Internet Applications. Basic procedures involved in visiting a web site 1.Get the IP address of the web server based on the URL that user provides URL:

Slides:



Advertisements
Similar presentations
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Term B10.
Advertisements

1 EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Domain Name System (or Service) (DNS) Computer Networks Computer Networks Spring 2012 Spring 2012.
The Internet Useful Definitions and Concepts About the Internet.
2: Application Layer1 FTP, SMTP and DNS. 2: Application Layer2 FTP: separate control, data connections r FTP client contacts FTP server at port 21, specifying.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Application Layer session 1 TELE3118: Network Technologies Week 12: DNS Some slides have been taken from: r Computer Networking: A Top Down Approach.
1 Application layer r Electronic Mail m SMTP, POP3, IMAP r DNS r P2P file sharing.
Name Resolution and DNS. Domain names and IP addresses r People prefer to use easy-to-remember names instead of IP addresses r Domain names are alphanumeric.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
CS 4396 Computer Networks Lab
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 10 Omar Meqdadi Department of Computer Science and Software Engineering University.
DNS. 2 DNS: Domain Name System DNS services Hostname to IP address translation Host aliasing – Canonical and alias names Mail server aliasing Load distribution.
Human-Computer Interface Course 5. ISPs and Internet connection.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
2: Application Layer1 Some network apps r r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
21-1 Last time □ Finish HTTP □ FTP This time □ SMTP ( ) □ DNS.
Semester 1 CHAPTER 15.
CS 471/571 Domain Name Server Slides from Kurose and Ross.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Review: –Which protocol is used to move messages around in the Internet? –Describe how a message is moved from the sender’s UA to the receiver’s.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
DNS: Domain Name System People: many identifiers: – SSN, name, Passport # Internet hosts, routers: – IP address (32 bit) - used for addressing datagrams.
25.1 Chapter 25 Domain Name System Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
DNS. 2 DNS: Domain Name System DNS services Hostname to IP address translation Host aliasing – Canonical and alias names Mail server aliasing Load distribution.
CS 3830 Day 10 Introduction 1-1. Announcements r Quiz #2 this Friday r Program 2 posted yesterday 2: Application Layer 2.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Lecture 5: Web Continued 2-1. Outline  Network basics:  HTTP protocols  Studies on HTTP performance from different views:  Browser types [NSDI 2014]
FTP, Mail and DNS protocols
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
1 Kyung Hee University Chapter 19 DNS (Domain Name System)
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Transmission Control Protocol (TCP) Internet Protocol (IP)
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Application Layer, 2.5 DNS 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Important r On Friday, could you ask students to please me their groups (one per group) for Project 2 so we can assign IP addresses. I’ll send.
CSEN 404 Application Layer II Amr El Mougy Lamia Al Badrawy.
Spring 2006 CPE : Application Layer_DNS 1 Special Topics in Computer Engineering Application layer: Domain Name System Some of these Slides are.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Application Layer Chapter 3 CCNA Exploration 1.
Last time Finish HTTP FTP.
2: Application Layer 1 Some network apps r r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored.
Internet Applications
Chapter 17 DNS (Domain Name System)
Introduction to Networks
Chapter 19 DNS (Domain Name System)
Session 6 INST 346 Technologies, Infrastructure and Architecture
Instructor Materials Chapter 5 Providing Network Services
Networking for Home and Small Businesses – Chapter 6
Chapter 7: Application layer
Working at a Small-to-Medium Business or ISP – Chapter 7
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 19 DNS (Domain Name System)
CSE 4213: Computer Networks II
FTP, SMTP and DNS 2: Application Layer.
Networking for Home and Small Businesses – Chapter 6
Chapter 7 Network Applications
Computer Networks Protocols
Presentation transcript:

Internet Applications

Basic procedures involved in visiting a web site 1.Get the IP address of the web server based on the URL that user provides URL: uniform resource locator of a resource (e.g., machine) – IP address: a numerical identification of a resource – ( 2.Send requests to the server and receive HTML content Protocols: HTTP (over TCP) 3.Parse the HTML content and display it

Resolve IP Address of URL DNS: domain name system – A hierarchical system to resolve named addresses into IP addresses Root DNS Servers com DNS servers org DNS serversedu DNS servers psu.edu DNS servers mit.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers ist.psu.edu DNS servers cse.psu.edu DNS servers

DNS Servers DNS servers: distributed databases to keep information about URL and IP address pairs.

DNS root servers a. Verisign, Los Angeles CA (5 other sites) b. USC-ISI Marina del Rey, CA l. ICANN Los Angeles, CA (41 other sites) e. NASA Mt View, CA f. Internet Software C. Palo Alto, CA (and 48 other sites) i. Netnod, Stockholm (37 other sites) k. RIPE London (17 other sites) m. WIDE Tokyo (5 other sites) c. Cogent, Herndon, VA (5 other sites) d. U Maryland College Park, MD h. ARL Aberdeen, MD j. Verisign, Dulles VA (69 other sites ) g. US DoD Columbus, OH (5 other sites) 13 root name “servers” worldwide

In-Class Exercise: nslookup nslookup: an application to query DNS – Start "nslookup" Start  Run  cmd Type "nslookup" – Query DNS server Type URL or IP address Tasks – Find out IP address of – Find out IP address(es) of – Are psu.edu and the same server? – What is the IP address of the DNS server? – Change the DNS server and repeat the queries "Server "

Use IP Address Directly – No DNS request involved.

Send Request to Server HTTP (hypertext transfer protocol): – The primary transfer protocol that a browser use to interact with a web server Establish connection, negotiate methods/parameters of data transmission, send/obtain data, close connection – Most URLs contain an explicit protocol reference: – An application layer protocol which is above the TCP/IP protocols HTTP commands are encapsulated into TCP packets.

HTTP Commands GET, HEAD, POST, PUT, etc. These commands are often hidden from users.

Example: HTTP Requests via Telnet Start Command Prompt (Start  Run  cmd) and type telnet Call the HTTP service of the server. Open faculty.ist.psu.edu 80 Send HTTP command to get Zihan’s personal webpage GET /zzhou/Home.html HTTP/1.1 Host: faculty.ist.psu.edu Data received from the server – Anything available through the web service Even images and videos However, Telnet cannot parse non-text data. GET /zzhou/Home_files/psu_blue.png HTTP/1.1 Host: faculty.ist.psu.edu

Telnet A network application with command-line interface – Data is transparent. Password is transferred as text. – Very unsafe. Telnet was the dominant tool to access Unix servers to get . – Unix-based clients. SSH replaces telnet. – Data is encrypted.

A TCPA IP MAC ATCP IP ATCP A !_*#!#$!# IP MAC !_*#!#$!#TCP IP !_*#!#$!#TCP Client: Telnet Client: SSH Intended Server MAC IP ATCP MAC IP ATCP Unintended Server Data is encrypted

SMTP Protocol: SMTP (Simple Mail Transfer Protocol) commands – HELO, MAIL, RCPT, DATA, QUIT, VRFY… Example – Telnet mail.psu.edu 25 HELO zuz22.psu.edu VRFY zuz22

Example: Sending via Gmail using Command Line 1.Type openssl s_client -connect smtp.gmail.com:465 2.Type helo smtp.gmail.com 3.Type auth login and you will receive “334 VXNlcm5hbWU6”, which means “Username:” 4.Using a Base 64 encoder such as this one, encode your user name and enter it. Do the same for your password, which is requested next. If authenticated, you should see: “ Accepted”this one 5.Type mail from: 6.Type rcpt to: 7.Type data, then enter your message 8.To finish entering the message, press ENTER, then press., then press ENTER again 9.Type quit Note: If you want to send via PSU mail server, in step 1 type the following instead: openssl s_client -connect authsmtp.psu.edu:587 -starttls smtp

Other Protocols FTP (File Transfer Protocol) – Was a dominant tool for file transfer. Suffers the same security issues as Telnet. – Replaced with SFTP (Secured FTP). Access Protocol – POP3 Download messages to a local client. – IMAP Keep in server.

After Class Exercise Just for exploration. No need to turn in anything. DNS – Use nslookup to resolve several different URLs. – Check the DNS server names in different places. IST, your dorm, coffee shop, etc. – Figure out which organizations these servers. – Think about what may happen if a DNS is hijacked. HTTP requests via Telnet – You need to find a system that allows “telnet”. – Use it to access a couple of web sites and see what may happen. Sending s via Openssl – Find out how to use openssl to send s through your favorite service provider (hotmail, yahoo, gmail, aol, etc.)

Friday: group research assignment 1 Next Monday: Chapters 5 and 6 – Involving some math. Start earlier.