SlideShare a Scribd company logo
1 of 34
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Network Fundamentals
Last Update: 12/6/2010
Abdekhalik Elsaid Mosa
abdu.elsaid@yahoo.com
http://abdelkhalik.staff.scuegypt.edu.eg/
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• OSI: is a layered, abstract representation created as a guideline
for network protocol design.
• Application Layer, provides human interface to the network.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• Application Layer, functions:
Provides the interface between the applications and network.
• Presentation Layer functions:
Handles the conversion of data between different formats.
 Encoding and decoding.
 Encryption and decryption.
 Compression and decompression.
• Session Layer functions:
Maintains dialogs between source and destination applications.
 Create session
 Manage and maintain session
 Terminate session
Most applications, like web browsers
Include functionality of the OSI
layers 5, 6 and 7.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer Software
• The 2 forms of S/W programs that provide access to the network.
1.Network-Aware applications:
are able to communicate directly
with the protocol stack.
Ex: E-mail clients, and web browser
2.Application layer services:
are the programs that interface
with the network and prepare the
data for transfer.
Ex: network print spooling
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
User Applications, Services, and Protocols
• Applications: Provide the human interface.
• Services: Establish an interface to the network.
• Protocols: Are rules and formats that govern how data is treated.
• The (applications,
services, and protocols)
may be used by a single
exe. Program.
Ex: Telnet, FTP
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Servers
• Servers usually are repositories of data.
• The server runs a service, sometimes called a server daemon.
• Daemons run in the background and are not under an end user's
direct control.
• Daemons are described as "listening"
for a request from a client.
• When a daemon "hears"
a request from a client:
It exchanges appropriate
messages with the client,
and then sends the
requested data to the client.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Client-Server Model
• Client: the device requesting Information.
• Server: the device which responds to the request.
• Centralized Administration.
• Security is easier to enforce.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer (P2P) Networking and Applications
• Peer-to-peer networking involves two distinct forms:
1. Peer-to-peer network design
2. Peer-to-peer applications.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Network Design
• Two or more computers are connected via a network and can
share resources without having a dedicated server.
• End device (peer) can function as either a server or a client.
• Decentralized Administration.
• Security is difficult to enforce.
• Used in small home networks
for file sharing and games.
• One computer might
assume the role of
server for one transaction
while simultaneously serving as a client for another.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Applications
• P2P applications allows a device to act as both a client and a
server within the same communication.
• Every client is a server and every server a client.
• Peer-to-peer applications can be used on peer-to-peer
networks, client/server networks, and across the Internet.
• Some P2P applications use a hybrid system.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application layer Protocols and Port numbers
• The Transport layer uses port number addressing .
• Port numbers identify applications and Application layer services.
• Server programs generally use predefined port numbers that are
commonly known by clients.
• Examples:
Telnet - TCP Port 23DNS - TCP/UDP Port 53
DHCP - UDP Port 67HTTP - TCP Port 80
FTP - TCP Ports 20 and 21SMTP - TCP Port 25
POP - UDP Port 110
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Domain Name System (DNS)
• Devices are labeled with numeric IP addresses.
• Domain Names were created to convert the numeric address into
a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com
• DNS client is sometimes called DNS Resolver.
• A DNS Server provides name resolution using the name daemon.
• The DNS server stores different types of resource records (RRs)
used to resolve names.
• These records contain the
name, address, and others.
nslookup
• Displays default DNS server for
your host.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Servers Hierarchy
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Name Resolution
Step 1:
• The DNS resolver sends a
recursive query to its Local
DNS server.
• Requests IP address for "www.example.com".
• The Local DNS server is responsible for resolving the name.
– Cannot refer the DNS client to another DNS server.
1
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 2:
• Local DNS Server forwards
the query to a
Root DNS server.
Step 3:
• Root DNS server
Makes note of .com suffix
Returns a list of IP addresses for TLD Servers responsible for
.com.
DNS Name Resolution
1
2
2
3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Root DNS Servers: There are
13 Root DNS servers (labeled
A through M)
• TLD Servers
– Responsible for domains
such as .com, edu, org,
.net, .uk.
– There are redundant
servers throughout the
world.
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 4:
• The local DNS server sends
query for www.example.com
to one of the TLD servers.
Step 5:
• TLD Server
– Makes note of example.com
– Returns IP address for authoritative server example.com
(such as dns.example.com server)
4
4
5
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 6:
• Local DNS server sends
query directly to DNS server
for example.com
Step 7:
• example.com DNS server
responds with its IP address
for www.example.com
6
6
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 8:
• Local DNS server sends the IP
of www.example.com to the
DNS client.
• DNS Caching: When a DNS
server receives a DNS reply ,
it can cache the information
in its local memory.
• ipconfig /displaydns: Displays cashed DNS entries.
• ipconfig /flushdns: Manually deletes entries.
8
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP – Dynamic Host Configuration Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP
• DHCP automates the assignment
of IP address, Subnet mask, Default
gateway, DNS Server
• DHCP servers can be:
–Server on LAN
–Router
–Server at ISP
• DHCP addresses are not
permanently assigned to hosts but
are leased for a period of time
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Telnet
• Allows a user to remotely
access another device.
• A connection using Telnet is
called a Virtual Terminal (VTY)
session.
• Telnet clients (Teraterm
,Hyperterm)
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• The Telnet server runs a service called Telnet daemon.
• Telnet supports user authentication, but does not encrypt data.
• Telnet transfers data as plain text.
• Secure Shell (SSH) protocol offers an alternate and secure
method for server access.
• SSH benefits over Telnet
– Stronger authentication
– Encryption
• As a best practice, network professionals should always use SSH
in place of Telnet, whenever possible.
Telnet and SSH
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP (HyperText Transfer Protocol)
HTTP: developed to publish and retrieve HTML pages, “data
transfer”.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Request Message
Request Line
• GET: Browser/client is requesting an object.
• /~index/: Browser is requesting this object in this directory
(default is index.html).
• HTTP/1.1: Browser implements the HTTP/1.1.
GET /~index/ HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Request line
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Header Lines
• Accept-Language: User prefers this language of the object
• User-Agent: The browser type making the request
• Host: Host on which the object resides
• Connection: Client/browser is telling the server to keep this TCP
connection Open, known as a persistent connection.
GET /~ index / HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Response Message
HTTP/1.1 200 OK
Date: Fri, 22 Feb 2008 16:34:18 GMT
Server: Apache/2.0.52 (Red Hat)
Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT
Content-Length: 15137
Connection: close
Content-Type: text/html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
 Response message:
Status line
Header lines
Entity body
 HTTP is not a secure protocol.
 For secure communication, the HTTP Secure
(HTTPS) is used for accessing or posting web server
information.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
FTP (File Transfer Protocol)
• FTP was developed to allow for file transfers between a client
and a server.
• Used to push and pull files from a server running the FTP
daemon (FTPd).
• FTP requires two connections:
1. Control Connection:
- For commands and replies.
- Port 21.
2. Data Connection:
- For the actual file transfer.
- Port 20.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
– Mail User agent (MUA) “Mail Client”
• Allows messages to be sent and
places received messages into the
client's mailbox.
• GUI user agents: Outlook, Eudora,
Messenger
– Mail servers: Stores user mail boxes,
communicates with local user agents and
other mail servers.
– SMTP: allows you to send e-mail from
either a client or a server.
– POP: allows you to receive e-mail
messages from an e-mail server ,
(Mail access protocol)
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
The e-mail server operates two separate processes:
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)
MTA: is used to forward
e-mail either to another MTA
or to a MDA.
MTA uses SMTP to
route email between
servers.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
MDA: governs transfer of email
from mail servers to clients.
SMTP: an outbound e-mail
delivery protocol.
POP/POP3: an inbound e-mail
delivery protocol.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
SMB: is a client/server file sharing protocol.
Developed by IBM to describe the structure of shared network
resources, such as directories, files, printers, and serial ports.
Microsoft windows and Apple Macintosh operating systems
support resource sharing using the SMB protocol.
SMB Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Peers (hosts) act as both clients and servers.
• The actual file transfer usually rely on HTTP services.
• No centralized file server.
• Many client applications are available for accessing the Gnutella network, including:
BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX
P2P File Sharing and Gnutella Protocol
The Gnutella protocol defines five
different packet types:
1. Ping: for device discovery
2. Pong: as a reply to a ping
3. Query: for file location
4. query hit: as a reply to a query
5. Push: as a download request
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy

More Related Content

What's hot (20)

Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
VoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATIONVoIP Techniques and Challenges PRESENTATION
VoIP Techniques and Challenges PRESENTATION
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
IPv4
IPv4IPv4
IPv4
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Chapter07
Chapter07Chapter07
Chapter07
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
wired lans
wired lanswired lans
wired lans
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
FDDI
FDDIFDDI
FDDI
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
 

Viewers also liked

Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Application Layer
Application LayerApplication Layer
Application Layerrosmida
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAbdelkhalik Mosa
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerAbdelkhalik Mosa
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkAbdelkhalik Mosa
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 

Viewers also liked (20)

Application Layer
Application Layer Application Layer
Application Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programmingdifatta
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process CommunicationAbhishek Sagar
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Abdelkhalik Mosa
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxhishamousl
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumSteven Miller
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxSmithaV19
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Jack Zheng
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols (20)

Chapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).pptChapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).ppt
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Iso model
Iso modelIso model
Iso model
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programming
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming Curriculum
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Web Fendamentals
Web FendamentalsWeb Fendamentals
Web Fendamentals
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Ch10
Ch10Ch10
Ch10
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016
 

More from Abdelkhalik Mosa

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Abdelkhalik Mosa
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)Abdelkhalik Mosa
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Abdelkhalik Mosa
 

More from Abdelkhalik Mosa (11)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
IPv6
IPv6IPv6
IPv6
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

  • 1. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals Last Update: 12/6/2010 Abdekhalik Elsaid Mosa abdu.elsaid@yahoo.com http://abdelkhalik.staff.scuegypt.edu.eg/
  • 2. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • OSI: is a layered, abstract representation created as a guideline for network protocol design. • Application Layer, provides human interface to the network.
  • 3. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • Application Layer, functions: Provides the interface between the applications and network. • Presentation Layer functions: Handles the conversion of data between different formats.  Encoding and decoding.  Encryption and decryption.  Compression and decompression. • Session Layer functions: Maintains dialogs between source and destination applications.  Create session  Manage and maintain session  Terminate session Most applications, like web browsers Include functionality of the OSI layers 5, 6 and 7.
  • 4. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer Software • The 2 forms of S/W programs that provide access to the network. 1.Network-Aware applications: are able to communicate directly with the protocol stack. Ex: E-mail clients, and web browser 2.Application layer services: are the programs that interface with the network and prepare the data for transfer. Ex: network print spooling
  • 5. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy User Applications, Services, and Protocols • Applications: Provide the human interface. • Services: Establish an interface to the network. • Protocols: Are rules and formats that govern how data is treated. • The (applications, services, and protocols) may be used by a single exe. Program. Ex: Telnet, FTP
  • 6. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Servers • Servers usually are repositories of data. • The server runs a service, sometimes called a server daemon. • Daemons run in the background and are not under an end user's direct control. • Daemons are described as "listening" for a request from a client. • When a daemon "hears" a request from a client: It exchanges appropriate messages with the client, and then sends the requested data to the client.
  • 7. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Client-Server Model • Client: the device requesting Information. • Server: the device which responds to the request. • Centralized Administration. • Security is easier to enforce.
  • 8. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer (P2P) Networking and Applications • Peer-to-peer networking involves two distinct forms: 1. Peer-to-peer network design 2. Peer-to-peer applications.
  • 9. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Network Design • Two or more computers are connected via a network and can share resources without having a dedicated server. • End device (peer) can function as either a server or a client. • Decentralized Administration. • Security is difficult to enforce. • Used in small home networks for file sharing and games. • One computer might assume the role of server for one transaction while simultaneously serving as a client for another.
  • 10. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Applications • P2P applications allows a device to act as both a client and a server within the same communication. • Every client is a server and every server a client. • Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and across the Internet. • Some P2P applications use a hybrid system.
  • 11. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application layer Protocols and Port numbers • The Transport layer uses port number addressing . • Port numbers identify applications and Application layer services. • Server programs generally use predefined port numbers that are commonly known by clients. • Examples: Telnet - TCP Port 23DNS - TCP/UDP Port 53 DHCP - UDP Port 67HTTP - TCP Port 80 FTP - TCP Ports 20 and 21SMTP - TCP Port 25 POP - UDP Port 110
  • 12. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Domain Name System (DNS) • Devices are labeled with numeric IP addresses. • Domain Names were created to convert the numeric address into a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com • DNS client is sometimes called DNS Resolver. • A DNS Server provides name resolution using the name daemon. • The DNS server stores different types of resource records (RRs) used to resolve names. • These records contain the name, address, and others. nslookup • Displays default DNS server for your host.
  • 13. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Servers Hierarchy
  • 14. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Name Resolution Step 1: • The DNS resolver sends a recursive query to its Local DNS server. • Requests IP address for "www.example.com". • The Local DNS server is responsible for resolving the name. – Cannot refer the DNS client to another DNS server. 1
  • 15. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 2: • Local DNS Server forwards the query to a Root DNS server. Step 3: • Root DNS server Makes note of .com suffix Returns a list of IP addresses for TLD Servers responsible for .com. DNS Name Resolution 1 2 2 3
  • 16. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Root DNS Servers: There are 13 Root DNS servers (labeled A through M) • TLD Servers – Responsible for domains such as .com, edu, org, .net, .uk. – There are redundant servers throughout the world. DNS Name Resolution
  • 17. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 4: • The local DNS server sends query for www.example.com to one of the TLD servers. Step 5: • TLD Server – Makes note of example.com – Returns IP address for authoritative server example.com (such as dns.example.com server) 4 4 5 DNS Name Resolution
  • 18. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 6: • Local DNS server sends query directly to DNS server for example.com Step 7: • example.com DNS server responds with its IP address for www.example.com 6 6 7 DNS Name Resolution
  • 19. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 8: • Local DNS server sends the IP of www.example.com to the DNS client. • DNS Caching: When a DNS server receives a DNS reply , it can cache the information in its local memory. • ipconfig /displaydns: Displays cashed DNS entries. • ipconfig /flushdns: Manually deletes entries. 8 7 DNS Name Resolution
  • 20. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP – Dynamic Host Configuration Protocol
  • 21. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP • DHCP automates the assignment of IP address, Subnet mask, Default gateway, DNS Server • DHCP servers can be: –Server on LAN –Router –Server at ISP • DHCP addresses are not permanently assigned to hosts but are leased for a period of time
  • 22. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Telnet • Allows a user to remotely access another device. • A connection using Telnet is called a Virtual Terminal (VTY) session. • Telnet clients (Teraterm ,Hyperterm)
  • 23. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • The Telnet server runs a service called Telnet daemon. • Telnet supports user authentication, but does not encrypt data. • Telnet transfers data as plain text. • Secure Shell (SSH) protocol offers an alternate and secure method for server access. • SSH benefits over Telnet – Stronger authentication – Encryption • As a best practice, network professionals should always use SSH in place of Telnet, whenever possible. Telnet and SSH
  • 24. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP (HyperText Transfer Protocol) HTTP: developed to publish and retrieve HTML pages, “data transfer”.
  • 25. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Request Message Request Line • GET: Browser/client is requesting an object. • /~index/: Browser is requesting this object in this directory (default is index.html). • HTTP/1.1: Browser implements the HTTP/1.1. GET /~index/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive Request line
  • 26. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Header Lines • Accept-Language: User prefers this language of the object • User-Agent: The browser type making the request • Host: Host on which the object resides • Connection: Client/browser is telling the server to keep this TCP connection Open, known as a persistent connection. GET /~ index / HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive
  • 27. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Response Message HTTP/1.1 200 OK Date: Fri, 22 Feb 2008 16:34:18 GMT Server: Apache/2.0.52 (Red Hat) Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT Content-Length: 15137 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">  Response message: Status line Header lines Entity body  HTTP is not a secure protocol.  For secure communication, the HTTP Secure (HTTPS) is used for accessing or posting web server information.
  • 28. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy FTP (File Transfer Protocol) • FTP was developed to allow for file transfers between a client and a server. • Used to push and pull files from a server running the FTP daemon (FTPd). • FTP requires two connections: 1. Control Connection: - For commands and replies. - Port 21. 2. Data Connection: - For the actual file transfer. - Port 20.
  • 29. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy – Mail User agent (MUA) “Mail Client” • Allows messages to be sent and places received messages into the client's mailbox. • GUI user agents: Outlook, Eudora, Messenger – Mail servers: Stores user mail boxes, communicates with local user agents and other mail servers. – SMTP: allows you to send e-mail from either a client or a server. – POP: allows you to receive e-mail messages from an e-mail server , (Mail access protocol) SMTP – POP3
  • 30. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy The e-mail server operates two separate processes:  Mail Transfer Agent (MTA)  Mail Delivery Agent (MDA) MTA: is used to forward e-mail either to another MTA or to a MDA. MTA uses SMTP to route email between servers. SMTP – POP3
  • 31. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy MDA: governs transfer of email from mail servers to clients. SMTP: an outbound e-mail delivery protocol. POP/POP3: an inbound e-mail delivery protocol. SMTP – POP3
  • 32. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy SMB: is a client/server file sharing protocol. Developed by IBM to describe the structure of shared network resources, such as directories, files, printers, and serial ports. Microsoft windows and Apple Macintosh operating systems support resource sharing using the SMB protocol. SMB Protocol
  • 33. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Peers (hosts) act as both clients and servers. • The actual file transfer usually rely on HTTP services. • No centralized file server. • Many client applications are available for accessing the Gnutella network, including: BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX P2P File Sharing and Gnutella Protocol The Gnutella protocol defines five different packet types: 1. Ping: for device discovery 2. Pong: as a reply to a ping 3. Query: for file location 4. query hit: as a reply to a query 5. Push: as a download request
  • 34. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy