The University of Adelaide, School of Computer Science 14 January 2019 Computer Networks, 5th Edition Chapter 9 Applications Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer
FIGURE 9.1 Sequence of mail gateways store and forward email messages. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.2 IMAP state transition diagram. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.3 The Firefox web browser. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.4 HTTP 1.0 behavior. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.5 HTTP 1.1 behavior with persistent connections. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.6 SOAP message structure. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.7 A session directory tool displays information extracted from SDP messages. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 9.8 Establishing communication through SIP proxies. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.9 Message flow for a basic SIP session. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.10 Devices in an H.323 network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.11 Differentiated Services applied to a VOIP application. DiffServ queueing is applied only on the upstream link from customer router to ISP. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.12 Admission control using session control protocol. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.13 Co-ordination of SIP signalling and resource reservation. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.14 Names translated into addresses, where the numbers 1 to 5 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.15 Example of a domain hierarchy. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.16 Domain hierarchy partitioned into zones. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.17 Hierarchy of name servers. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.18 Name resolution in practice, where the numbers 1 to 10 show the sequence of steps in the process. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.19 Overlay network layered on top of a physical network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.20 Overlay nodes tunnel through physical nodes. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.21 Alternative multicast trees mapped onto a physical topology. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.22 Multicast tree embedded in an overlay mesh. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.23 The triangle inequality does not necessarily hold in networks. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.24 Example topology of a Gnutella peer-to-peer network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.25 Both nodes and objects map (hash) onto the ID space, where objects are maintained at the nearest node in this space. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.26 Objects are located by routing through the peer-to-peer overlay network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.27 Example routing table at the node with ID 65a 1 f cx. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.28 Adding a node to the network. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.29 Peers in a BitTorrent swarm download from other peers that may not yet have the complete file. Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved
Copyright © 2012, Elsevier Inc. All rights Reserved FIGURE 9.30 Components in a Content Distribution Network (CDN). Chapter 9 Copyright © 2012, Elsevier Inc. All rights Reserved