SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Instructor Materials
Chapter 10: Application Layer
CCNA Routing and Switching
Introduction to Networks v6.0
3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 10: Application
Layer
Introduction to Networks 6.0 Planning
Guide
Chapter 10: Application Layer
Curriculum Title
Introduction to Networks v6.0
13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 10.1 Application Layer Protocols
• Explain the operation of the application layer in providing support to end-user applications.
• Explain how the functions of the application layer, session layer, and presentation layer work together
to provide network services to end user applications
• Explain how common application layer protocols interact with end user applications.
 10.2 Well-Known Application Protocols and Services
• Explain how well-known TCP/IP application layer protocols operate.
• Explain how web and email protocols operate.
• Explain how DNS and DHCP operate.
• Explain how file transfer protocols operate.
Chapter 10 - Sections & Objectives
14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.1 Application Layer
Protocols
15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Sessio
Application Layer
 Application Layer:
• Closest to the end user.
• Used to exchange data between
programs running on the source
and destination hosts.
16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Session
Presentation and Session Layer
 Presentation Layer function:
• Formatting data at the source
device into a compatible form for
the receiving device.
• Compressing data.
• Encrypting data.
 Session Layer Function
• Create and maintain dialogs
between source and destination
applications.
17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Session
TCP/IP Application Layer Protocols
• Domain Name Server (DNS) TCP,UDP 53 - Translates
domain names, such as cisco.com, into IP addresses.
• (BOOTP) – Bootstrap Protocol - BOOTP is being
superseded by DHCP.
• Dynamic Host Configuration Protocol (DHCP) UDP client
68, server 67 – Dynamically assigns IP addresses to
client stations at start-up.
• Simple Mail Transport Protocol (SMTP) TCP 25 -
Enables clients to send email to a mail server.
• Post Office Protocol (POP) TCP 110 -
Enables clients to retrieve email from a mail
server.
• Internet Message Access Protocol (IMAP)
TCP 143 - Enables clients to retrieve email
from a mail server, maintains email on server.
• File Transfer Protocol (FTP) TCP 20 and 21 -
Reliable, connection-oriented, and
acknowledged file delivery protocol.
• Trivial File Transfer Protocol (TFTP) UDP 69 –
simple connectionless file transfer protocol.
• Hypertext Transfer Protocol (HTTP) TCP 80,
8080 - Set of rules for exchanging text, graphic
images, etc. on the World Wide Web.
• Hypertext Transfer Protocol Secure (HTTPS)
TCP, UDP 443 – Uses encryption and
authentication to secure communication.
18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Client-Server Model
 Client and server processes are
considered to be in the
application layer.
 Application layer protocols
describe the format of the
requests and responses between
clients and servers.
 Example of a client-server
network is using an ISP’s email
service to send, receive and
store email.
19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Peer-to-Peer Networks
 Data is accessed from a peer
device without the use of a
dedicated server.
 Each device (known as a peer)
can function as both a server and
a client.
20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Peer-to-Peer Applications
 A P2P application allows a
device to act as both a client and
a server within the same
communication.
 P2P applications require that
each end device provide a user
interface and run a background
service.
21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Common P2P Applications
 Common P2P networks include:
• G2
• Bitcoin
• BitTorrent
• eDonkey
 Some P2P applications are based on
the Gnutella protocol, where each
user shares whole files with other
users.
 Many P2P applications allow users to
share pieces of many files with each
other at the same time –this is
BitTorrent technology.
22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Researching Peer-to-Peer File Sharing
23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.2 Well-Known Application
Layer Protocols and Services
24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Hypertext Transfer Protocol and Hypertext Markup Language
 When a web address or uniform
resource locator (URL) is typed into a
web browser, the web browser
establishes a connection to the web
service running on the server, using the
HTTP protocol.
25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
HTTP and HTTPS
 HTTP is a request/response protocol.
 Three common HTTP message types
are:
• GET - A client request for data.
• POST - Uploads data files to the web
server.
• PUT - Uploads resources or content to
the web server.
 HTTP Secure (HTTPS) protocol uses
encryption and authentication to
secure data.
26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Email Protocols
 Email clients communicate with mail
servers to send and receive email.
 Mail servers communicate with other
mail servers to transport messages
from one domain to another.
 Three protocols for email:
• Simple Mail Transfer Protocol (SMTP)
to send email.
• Post Office Protocol (POP) to retrieve
email.
• Internet Message Access Protocol
(IMAP) to retrieve email.
27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
SMTP Operation
 SMTP is used to send email
28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
POP Operation
 POP is used to retrieve
email from a mail server.
 Email is downloaded from
the server to the client and
then deleted on the server.
29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
IMAP Operation
 IMAP is used to retrieve
mail from a mail server.
 Copies of messages are
downloaded from the
server to the client and the
original messages are
stored on the server.
30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Packet Tracer – Web and Email
31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Domain Name Service
 Domain names convert the
numeric address into a
simple, recognizable name.
 The DNS protocol defines
an automated service that
matches resource names
with the required numeric
network address.
32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DNS Message Format
 When a client makes a query, the
server’s DNS process first looks at
its own records to resolve the name.
 If unable to resolve, it contacts other
servers to resolve the name.
 The server temporarily stores the
numbered address in the event that
the same name is requested again.
 The ipconfig /displaydns
command displays all of the cached
DNS entries on a Windows PC.
33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DNS Hierarchy
34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
The nslookup Command
 Nslookup - a utility that allows a
user to manually query the name
servers to resolve a given host.
• Can also be used to troubleshoot
name resolution issues and to verify
the current status of the name servers.
35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Dynamic Host Configuration Protocol
 The Dynamic Host Configuration
Protocol (DHCP) for IPv4 automates the
assignment of IPv4 addresses, subnet
masks, gateways, and other parameters.
 DHCP-distributed addresses are leased
for a set period of time, then returned to
pool for reuse.
 DHCP is usually employed for end user
devices. Static addressing is used for
network devices, such as gateways,
switches, servers, and printers.
 DHCPv6 (DHCP for IPv6) provides
similar services for IPv6 clients.
36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DHCP Operation
37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Packet Tracer – DHCP and DNS Servers
38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Lab – Observing DNS Resolution
39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
File Transfer Protocol
 FTP requires two connections between
the client and the server, one for
commands and replies, the other for the
actual file transfer:
• The client establishes the first connection to
the server for control traffic using TCP port
21.
• The client establishes the second
connection to the server for the actual data
transfer using TCP port 20.
40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Server Message Block
 The Server Message Block (SMB) is
a client/server file sharing protocol:
• SMB file-sharing and print services
have become the mainstay of
Microsoft networking.
• Clients establish a long-term
connection to servers and can access
the resources on the server as if the
resource is local to the client host.
41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Packet Tracer - FTP
42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Lab – Exploring FTP
43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.3 Summary
44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Explore a Network
45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Multiuser - Tutorial
46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer Multiuser - Implement Services
47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Chapter 10: Application Layer
 Explain the operation of the application layer in providing support to end-
user applications.
 Explain how well-known TCP/IP application layer protocols operate.
CCNA v6.0 ITN - Chapter 10

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationAmir Jafari
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
ITN_Module_2.pptx
ITN_Module_2.pptxITN_Module_2.pptx
ITN_Module_2.pptxAshok R
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)newbie2019
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassSagarR24
 

Was ist angesagt? (20)

CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 3
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
ITN_Module_2.pptx
ITN_Module_2.pptxITN_Module_2.pptx
ITN_Module_2.pptx
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 

Ähnlich wie CCNA v6.0 ITN - Chapter 10

Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10newbie2019
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptxGeorgeThoreJr
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)Nitesh Singh
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 

Ähnlich wie CCNA v6.0 ITN - Chapter 10 (20)

Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
 
Ch10
Ch10Ch10
Ch10
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptx
 
Chapter 6r
Chapter 6rChapter 6r
Chapter 6r
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 

Mehr von Irsandi Hasan

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 

Mehr von Irsandi Hasan (18)

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 

Kürzlich hochgeladen

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 

Kürzlich hochgeladen (20)

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 

CCNA v6.0 ITN - Chapter 10

  • 1. Instructor Materials Chapter 10: Application Layer CCNA Routing and Switching Introduction to Networks v6.0
  • 2. 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 10: Application Layer Introduction to Networks 6.0 Planning Guide
  • 3. Chapter 10: Application Layer Curriculum Title Introduction to Networks v6.0
  • 4. 13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  10.1 Application Layer Protocols • Explain the operation of the application layer in providing support to end-user applications. • Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications • Explain how common application layer protocols interact with end user applications.  10.2 Well-Known Application Protocols and Services • Explain how well-known TCP/IP application layer protocols operate. • Explain how web and email protocols operate. • Explain how DNS and DHCP operate. • Explain how file transfer protocols operate. Chapter 10 - Sections & Objectives
  • 5. 14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.1 Application Layer Protocols
  • 6. 15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Sessio Application Layer  Application Layer: • Closest to the end user. • Used to exchange data between programs running on the source and destination hosts.
  • 7. 16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Session Presentation and Session Layer  Presentation Layer function: • Formatting data at the source device into a compatible form for the receiving device. • Compressing data. • Encrypting data.  Session Layer Function • Create and maintain dialogs between source and destination applications.
  • 8. 17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Session TCP/IP Application Layer Protocols • Domain Name Server (DNS) TCP,UDP 53 - Translates domain names, such as cisco.com, into IP addresses. • (BOOTP) – Bootstrap Protocol - BOOTP is being superseded by DHCP. • Dynamic Host Configuration Protocol (DHCP) UDP client 68, server 67 – Dynamically assigns IP addresses to client stations at start-up. • Simple Mail Transport Protocol (SMTP) TCP 25 - Enables clients to send email to a mail server. • Post Office Protocol (POP) TCP 110 - Enables clients to retrieve email from a mail server. • Internet Message Access Protocol (IMAP) TCP 143 - Enables clients to retrieve email from a mail server, maintains email on server. • File Transfer Protocol (FTP) TCP 20 and 21 - Reliable, connection-oriented, and acknowledged file delivery protocol. • Trivial File Transfer Protocol (TFTP) UDP 69 – simple connectionless file transfer protocol. • Hypertext Transfer Protocol (HTTP) TCP 80, 8080 - Set of rules for exchanging text, graphic images, etc. on the World Wide Web. • Hypertext Transfer Protocol Secure (HTTPS) TCP, UDP 443 – Uses encryption and authentication to secure communication.
  • 9. 18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Client-Server Model  Client and server processes are considered to be in the application layer.  Application layer protocols describe the format of the requests and responses between clients and servers.  Example of a client-server network is using an ISP’s email service to send, receive and store email.
  • 10. 19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Peer-to-Peer Networks  Data is accessed from a peer device without the use of a dedicated server.  Each device (known as a peer) can function as both a server and a client.
  • 11. 20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Peer-to-Peer Applications  A P2P application allows a device to act as both a client and a server within the same communication.  P2P applications require that each end device provide a user interface and run a background service.
  • 12. 21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Common P2P Applications  Common P2P networks include: • G2 • Bitcoin • BitTorrent • eDonkey  Some P2P applications are based on the Gnutella protocol, where each user shares whole files with other users.  Many P2P applications allow users to share pieces of many files with each other at the same time –this is BitTorrent technology.
  • 13. 22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Researching Peer-to-Peer File Sharing
  • 14. 23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.2 Well-Known Application Layer Protocols and Services
  • 15. 24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Hypertext Transfer Protocol and Hypertext Markup Language  When a web address or uniform resource locator (URL) is typed into a web browser, the web browser establishes a connection to the web service running on the server, using the HTTP protocol.
  • 16. 25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols HTTP and HTTPS  HTTP is a request/response protocol.  Three common HTTP message types are: • GET - A client request for data. • POST - Uploads data files to the web server. • PUT - Uploads resources or content to the web server.  HTTP Secure (HTTPS) protocol uses encryption and authentication to secure data.
  • 17. 26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Email Protocols  Email clients communicate with mail servers to send and receive email.  Mail servers communicate with other mail servers to transport messages from one domain to another.  Three protocols for email: • Simple Mail Transfer Protocol (SMTP) to send email. • Post Office Protocol (POP) to retrieve email. • Internet Message Access Protocol (IMAP) to retrieve email.
  • 18. 27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols SMTP Operation  SMTP is used to send email
  • 19. 28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols POP Operation  POP is used to retrieve email from a mail server.  Email is downloaded from the server to the client and then deleted on the server.
  • 20. 29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols IMAP Operation  IMAP is used to retrieve mail from a mail server.  Copies of messages are downloaded from the server to the client and the original messages are stored on the server.
  • 21. 30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Packet Tracer – Web and Email
  • 22. 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Domain Name Service  Domain names convert the numeric address into a simple, recognizable name.  The DNS protocol defines an automated service that matches resource names with the required numeric network address.
  • 23. 32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DNS Message Format  When a client makes a query, the server’s DNS process first looks at its own records to resolve the name.  If unable to resolve, it contacts other servers to resolve the name.  The server temporarily stores the numbered address in the event that the same name is requested again.  The ipconfig /displaydns command displays all of the cached DNS entries on a Windows PC.
  • 24. 33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DNS Hierarchy
  • 25. 34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services The nslookup Command  Nslookup - a utility that allows a user to manually query the name servers to resolve a given host. • Can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.
  • 26. 35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Dynamic Host Configuration Protocol  The Dynamic Host Configuration Protocol (DHCP) for IPv4 automates the assignment of IPv4 addresses, subnet masks, gateways, and other parameters.  DHCP-distributed addresses are leased for a set period of time, then returned to pool for reuse.  DHCP is usually employed for end user devices. Static addressing is used for network devices, such as gateways, switches, servers, and printers.  DHCPv6 (DHCP for IPv6) provides similar services for IPv6 clients.
  • 27. 36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DHCP Operation
  • 28. 37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Packet Tracer – DHCP and DNS Servers
  • 29. 38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Lab – Observing DNS Resolution
  • 30. 39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services File Transfer Protocol  FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer: • The client establishes the first connection to the server for control traffic using TCP port 21. • The client establishes the second connection to the server for the actual data transfer using TCP port 20.
  • 31. 40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Server Message Block  The Server Message Block (SMB) is a client/server file sharing protocol: • SMB file-sharing and print services have become the mainstay of Microsoft networking. • Clients establish a long-term connection to servers and can access the resources on the server as if the resource is local to the client host.
  • 32. 41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Packet Tracer - FTP
  • 33. 42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Lab – Exploring FTP
  • 34. 43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.3 Summary
  • 35. 44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Explore a Network
  • 36. 45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Multiuser - Tutorial
  • 37. 46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer Multiuser - Implement Services
  • 38. 47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Chapter 10: Application Layer  Explain the operation of the application layer in providing support to end- user applications.  Explain how well-known TCP/IP application layer protocols operate.