Business Data Communications & Networking

Slides:



Advertisements
Similar presentations
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. 8-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
The Application Layer Chapter 7. Where are we now?
© Copyright 2011 John Wiley & Sons, Inc.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
1 Chapter 2. Application Layers Networking in the Internet Age by Alan Dennis, 1 st Edition Copyright © 2002 John Wiley & Sons, Inc.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Remote mailbox access gateway Software lab project.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Copyright © 2015 John, Wiley & Sons, Inc. All rights reserved FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
Business Data Communications & Networking
1 Chapter 2. Application Layer Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.
Chapter 30 Electronic Mail Representation & Transfer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
Copyright 2005 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Copyright 2011 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Electronic Mail (SMTP, POP, IMAP, MIME)
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
1 Chapter 2. Network Applications Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.
Copyright 2007 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 9th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Some Data Comm. Standards
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Simple Mail Transfer Protocol (SMTP)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
Copyright 2010 John Wiley & Sons, Inc2 - 1 Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Dibyajit Computer Security Hacking dibyajit
Networking Applications
Remote Logging, Electronic Mail, and File Transfer
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Principles of Network Applications
CHAPTER 2 Application Layer.
Chapter 10: Application Layer
Web Development & Design Chapter 1, Sections 4, 5 & 6
Internet Protocols IP: Internet Protocol
Remote Logging, Electronic Mail,
Chapter 7 Network Applications
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Business Data Communications & Networking Chapter 2 Application Layer

Outline Application Architectures The Web Email Other Application-Layer Protocols Implications for Management

Application Layer Application Transport Network Data Link Physical Internet Model Layer 5 in the Internet model The software that enables users to interact with the network and accomplish tasks Application Transport Network Data Link Physical

Application Architecture The way the functions of the application layer are spread out across the client and server Four components of applications: Presentation logic Application logic Data access logic Data Storage

Host-Based Architecture Server contains all components (“server-based”) Common in the 1960s with mainframes and terminals CLIENT SERVER Presentation Logic Application Logic Data Access Logic Data Storage

Host-Based Architecture Advantages Very simple Single point of control Disadvantages Host (server) can become a bottleneck Upgrades typically expensive

Client-Based Architecture Client contains presentation, application, and data access logic Most common in the 1980s CLIENT SERVER Presentation Logic Application Logic Data Access Logic Data Storage

Client-Based Architecture Advantages Hardware and applications less expensive Simple architecture Disadvantages Data must travel back and forth between server and client

Client-Server Architecture Most common architecture today OR CLIENT SERVER Presentation Logic Application Logic Application Logic Data Access Logic Data Storage

Client-Server Architecture Thin clients are easier to manage, thick clients have more functionality Thick-Client Architecture Thin-Client Architecture CLIENT SERVER CLIENT SERVER Presentation Logic Application Logic Data Access Logic Data Storage Presentation Logic Application Logic Data Access Logic Data Storage

Client-Server Architecture Advantages More efficient because of distributed processing Allows hardware/software from different vendors to be used together Less bandwidth required Disadvantages May be challenges in configuring hardware/software from different vendors to work together In many cases, middleware is required

Client-Server Architecture Middleware is software acts as an intermediary by “sitting between” client and server applications Provides a standard way of translating between software from different vendors Manages message transfers Insulates network changes from the clients (e.g., adding a new server) Client Applications Middleware Server Applications

Client-Server Architecture Example of architecture three-tier two-tier n-tier Web SERVER Application SERVER Application SERVER Database SERVER Database SERVER CLIENT Presentation Logic SERVER Application Logic Data Access Logic Data Storage Data Access Logic Data Storage Application Logic Data Access Logic Data Storage

Tiered Client-Server Architecture Advantages Load balancing More scalable Disadvantages Each tier increases network load More complex and difficult to develop applications

Peer-to-Peer Architecture An older architecture that became popular again with Napster, BitTorrent, etc. All devices can act as client and server CLIENT/SERVER CLIENT/SERVER Presentation Logic Application Logic Data Access Logic Data Storage Presentation Logic Application Logic Data Access Logic Data Storage

Peer-to-Peer Architecture Advantages Resilient to failure Data can be stored anywhere on network Distributes bandwidth requirements Disadvantages Finding the stored data Security

Cloud Computing Cloud Computing is the general term for enabling access to computing services over the network (most commonly the Internet) Models of cloud computing define who manages each application function and associated hardware/software

Cloud Computing Cloud Computing Models Software as a Service (SaaS) All application components and associated hardware/software outsourced Based on multitenancy e.g. Salesforce.com Platform as a Service (PaaS) Application logic and data are managed internally e.g., Microsoft Azure Infrastructure as a Service (IaaS) All hardware is outsourced

Cloud Computing X Traditional Thin-Client Client-Server Infrastructure as a Service (IaaS) Platform as a Service (Paas) Software as a Service (SaaS) Internal Outsourced Application Logic X Data Storage Data Access Logic Operating System Virtualization Software Server Hardware Storage Hardware Network Hardware

Criteria for Choosing Architecture Infrastructure Cost of servers, clients, and circuits Reliability Development Costs Software; cheaper on host-based architectures Scalability Ability to increase (or decrease) in computing capacity as network demand changes Easier in client-server architectures

Client computer with Web browser software The Web Hypertext Transfer Protocol (HTTP) HTTP Request and Response Client computer with Web browser software HTTP Response Web Server HTTP Request

The Web HTTP Request

The Web HTTP Response

Email Mail Transfer Agent (MTA) Formal name for mail server software e.g., Sendmail, Postfix, Mail User Agent (MUA) Formal name for mail client software e.g., Outlook, Apple Mail, Thunderbird Simple Mail Transfer Protocol (SMTP) Protocol used to send a message to a MTA Originally only handled text files Internet Message Access Protocol (IMAP) or Post Office Protocol (POP) Protocols used by a MUA to retrieve messages from an MTA American Standard Code for Information Interchange (ASCII) A standard for encoding text characters (a-z, A-Z, 0-9, a few symbols)

Email

Email How a message is sent (2-tier, thick client) Sending Client → Sender’s Mail Server (SMTP) Sender’s Mail Server → Receiver’s Mail Server (SMTP) Message waits on Receiver’s Mail Server in “mailbox” Receiving Client → Receiver’s Mail Server (IMAP or POP) Receiver’s Mail Server → Receiving Client (IMAP or POP)

Email

Email How a message is sent via webmail (3-tier, thin client) Sending Client → Sender’s Web Server (HTTP) Sender’s Web Server → Sender’s Mail Server (SMTP) Sender’s Mail Server → Receiver’s Mail Server (SMTP) Mail waits on Receiver’s Mail Server in “mailbox” Receiving Client → Receiver’s Web Server (HTTP) Receiver’s Web Server → Receiver’s Mail Server (IMAP or POP) Receiver’s Mail Server → Receiver’s Web Server (IMAP or POP) Receiver’s Web Server → Receiving Client (HTTP)

Email Header Body SMTP Message Format RFC 822: Standard for text message format Header lines Contain information about the message such as To, From, and Subject Body section Contains the “content of the message Begins with the “DATA” keyword Only uses ASCII characters Header Body

Email Inside an SMTP packet Header: source, destination, date, subject, etc. Body: keyword “DATA”, then email message

Email SMTP is a simple protocol to send plain text Not designed to send images or attachments Multipurpose Internet Mail Extension (MIME) A standard to extend support for attachments and non-ASCII characters in email Used by sender to convert (encode) any non-ASCII content into ASCII Receivers then convert (decode) the ASCII back to its original format

Other Application-Layer Protocols File Transfer Protocol (FTP) - for moving files between clients and servers Telnet, Secure Shell (SSH) - for executing commands on a remote system Internet Relay Chat (IRC), Extensible Messaging and Presence Protocol (XMPP) - for real-time text chat (instant messaging) Domain Name System (DNS) - for mapping domain names to IP addresses

Instant Messaging

Video Conferencing

Implications for Management Primary purpose of networks is to provide environment for applications The number and types of applications on the network is dramatically increasing