Computers need network addresses to communicate over a network. • Additional crucial information includes gateway address, subnet mask, and DNS server. • Manually configuring end devices is not scalable. DHCP allows for automated distribution of network information. • DHCP-distributed addresses are leased for a set period of time. • Addresses are returned to the pool for reuse when no longer in use. • DHCP supports IPv4 and DHCPv6 supports IPv6.
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31 • A DHCP client goes through the following basic steps to request an IP: o The client broadcasts a DHCPDISCOVER. o A DHCP server replies with a DHCPOFFER message o The client sends a DHCPREQUEST message to the server it wants to use (in case of multiple offers). • A client may also choose to request an address that it had previously been allocated by the server. • The server returns a DHCPACK message to confirm the lease has been finalized.
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 • The server would respond with a DHCPNAK if the offer is no longer valid • Leases must be renewed before its expiration through another DHCPREQUEST. • DHCPv6 has a similar set of messages: o SOLICIT o ADVERTISE o INFORMATION REQUEST o REPLY
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 • FTP was developed to allow the transfer of files over the network. • An FTP client is an application that runs on a client computer used to push and pull data from an FTP server. • FTP requires two connections between the client and the server: one connection for commands and replies and another connection for the actual file transfer. • The client initiates and establishes the first connection to the server for control traffic on TCP port 21. • The client then establishes the second connection to the server for the actual data transfer on TCP port 20. • The client can download (pull) data from the server or upload (push) data to the server.
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 • SMB is a client/server file sharing protocol. • All SMB messages share a common format. • SMB file-sharing and print services have become the mainstay of Windows networking. • Microsoft products now support TCP/IP protocols to directly support SMB resource sharing. • After the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host. • The Mac, LINUX, and UNIX operating systems have their own implementation of SMB.
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35 Chapter Objectives: • Explain the operation of the application layer in providing support to end-user applications. • Explain how well-known TCP/IP application layer protocols and services operate.