Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,

Slides:



Advertisements
Similar presentations
Application Layer: functionality and Protocols
Advertisements

Introduction to Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Introduction to Networks.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Jaringan Komputer Dasar
Chapter 3 Application Layer Functionality and Protocols
2: Application Layer1 FTP, SMTP and DNS. 2: Application Layer2 FTP: separate control, data connections r FTP client contacts FTP server at port 21, specifying.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Electronic Mail and SMTP
Chapter 2: Application layer  2.1 Web, HTTP and HTML (We will continue…)  2.2 FTP  2.3 SMTP 9/22/2009 Lecture 7, MAT 279, Fall
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
CCNA Exploration Network Fundamentals
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
File Transfer Protocol (FTP)
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
Data Communications and Networks Chapter 5 – Network Services DNS, DHCP, FTP and SMTP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Chapter 10: Application Layer
Dibyajit Computer Security Hacking dibyajit
Application Layer Functionality and Protocols
Remote Logging, Electronic Mail, and File Transfer
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 10: Application Layer
Unit 28 Website Production
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 10: Application Layer
Chapter 2: Application layer
Remote Logging, Electronic Mail,
Applications Layer Functionality & Protocols
Chapter 7 Network Applications
Chapter 2 Application Layer
Computer Networks Protocols
Data Communications and Networks
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor, Ontario for their slides. Chapter 3 CCNA Exploration 1 Part II

SMTP/POP/IMAP Protocols Services Simple Mail Transfer Protocol Post Office Protocol Internet Message Access Protocol

Services and SMTP/POP Protocols  Revolutionized how people communicate. 3

2: Application Layer 4 Electronic Mail Three major components:  Mail User agents  Mail servers MDA (Mail Delivery Agent) is a computer software component that is responsible for the delivery of messages to a local recipient's mailbox.) MTA (Mail Transfer Agent) process is used to forward )  Protocol: SMTP mail server user agent user agent user agent mail server user agent user agent mail server user agent SMTP user mailbox outgoing message queue 4

MUA-Mail User Agent lso known as an client.  Mail User Agent (MUA) also known as an client. ● Composing, editing, reading mail messages ● E.g., Eudora, Outlook, Mozilla Thunderbird ● Outgoing, incoming messages stored on server Receives using POP3 or IMAP Sends using SMTP 5

2: Application Layer 6 Electronic Mail: mail servers Mail Servers  mailbox contains incoming messages for user  message queue of outgoing (to be sent) mail messages  SMTP protocol between mail servers to send messages client: sending mail server “server”: receiving mail server PUSH Protocol mail server user agent user agent user agent mail server user agent user agent mail server user agent SMTP 6

Server Processes Client sends message to MTA using SMTP Is recipient in my list? No……Forward to another server. Is recipient in my list? Yes……Place in recipient’s mailbox. Client retrieves message using POP3 or IMAP 7

Scenario: Naz sends an message to Arif 1) Naz uses UA to compose message and “ to ” 2) Naz ’ s UA sends message to her mail server; message placed in message queue 3) Client side of SMTP opens TCP connection with Arif ’ s mail server 4) SMTP client sends Naz ’ s message over the TCP connection 5) Arif ’ s mail server places the message in Arif ’ s mailbox using POP. 6) Arif invokes his user agent to read message user agent mail server mail server user agent

2: Application Layer 9 Mail access protocols  SMTP: delivery/storage to receiver’s server  Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939]  authorization (agent server) and download IMAP: Internet Mail Access Protocol [RFC 1730]  more features (more complex)  manipulation of stored msgs on server HTTP: gmail, Hotmail, Yahoo! Mail, etc. user agent sender’s mail server user agent SMTP access protocol receiver’s mail server 9

FTP File Transfer Protocol

FTP: the file transfer protocol  transfer files between a client and a server.  client/server model  ftp: RFC 959  Requires two connections between the client and the server: one for commands and replies, TCP port 21 the other for the actual file transfer,TCP port 20 file transfer FTP server FTP user interface FTP client local file system remote file system user at host 11

FTP Client Software 12

File Transfer Protocol (FTP) 13

File Transfer Protocol (FTP) Client initiates a TCP control connection on Port 21. Username and password…. 21 For each file transferred, TCP opens and closes a Data connection on Port

DHCP Dynamic Host Configuration Protocol

DHCP  Client /Server  DHCP service enables devices on a network automatically to obtain IP addresses and other information from a DHCP server. 16

DHCP  DHCP servers can be on a LAN, on a router or at an ISP.  The DHCP server maintains a pool of IP addresses and leases an address to any DHCP-enabled client when the client is powered on. 17

DHCP Operation  DHCP is a four step process. 1. Client broadcasts a DHCP Discover frame to find a DHCP server. There may be more than one available. 18

2. A DHCP server responds with a DHCP Offer frame containing a lease time, an IP Address, Subnet Mask, and addresses for a Default Gateway and DNS Server. DHCP Operation 19

3. The client responds by broadcasting a DHCP Request that identifies the server and the lease offer it is accepting. DHCP Operation 20

4. If the offer is still valid, the server returns a DHCP Acknowledgement and records that information as used. If it is no longer valid, a DHCP Negative Acknowledgement is sent and the process begins again. DHCP Operation 21

DORA DHCP Operation 22

DHCP  DHCP can pose a security risk because any device connected to the network can receive an address….  This risk makes physical security an important factor when determining whether to use dynamic or manual addressing.  Dynamic and static addressing both have their places in network designs. 23

DHCP  Dynamic Addressing: Used for general purpose hosts such as end user devices.  Static Addressing: Used for network devices such as gateways, switches, servers and printers. 24

P2P Peer to Peer

P2P Applications  Roughly 60% of all upstream traffic and 25% of all downstream traffic on an average day can be attributed to P2P applications in Asia Pacific in  Source :Article from TorrentFreak 26

2: Application Layer 27 Pure P2P architecture  No always-on server  Peers (hosts) act as both clients and servers  Most popular P2P protocol now is BitTorrent. peer-peer 27

P2P Applications in general  P2P software on your computer sends out a request for the file you want to download.  To locate the file, the software queries other computers.  When the software finds a computer that has the file the download begins.  Others using the P2P software can obtain files they want from your computer's hard drive. 28

Telnet

Telnet Services and Protocols  Once networks were available, people needed a way to remotely access the computer systems. 30

Telnet Services and Protocol  Allows a user to remotely access another device (host, router, switch).  A connection using Telnet is called a Virtual Terminal (VTY) session or connection. 31

Telnet Services and Protocol  Telnet uses software to create a virtual device that offers the same features as a terminal session command line interface (CLI).  Telnet Clients: Putty, Teraterm, HyperTerminal 32

Telnet Services and Protocol  Telnet supports user authentication but does not encrypt data (clear text).  Secure Shell (SSH) protocol offers a secure method for server access. ● Stronger authentication, encrypts data 33

Telnet Example 34