9/15/2015© 2008 Raymond P. Jefferis IIILect 10 - 1 Application Layer.

Slides:



Advertisements
Similar presentations
Introduction to Networks
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Hypertext Transfer Protocol Kyle Roth Mark Hoover.
Layer 7- Application Layer
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
SNMP Simple Network Management Protocol
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Forensic and Investigative Accounting
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
1 Web Server Administration Chapter 9 Extending the Web Environment.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
FTP (File Transfer Protocol) & Telnet
Internet applications Bill Chu. © Bei-Tseng Chu Aug 2000 Need for Domain Name Service (DNS) Natively, a TCP host is identified by its IP address hosts.
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
Sistem Jaringan dan Komunikasi Data #9. DNS The Internet Directory Service  the Domain Name Service (DNS) provides mapping between host name & IP address.
Simple Mail Transfer Protocol (SMTP)
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
15 Semester 1 JEOPARDY IndirectnetworksupportDNSDNSNetworkApps.NetworkApps.MoreNetworkApps.Misc.Misc
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Version 3.0 Module 11 TCP Application and Transport.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Internet Applications
SNMP n Where did it come from ? –Internet Engineering Task Force »Network Management Area –SNMP V1 –MIB definitions –SNMPV2.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
TCP/IP Transport and Application (Topic 6)
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
TFTP: Trivial file transfer protocol
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 TCP/IP Application Layer.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
Network Management  introduction  Internet SNMP: Simple Network Management Protocol  required reading: section 7.3 in text.
Computer Networks with Internet Technology William Stallings Chapter 04 Modern Applications 4.1 Web Access - HTTP.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Text Overview of SNMP, FTP, Telnet. Text Overview of SNMP.
TCP/IP Services and Applications Chapter 14 Release 16/7/2009.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMPUTER NETWORKS Hwajung Lee. Image Source:
1 Chapter 22 World Wide Web (HTTP) Chapter 22 World Wide Web (HTTP) Mi-Jung Choi Dept. of Computer Science and Engineering
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 2: Application layer
William Stallings Data and Computer Communications
Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 7 Network Applications
Computer Networks Protocols
Presentation transcript:

9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer

9/15/2015© 2008 Raymond P. Jefferis IIILect Application Tasks To supply services to the user –file transfer –World Wide Web browsing –mail –network management –network name services

9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer Protocols FTP/TFTPPort 21/69 TelnetPort 23 HTTPPort 80 SMTPPort 25 SNMPPort 161 DNSPort 53

9/15/2015© 2008 Raymond P. Jefferis IIILect FTP/TFTP FTP (File Transfer Protocol) –uses TCP for transfer of files and data –additional parameters must be supplied –user shielded from file system properties –can be used by terminal or program TFTP (Trivial File Transfer Protocol) –similar to FTP but uses UDP

9/15/2015© 2008 Raymond P. Jefferis IIILect FTP Commands

9/15/2015© 2008 Raymond P. Jefferis IIILect FTP – Login (Two types) Supply server name Supply account (if not “anonymous”) Supply Password (user name if anonymous)

9/15/2015© 2008 Raymond P. Jefferis IIILect FTP - Directory Operations Change Directory (cd) List directory (ls)

9/15/2015© 2008 Raymond P. Jefferis IIILect FTP - File Transfer Set binary mode Put local file to server ftp directory

9/15/2015© 2008 Raymond P. Jefferis IIILect Telnet Telnet is a remote terminal protocol Remote logon permitted User gets virtual terminal (emulation) Uses a TCP connection protocol Requires two arguments –name of server –protocol port number of server (commercial software will use default)

9/15/2015© 2008 Raymond P. Jefferis IIILect Telnet - Terminal Setup Define terminal

9/15/2015© 2008 Raymond P. Jefferis IIILect Telnet - Connect from Prompt Type Telnet serverName

9/15/2015© 2008 Raymond P. Jefferis IIILect Telnet - Connect via Program Type Telnet Specify server and terminal type

9/15/2015© 2008 Raymond P. Jefferis IIILect HTTP Hypertext Transfer Protocol –used for World Wide Web (WWW) to retrieve hypertext documents –client/server mode –transaction-oriented (connection broken after document transmission is complete) –uses TCP to connect client and server (virtual “connection”)

9/15/2015© 2008 Raymond P. Jefferis IIILect HTTP Message Format Request –message type –requested source Response –response information General –additional information

9/15/2015© 2008 Raymond P. Jefferis IIILect HTTP Header Information Connection (header field names) Date (date and time stamp) Keep-alive (sender connection timeout)

9/15/2015© 2008 Raymond P. Jefferis IIILect HTTP Request Methods Get (from specified URL) Put (post to URL) Patch (post differences to URL) Copy, Move, Delete (URL info) Link/Unlink (add or delete link in URL)

9/15/2015© 2008 Raymond P. Jefferis IIILect HTTP Response Messages Status line –HTTP Version –Status Code –Reason Phrase General response Entity body (optional) –text, binary data, audio, images, video

9/15/2015© 2008 Raymond P. Jefferis IIILect SNMP/SNMPv2 Simple Network Management Protocol –network monitoring –network management Basic actions –Get (request named objects - various datatypes) –Set (request alteration of named objects) –Notify (inform request) –Uses UDP for communications

9/15/2015© 2008 Raymond P. Jefferis IIILect SNMP Network Components Management stations –restricted access –inspect, display, and alter network data Managed nodes –routers, gateways, bridges, switches, hubs, etc. –computers, printers, etc.

9/15/2015© 2008 Raymond P. Jefferis IIILect SNMP Management Objectives Fault detection Equipment configuration Gathering statistics –for accounting purposes –for diagnostic purposes Network security

9/15/2015© 2008 Raymond P. Jefferis IIILect SNMP Model Objects –written in ASN.1 syntax –defined in Management Information Base (MIB) - many types of objects pre-defined Agents –programs in managed nodes –supply requested information –alter information when requested

9/15/2015© 2008 Raymond P. Jefferis IIILect ASN.1 Data types in SNMP INTEGER Type code = 2 BIT STRING Type code = 3 OCTET STRING Type code = 4 NULL Type code = 5 OBJECT IDENTIFIERType code = 6 Syntax in use: identifier type ::= value or (range) or {id n (val n ),...}

9/15/2015© 2008 Raymond P. Jefferis IIILect SNMP Data Transfer Format Header byte –tag (2 bits) –tag extension (1 bit) –type code (5 bits) Length [bytes] Data bytes

9/15/2015© 2008 Raymond P. Jefferis IIILect Basic SNMP Objects System - equipment description Interfaces - with logged traffic AT - address translation IP - packet statistics ICMP - message statistics

Basic SNMP Objects (Cont’d) TCP - methods, parameters, statistics UDP - statistics EGP - gateway protocol statistics Transmission - media-specific SNMP - management traffic statistics 9/15/2015© 2008 Raymond P. Jefferis IIILect

9/15/2015© 2008 Raymond P. Jefferis IIILect SNMP Message Types (0)GetRequest - get variables (1)GetNextRequest - get next variable (2)GetResponse- get data (3)SetRequest - modify variable (4)Trap - agent trap message

9/15/2015© 2008 Raymond P. Jefferis IIILect SMTP Simple Mail Transfer Protocol Sent and received via Port 25 using TCP Envelope –list of recipients Body –message to be sent (7-bit ASCII) Outgoing messages are queued

9/15/2015© 2008 Raymond P. Jefferis IIILect SMTP Header TO:address FROM: (REPLY TO:)address CC:address SUBJECT:text DATE:date ENCRYPTED:pointer

9/15/2015© 2008 Raymond P. Jefferis IIILect Some SMTP Commands HELO (send ID - sent by client) MAIL FROM (identify originator) RCPT TO (identify recipient) DATA (transfer message text) QUIT (close TCP connection) (See text, p660 for example)

9/15/2015© 2008 Raymond P. Jefferis IIILect Some SMTP Replies 220“ready” - returned by server 221“destination closing” 250“okay” - transfer complete 345“ready for mail” - start 421“mail service unavailable” 550“mailbox not found” 554“mail transaction failed”

9/15/2015© 2008 Raymond P. Jefferis IIILect DNS To locate addresses in network domains Each host has resource records of format: –DomainName –TimeToLive [seconds] –Class (IN for internet) –Type (see table) –Value (data type depends on Type field)

9/15/2015© 2008 Raymond P. Jefferis IIILect DNS (continued) Database is distributed and hierarchical Names that cannot be resolved in the host are referred up the hierarchy of name servers

Name Servers (Continued) There is usually a specified name server for a network configuration A backup (second) name server is usually specified UDP protocol is used for name server queries and responses 9/15/2015© 2008 Raymond P. Jefferis IIILect

9/15/2015© 2008 Raymond P. Jefferis IIILect DNS Record Types

9/15/2015© 2008 Raymond P. Jefferis IIILect Example dcs.engr.widener.edu, ,A,IN

End 9/15/2015© 2008 Raymond P. Jefferis IIILect