SlideShare a Scribd company logo
1 of 34
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Network Fundamentals
Last Update: 12/6/2010
Abdekhalik Elsaid Mosa
abdu.elsaid@yahoo.com
http://abdelkhalik.staff.scuegypt.edu.eg/
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• OSI: is a layered, abstract representation created as a guideline
for network protocol design.
• Application Layer, provides human interface to the network.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• Application Layer, functions:
Provides the interface between the applications and network.
• Presentation Layer functions:
Handles the conversion of data between different formats.
 Encoding and decoding.
 Encryption and decryption.
 Compression and decompression.
• Session Layer functions:
Maintains dialogs between source and destination applications.
 Create session
 Manage and maintain session
 Terminate session
Most applications, like web browsers
Include functionality of the OSI
layers 5, 6 and 7.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer Software
• The 2 forms of S/W programs that provide access to the network.
1.Network-Aware applications:
are able to communicate directly
with the protocol stack.
Ex: E-mail clients, and web browser
2.Application layer services:
are the programs that interface
with the network and prepare the
data for transfer.
Ex: network print spooling
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
User Applications, Services, and Protocols
• Applications: Provide the human interface.
• Services: Establish an interface to the network.
• Protocols: Are rules and formats that govern how data is treated.
• The (applications,
services, and protocols)
may be used by a single
exe. Program.
Ex: Telnet, FTP
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Servers
• Servers usually are repositories of data.
• The server runs a service, sometimes called a server daemon.
• Daemons run in the background and are not under an end user's
direct control.
• Daemons are described as "listening"
for a request from a client.
• When a daemon "hears"
a request from a client:
It exchanges appropriate
messages with the client,
and then sends the
requested data to the client.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Client-Server Model
• Client: the device requesting Information.
• Server: the device which responds to the request.
• Centralized Administration.
• Security is easier to enforce.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer (P2P) Networking and Applications
• Peer-to-peer networking involves two distinct forms:
1. Peer-to-peer network design
2. Peer-to-peer applications.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Network Design
• Two or more computers are connected via a network and can
share resources without having a dedicated server.
• End device (peer) can function as either a server or a client.
• Decentralized Administration.
• Security is difficult to enforce.
• Used in small home networks
for file sharing and games.
• One computer might
assume the role of
server for one transaction
while simultaneously serving as a client for another.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Applications
• P2P applications allows a device to act as both a client and a
server within the same communication.
• Every client is a server and every server a client.
• Peer-to-peer applications can be used on peer-to-peer
networks, client/server networks, and across the Internet.
• Some P2P applications use a hybrid system.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application layer Protocols and Port numbers
• The Transport layer uses port number addressing .
• Port numbers identify applications and Application layer services.
• Server programs generally use predefined port numbers that are
commonly known by clients.
• Examples:
Telnet - TCP Port 23DNS - TCP/UDP Port 53
DHCP - UDP Port 67HTTP - TCP Port 80
FTP - TCP Ports 20 and 21SMTP - TCP Port 25
POP - UDP Port 110
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Domain Name System (DNS)
• Devices are labeled with numeric IP addresses.
• Domain Names were created to convert the numeric address into
a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com
• DNS client is sometimes called DNS Resolver.
• A DNS Server provides name resolution using the name daemon.
• The DNS server stores different types of resource records (RRs)
used to resolve names.
• These records contain the
name, address, and others.
nslookup
• Displays default DNS server for
your host.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Servers Hierarchy
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Name Resolution
Step 1:
• The DNS resolver sends a
recursive query to its Local
DNS server.
• Requests IP address for "www.example.com".
• The Local DNS server is responsible for resolving the name.
– Cannot refer the DNS client to another DNS server.
1
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 2:
• Local DNS Server forwards
the query to a
Root DNS server.
Step 3:
• Root DNS server
Makes note of .com suffix
Returns a list of IP addresses for TLD Servers responsible for
.com.
DNS Name Resolution
1
2
2
3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Root DNS Servers: There are
13 Root DNS servers (labeled
A through M)
• TLD Servers
– Responsible for domains
such as .com, edu, org,
.net, .uk.
– There are redundant
servers throughout the
world.
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 4:
• The local DNS server sends
query for www.example.com
to one of the TLD servers.
Step 5:
• TLD Server
– Makes note of example.com
– Returns IP address for authoritative server example.com
(such as dns.example.com server)
4
4
5
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 6:
• Local DNS server sends
query directly to DNS server
for example.com
Step 7:
• example.com DNS server
responds with its IP address
for www.example.com
6
6
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 8:
• Local DNS server sends the IP
of www.example.com to the
DNS client.
• DNS Caching: When a DNS
server receives a DNS reply ,
it can cache the information
in its local memory.
• ipconfig /displaydns: Displays cashed DNS entries.
• ipconfig /flushdns: Manually deletes entries.
8
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP – Dynamic Host Configuration Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP
• DHCP automates the assignment
of IP address, Subnet mask, Default
gateway, DNS Server
• DHCP servers can be:
–Server on LAN
–Router
–Server at ISP
• DHCP addresses are not
permanently assigned to hosts but
are leased for a period of time
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Telnet
• Allows a user to remotely
access another device.
• A connection using Telnet is
called a Virtual Terminal (VTY)
session.
• Telnet clients (Teraterm
,Hyperterm)
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• The Telnet server runs a service called Telnet daemon.
• Telnet supports user authentication, but does not encrypt data.
• Telnet transfers data as plain text.
• Secure Shell (SSH) protocol offers an alternate and secure
method for server access.
• SSH benefits over Telnet
– Stronger authentication
– Encryption
• As a best practice, network professionals should always use SSH
in place of Telnet, whenever possible.
Telnet and SSH
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP (HyperText Transfer Protocol)
HTTP: developed to publish and retrieve HTML pages, “data
transfer”.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Request Message
Request Line
• GET: Browser/client is requesting an object.
• /~index/: Browser is requesting this object in this directory
(default is index.html).
• HTTP/1.1: Browser implements the HTTP/1.1.
GET /~index/ HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Request line
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Header Lines
• Accept-Language: User prefers this language of the object
• User-Agent: The browser type making the request
• Host: Host on which the object resides
• Connection: Client/browser is telling the server to keep this TCP
connection Open, known as a persistent connection.
GET /~ index / HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Response Message
HTTP/1.1 200 OK
Date: Fri, 22 Feb 2008 16:34:18 GMT
Server: Apache/2.0.52 (Red Hat)
Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT
Content-Length: 15137
Connection: close
Content-Type: text/html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
 Response message:
Status line
Header lines
Entity body
 HTTP is not a secure protocol.
 For secure communication, the HTTP Secure
(HTTPS) is used for accessing or posting web server
information.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
FTP (File Transfer Protocol)
• FTP was developed to allow for file transfers between a client
and a server.
• Used to push and pull files from a server running the FTP
daemon (FTPd).
• FTP requires two connections:
1. Control Connection:
- For commands and replies.
- Port 21.
2. Data Connection:
- For the actual file transfer.
- Port 20.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
– Mail User agent (MUA) “Mail Client”
• Allows messages to be sent and
places received messages into the
client's mailbox.
• GUI user agents: Outlook, Eudora,
Messenger
– Mail servers: Stores user mail boxes,
communicates with local user agents and
other mail servers.
– SMTP: allows you to send e-mail from
either a client or a server.
– POP: allows you to receive e-mail
messages from an e-mail server ,
(Mail access protocol)
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
The e-mail server operates two separate processes:
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)
MTA: is used to forward
e-mail either to another MTA
or to a MDA.
MTA uses SMTP to
route email between
servers.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
MDA: governs transfer of email
from mail servers to clients.
SMTP: an outbound e-mail
delivery protocol.
POP/POP3: an inbound e-mail
delivery protocol.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
SMB: is a client/server file sharing protocol.
Developed by IBM to describe the structure of shared network
resources, such as directories, files, printers, and serial ports.
Microsoft windows and Apple Macintosh operating systems
support resource sharing using the SMB protocol.
SMB Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Peers (hosts) act as both clients and servers.
• The actual file transfer usually rely on HTTP services.
• No centralized file server.
• Many client applications are available for accessing the Gnutella network, including:
BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX
P2P File Sharing and Gnutella Protocol
The Gnutella protocol defines five
different packet types:
1. Ping: for device discovery
2. Pong: as a reply to a ping
3. Query: for file location
4. query hit: as a reply to a query
5. Push: as a download request
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy

More Related Content

What's hot

Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
welcometofacebook
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
Wayne Jones Jnr
 

What's hot (20)

Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Routing
RoutingRouting
Routing
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Introduction to network switches
Introduction to network switchesIntroduction to network switches
Introduction to network switches
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
transport layer
transport layer transport layer
transport layer
 
Computer network
Computer networkComputer network
Computer network
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 

Viewers also liked

Application Layer
Application LayerApplication Layer
Application Layer
rosmida
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
Hasam Panezai
 

Viewers also liked (20)

Application Layer
Application Layer Application Layer
Application Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
SmithaV19
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols (20)

Chapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).pptChapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).ppt
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Iso model
Iso modelIso model
Iso model
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programming
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming Curriculum
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Web Fendamentals
Web FendamentalsWeb Fendamentals
Web Fendamentals
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Ch10
Ch10Ch10
Ch10
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016
 

More from Abdelkhalik Mosa

More from Abdelkhalik Mosa (11)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
IPv6
IPv6IPv6
IPv6
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

  • 1. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals Last Update: 12/6/2010 Abdekhalik Elsaid Mosa abdu.elsaid@yahoo.com http://abdelkhalik.staff.scuegypt.edu.eg/
  • 2. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • OSI: is a layered, abstract representation created as a guideline for network protocol design. • Application Layer, provides human interface to the network.
  • 3. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • Application Layer, functions: Provides the interface between the applications and network. • Presentation Layer functions: Handles the conversion of data between different formats.  Encoding and decoding.  Encryption and decryption.  Compression and decompression. • Session Layer functions: Maintains dialogs between source and destination applications.  Create session  Manage and maintain session  Terminate session Most applications, like web browsers Include functionality of the OSI layers 5, 6 and 7.
  • 4. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer Software • The 2 forms of S/W programs that provide access to the network. 1.Network-Aware applications: are able to communicate directly with the protocol stack. Ex: E-mail clients, and web browser 2.Application layer services: are the programs that interface with the network and prepare the data for transfer. Ex: network print spooling
  • 5. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy User Applications, Services, and Protocols • Applications: Provide the human interface. • Services: Establish an interface to the network. • Protocols: Are rules and formats that govern how data is treated. • The (applications, services, and protocols) may be used by a single exe. Program. Ex: Telnet, FTP
  • 6. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Servers • Servers usually are repositories of data. • The server runs a service, sometimes called a server daemon. • Daemons run in the background and are not under an end user's direct control. • Daemons are described as "listening" for a request from a client. • When a daemon "hears" a request from a client: It exchanges appropriate messages with the client, and then sends the requested data to the client.
  • 7. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Client-Server Model • Client: the device requesting Information. • Server: the device which responds to the request. • Centralized Administration. • Security is easier to enforce.
  • 8. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer (P2P) Networking and Applications • Peer-to-peer networking involves two distinct forms: 1. Peer-to-peer network design 2. Peer-to-peer applications.
  • 9. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Network Design • Two or more computers are connected via a network and can share resources without having a dedicated server. • End device (peer) can function as either a server or a client. • Decentralized Administration. • Security is difficult to enforce. • Used in small home networks for file sharing and games. • One computer might assume the role of server for one transaction while simultaneously serving as a client for another.
  • 10. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Applications • P2P applications allows a device to act as both a client and a server within the same communication. • Every client is a server and every server a client. • Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and across the Internet. • Some P2P applications use a hybrid system.
  • 11. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application layer Protocols and Port numbers • The Transport layer uses port number addressing . • Port numbers identify applications and Application layer services. • Server programs generally use predefined port numbers that are commonly known by clients. • Examples: Telnet - TCP Port 23DNS - TCP/UDP Port 53 DHCP - UDP Port 67HTTP - TCP Port 80 FTP - TCP Ports 20 and 21SMTP - TCP Port 25 POP - UDP Port 110
  • 12. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Domain Name System (DNS) • Devices are labeled with numeric IP addresses. • Domain Names were created to convert the numeric address into a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com • DNS client is sometimes called DNS Resolver. • A DNS Server provides name resolution using the name daemon. • The DNS server stores different types of resource records (RRs) used to resolve names. • These records contain the name, address, and others. nslookup • Displays default DNS server for your host.
  • 13. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Servers Hierarchy
  • 14. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Name Resolution Step 1: • The DNS resolver sends a recursive query to its Local DNS server. • Requests IP address for "www.example.com". • The Local DNS server is responsible for resolving the name. – Cannot refer the DNS client to another DNS server. 1
  • 15. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 2: • Local DNS Server forwards the query to a Root DNS server. Step 3: • Root DNS server Makes note of .com suffix Returns a list of IP addresses for TLD Servers responsible for .com. DNS Name Resolution 1 2 2 3
  • 16. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Root DNS Servers: There are 13 Root DNS servers (labeled A through M) • TLD Servers – Responsible for domains such as .com, edu, org, .net, .uk. – There are redundant servers throughout the world. DNS Name Resolution
  • 17. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 4: • The local DNS server sends query for www.example.com to one of the TLD servers. Step 5: • TLD Server – Makes note of example.com – Returns IP address for authoritative server example.com (such as dns.example.com server) 4 4 5 DNS Name Resolution
  • 18. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 6: • Local DNS server sends query directly to DNS server for example.com Step 7: • example.com DNS server responds with its IP address for www.example.com 6 6 7 DNS Name Resolution
  • 19. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 8: • Local DNS server sends the IP of www.example.com to the DNS client. • DNS Caching: When a DNS server receives a DNS reply , it can cache the information in its local memory. • ipconfig /displaydns: Displays cashed DNS entries. • ipconfig /flushdns: Manually deletes entries. 8 7 DNS Name Resolution
  • 20. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP – Dynamic Host Configuration Protocol
  • 21. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP • DHCP automates the assignment of IP address, Subnet mask, Default gateway, DNS Server • DHCP servers can be: –Server on LAN –Router –Server at ISP • DHCP addresses are not permanently assigned to hosts but are leased for a period of time
  • 22. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Telnet • Allows a user to remotely access another device. • A connection using Telnet is called a Virtual Terminal (VTY) session. • Telnet clients (Teraterm ,Hyperterm)
  • 23. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • The Telnet server runs a service called Telnet daemon. • Telnet supports user authentication, but does not encrypt data. • Telnet transfers data as plain text. • Secure Shell (SSH) protocol offers an alternate and secure method for server access. • SSH benefits over Telnet – Stronger authentication – Encryption • As a best practice, network professionals should always use SSH in place of Telnet, whenever possible. Telnet and SSH
  • 24. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP (HyperText Transfer Protocol) HTTP: developed to publish and retrieve HTML pages, “data transfer”.
  • 25. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Request Message Request Line • GET: Browser/client is requesting an object. • /~index/: Browser is requesting this object in this directory (default is index.html). • HTTP/1.1: Browser implements the HTTP/1.1. GET /~index/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive Request line
  • 26. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Header Lines • Accept-Language: User prefers this language of the object • User-Agent: The browser type making the request • Host: Host on which the object resides • Connection: Client/browser is telling the server to keep this TCP connection Open, known as a persistent connection. GET /~ index / HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive
  • 27. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Response Message HTTP/1.1 200 OK Date: Fri, 22 Feb 2008 16:34:18 GMT Server: Apache/2.0.52 (Red Hat) Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT Content-Length: 15137 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">  Response message: Status line Header lines Entity body  HTTP is not a secure protocol.  For secure communication, the HTTP Secure (HTTPS) is used for accessing or posting web server information.
  • 28. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy FTP (File Transfer Protocol) • FTP was developed to allow for file transfers between a client and a server. • Used to push and pull files from a server running the FTP daemon (FTPd). • FTP requires two connections: 1. Control Connection: - For commands and replies. - Port 21. 2. Data Connection: - For the actual file transfer. - Port 20.
  • 29. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy – Mail User agent (MUA) “Mail Client” • Allows messages to be sent and places received messages into the client's mailbox. • GUI user agents: Outlook, Eudora, Messenger – Mail servers: Stores user mail boxes, communicates with local user agents and other mail servers. – SMTP: allows you to send e-mail from either a client or a server. – POP: allows you to receive e-mail messages from an e-mail server , (Mail access protocol) SMTP – POP3
  • 30. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy The e-mail server operates two separate processes:  Mail Transfer Agent (MTA)  Mail Delivery Agent (MDA) MTA: is used to forward e-mail either to another MTA or to a MDA. MTA uses SMTP to route email between servers. SMTP – POP3
  • 31. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy MDA: governs transfer of email from mail servers to clients. SMTP: an outbound e-mail delivery protocol. POP/POP3: an inbound e-mail delivery protocol. SMTP – POP3
  • 32. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy SMB: is a client/server file sharing protocol. Developed by IBM to describe the structure of shared network resources, such as directories, files, printers, and serial ports. Microsoft windows and Apple Macintosh operating systems support resource sharing using the SMB protocol. SMB Protocol
  • 33. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Peers (hosts) act as both clients and servers. • The actual file transfer usually rely on HTTP services. • No centralized file server. • Many client applications are available for accessing the Gnutella network, including: BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX P2P File Sharing and Gnutella Protocol The Gnutella protocol defines five different packet types: 1. Ping: for device discovery 2. Pong: as a reply to a ping 3. Query: for file location 4. query hit: as a reply to a query 5. Push: as a download request
  • 34. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy