2. 2 Presentation layer 2. 3 The presentation layer is responsible for translation, compression, and encryption.

Slides:



Advertisements
Similar presentations
Session Layer OSI Model.
Advertisements

Introduction to Networks
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
The Application Layer Chapter 7. Electronic Mail Architecture and Services The User Agent Message Formats Message Transfer Final Delivery.
Layer 7- Application Layer
Review of Chapters 12, 13 & 14 Transport Layer Session Layer Presentation Layer.
CS335 Networking & Network Administration Wednesday, May 26, 2010.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 30 Electronic Mail Representation & Transfer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Electronic Mail Three major components: SMTP user agents mail servers
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
1 Chapter Internet Applications (DNS, )
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
Application Layer Protocols Simple Mail Transfer Protocol.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
Simple Mail Transfer Protocol (SMTP)
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
2. 2 Presentation layer 2. 3 The presentation layer is responsible for translation, compression, and encryption.
File Transfer Protocol (FTP)
TCP/IP Transport and Application (Topic 6)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
Internet and Intranet Protocols and Applications Lecture 5 Application Protocols: DNS February 20, 2002 Joseph Conron Computer Science Department New York.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CMPE 80N - Introduction to Networks and the Internet 1 Client-Server Architecture Client Server request response.
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Berkeley Sockets The socket primitives for TCP.. PortProtocol Use 21 FTP File transfer 23 Telnet Remote login 25 SMTP 69 TFTP Trivial File Transfer.
4343 X2 – Outline The Domain Name System The Web.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
1 Chapter 10: Application Layer Reference: Chapter 7 - “Computer Networks”, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003.
Ch 2. Application Layer Myungchul Kim
Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
The Application Layer DNS – The Domain Name System The DNS Name Space Resource Records Name Servers
Computer Network 1 HCM City University of Technology
Networking Applications
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
The Application Layer RIS 251 Dr. ir. S.S. Msanjila.
Protocols and networks in the TCP/IP model initially.
OSI MODEL SESSION LAYER
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 10: Application Layer
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
William Stallings Data and Computer Communications
Chapter 7 Network Applications
Chapter 2 Application Layer
Presentation transcript:

2. 2 Presentation layer

2. 3 The presentation layer is responsible for translation, compression, and encryption.

 Translates data Translates data  Responsible for encrypting data Responsible for encrypting data  Manages data compression Manages data compression

 a sending computer receiving data from the application layer will need to convert data from the receiving format(eg ASCII) to a format understood and accepted by other layers of the OSI model to ensure smooth file transfer  the receiving computer is responsible for the conversion of “the external format” with which data is received from the sending computer to one accepted by the other layers in the host computer  Data formats include postscript, ASCII, or BINARY such as EBCDICASCIIEBCDIC

 The process of transforming information (plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  The result of the process is encrypted information (referred to as ciphertext).

 The goal of data compression is to represent an information source (a data file, an image) as accurately as possible using the fewest number of bits  For example, ◦ This string can be compressed as: ◦ 25.[9]8  Interpreted as, "twenty five point 9 eights", the original string is perfectly recreated, just written in a smaller form

 ASCII, American Standard Code for Information Interchange ASCII  EBCDIC, Extended Binary Coded Decimal Interchange Code EBCDIC  X.25 PAD, Packet Assembler/Disassembler Protocol X.25 PAD

Outline Application Layer There is a need for support protocols, to allow the applications to function Some network applications DNS: handles naming within the Internet POP – IMAP – SMTP: handle electronic mail FTP: File Transfer over the Internet WWW – HTTP: Web world Multimedia

Domain Name System - DNS IP addresses can be used to identify a host machine on the Internet As those machines move around, the addresses need to be changed accordingly as well ASCII names have been used to decouple host names and their IPs to provide more flexibility The network itself still understands only numerical addresses The DNS was invented to manage and resolve host names into IP addresses

DNS: Characteristics A file host.txt listed all the hosts and their IP addresses, but issue some problems: File size, load and latency Host name conflict Essence of DNS: Hierarchical Domain-based naming scheme A distributed database system

DNS: A Brief To map a name onto an IP address, an application program: Calls a library procedure called the resolver, passing it the name as a parameter The resolver sends a UDP packet to a local DNS server DNS server looks up the name and returns the IP address to the resolver Resolver returns it to the application Armed with the IP address, the program can then establish a TCP connection with the destination or send it UDP packets

DNS Name Space A portion of the Internet domain name space

DNS naming Domain names are case insensitive: edu, Edu, EDU have the same meaning Component name can be up to 63 characters Full path names must not exceed 255 characters Each domain name server manages its own name space. It can create subdomain names without asking for permission from upper server. Examples: hcmut.edu.vn and cse.hcmut.edu.vn

Resource Records Every domain has a set of records associated with it The principal DNS resource records types.

Resource Records (2) A portion of a possible DNS database for cs.vu.nl.

Resource Records (3) hcmut.edu.vn. IN SOA hcmut-server.hcmut.edu.vn. webmaster.hcmut.edu.vn. ( ; serial 7200; refresh 3600; retry ; expire ); minimum hcmut.edu.vn IN NS vnuserv.vnuhcm.edu.vn. hcmut.edu.vn IN NS server.vnuhcm.edu.vn. hcmut.edu.vn IN MX 0 webmailserv.hcmut.edu.vn. hcmut.edu.vn IN MX 5 vnuserv.vnuhcm.edu.vn. hcmut-server.hcmut.edu.vn IN A stu-mailserv.hcmut.edu.vn IN A webmailserv.hcmut.edu.vn IN A pop3.student.hcmut.edu.vn IN CNAME stu- mailserv.hcmut.edu.vn IN CNAME stu- mailserv.hcmut.edu.vn.

Name Servers DNS Name Space is divided into non-overlapping zones Each zone has Name Servers holding information about it

DNS - Query recursive query – puts burden of name resolution on contacted name server. – heavy load ? iterated query – contacted server replies with name of server to contact. – “I don’t know this name, but ask this server” requesting host surf.eurecom.fr gaia.cs.umass.edu root name server local name server dns.eurecom.fr authoritative name server dns.cs.umass.edu intermediate name server dns.umass.edu 7 8 iterated query

Electronic Mail – (or E- mail) Has been around since the early days of Internet Is widely used today Informal form of communication Simple and easy to use

Electronic Mail (2) Some smileys :-).

Architecture and Services Basic functions Composition Transfer Reporting Displaying Disposition

Some terms mailbox – storage where incoming s are saved for later processing mailing list – a representative address of a group of people. sent to this address will be forwarded to all of its participants CC, BCC...

Message Structure Envelopes and messages. (a) Paper mail. (b) Electronic mail.

Systems Has two basic parts: User agent: a program that accepts a variety of commands for composing, receiving, and replying to messages, as well as for manipulating mailboxes Message transfer agents: relaying messages from the originator to the recipient

Reading Address format: An example display of the contents of a mailbox.

Message Formats RFC 822 header fields related to message transport.

Message Formats (2) Some fields used in the RFC 822 message header.

MIME – Multipurpose Internet Mail Extensions Some problems when using ASCII formatted messages: Languages with accents (French, German). Languages in non-Latin alphabets (Hebrew, Russian). Languages without alphabets (Chinese, Japanese). Messages not containing text at all (audio or images). MINE adds structure to the message body and defines encoding rules for non-ASCII messages

MIME (2) RFC 822 headers added by MIME.

MIME (3) The MIME types and subtypes defined in RFC 2045.

multipart/mixed

multipart/alternative

multipart/digest

Message Transfer Message transfer agents are daemons running on mail servers Use Simple Mail Transfer Protocol Use TCP on port 25

Message Transfer (2) Transferring a message from to Using SMTP.

Final Delivery (a) Sending and reading mail when the receiver has a permanent Internet connection and the user agent runs on the same machine as the message transfer agent. (b) Reading when the receiver has a dial-up connection to an ISP.

POP3 Post Office Protocol Version 3 Use TCP on port 110 Is used to download messages from a mail server to client computers Example: Using POP3 to fetch three messages.

IMAP (Internet Message Access Protocol) POP3 is not convenient when users frequently use different machines to read from servers, as s have to be downloaded to different computers more or less random IMAP can resolve this issues as s will be always on the servers A comparison of POP3 and IMAP.

Web Mail Convenient for the user on the go (Internet Café, WebTV, …) User can organize their hierarchy of folders on servers May be slow: – server typically far from client – interaction with server through CGI scripts user agent ordinary Web browser sender’s mail server user agent ordinary Web browser HTTPSMTP HTTP receiver’s mail server

OSI Model

Session layer Sender Receiver

The session layer is responsible for dialog control and synchronization.

 The session layer defines how to start, control and end conversations (called sessions) between applications.  This includes the control and management of multiple bi-directional messages using dialogue control.  It also synchronizes dialogue between two hosts' presentation layers and manages their data exchange.  The session layer offers provisions for efficient data transfer.

 Creating a connection – session/communication session between an APPLICATION in one computer and another APPLICATION in another computer ◦ THREE-WAY-HANDSHAKE: a method widely used to establish and end connection  Sender sends SYN message to request a session to the receiver  Receiver replies by sending ACK message to acknowledge the SYN message sent by the sender, and SYN message to request a session to the sender  Sender replies by sending ACK message to acknowledge the SYN message sent by the receiver

 Managing multiple sessions ◦ A computer can establish multiple sessions with several other computers  e.g., session 1: exchanging information over the World Wide Web with  session 2: exchanging information over the World Wide Web with  session 3: exchanging information over the World Wide Web with ◦ Two computers can also establish multiple sessions,  e.g., function 1: exchanging information over the World Wide Web;  function 2: exchanging information over the FTP;  function 3: exchanging information over the

YahooAOLESPN

mail music news

 Ending a session ◦ THREE-WAY-HANDSHAKE: a method widely used to establish and end connection  Sender sends FIN message to close a session to the receiver  Receiver replies by sending ACK message to acknowledge the FIN message sent by the sender, and FIN message to close a session to the sender  Sender replies by sending ACK message to acknowledge the FIN message sent by the receiver

 ISO-SP: OSI Session Layer Protocol  PPTP, Point-to-Point Tunneling Protocol  RPC, Remote Procedure Call Protocol  RTCP, Real-time Transport Control Protocol  SQL is a Session layer application that manages multiple queries to the SQL database.