Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter 7.

Similar presentations


Presentation on theme: "Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter 7."— Presentation transcript:

1 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter 7

2 The Application Layer The layers below the application layer are there to provide reliable transport, but they do not do real work for users. – In this chapter we will study some real network applications. However, even in the application layer there is a need for support protocols, to allow the applications to function.

3 DNS—The Domain Name System Although programs theoretically could refer to hosts, mailboxes, and other resources by their network (e.g., IP) addresses, these addresses are hard for people to remember. sending e-mail to tana@128.111.24.41 means that if Tana's ISP or organization moves the mail server to a different machine with a different IP address, her e-mail address has to change. Consequently, ASCII names were introduced to decouple machine names from machine addresses.

4 DNS—The Domain Name System Way back in the ARPANET, there was simply a file, hosts.txt, that listed all the hosts and their IP addresses. Every night, all the hosts would fetch it from the site at which it was maintained. The size of the file would become too large To solve these problems, DNS (the Domain Name System) was invented.

5 DNS—The Domain Name System Very briefly, the way DNS is used is as follows. – To map a name onto an IP address, an application program calls a library procedure called the resolver, passing it the name as a parameter. – The resolver sends a UDP packet to a local DNS server, which then looks up the name and returns the IP address to the resolver, which then returns it to the caller. – The program can then establish a TCP connection with the destination or send it UDP packets.

6 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 DNS – The Domain Name System Conceptually, the Internet is divided into over 200 top-level domains, where each domain covers many hosts. Each domain is partitioned into subdomains, and these are further partitioned, and so on. All these domains can be represented by a tree, as shown in Fig. 7-1.Fig. 7-1

7 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The DNS Name Space (1) Fig. 7-1 Fig. 7-1 A portion of the Internet domain name space.

8 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The DNS Name Space (2) Generic top-level domains

9 Cont. The top-level domains come in two flavors: generic and countries. In general, getting a second-level domain, such as name-of-company.com, is easy. It merely requires going to a registrar for the corresponding top-level domain (com in this case) to check if the desired name is available and not somebody else's trademark. If there are no problems, the requester pays a small annual fee and gets the name. Domain names are case insensitive, so edu, Edu, and EDU mean the same thing.

10 Cont. To create a new domain, permission is required of the domain in which it will be included. – For example, if a VLSI group is started at Yale and wants to be known as vlsi.cs.yale.edu, it has to get permission from whoever manages cs.yale.edu. – Similarly, if a new university is chartered, say, the University of Northern South Dakota, it must ask the manager of the edu domain to assign it unsd.edu. In this way, name conflicts are avoided. Once a new domain has been created and registered, it can create subdomains, such as cs.unsd.edu, without getting permission from anybody higher up the tree.

11 Resource Records Every domain, whether it is a single host or a top-level domain, can have a set of resource records associated with it. – For a single host, the most common resource record is just its IP address, but many other kinds of resource records also exist. – When a resolver gives a domain name to DNS, what it gets back are the resource records associated with that name. Thus, the primary function of DNS is to map domain names onto resource records.

12 Resource Records A resource record is a five-tuple. Domain_name Time_to_live Class Type Value The Domain_name tells the domain to which this record applies. Normally, many records exist for each domain. The Time_to_live field gives an indication of how stable the record is. Information that is highly stable is assigned a large value, such as 86400 (the number of seconds in 1 day). Information that is highly volatile is assigned a small value, such as 60 (1 minute). The third field of every resource record is the Class. For Internet information, it is always IN.

13 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Domain Resource Records The Type field tells what kind of record this is. The most important types are listed above

14 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Domain Resource Records (2) A portion of a possible DNS database for cs.vu.nl.

15 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Name Servers (1) Part of the DNS name space divided into zones (which are circled).

16 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Name Servers (2) Example of a resolver looking up a remote name in 10 steps.

17 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Electronic Mail Architecture and services The user agent Message formats Message transfer Final delivery

18 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architecture and Services (1) Architecture of the email system

19 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architecture and Services (2) Envelopes and messages. (a) Paper mail. (b) Electronic mail.

20 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The User Agent Typical elements of the user agent interface

21 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Formats (1) RFC 5322 header fields related to message transport.

22 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Formats (2) Some fields used in the RFC 5322 message header.

23 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Formats (3) Message headers added by MIME.

24 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Formats (4) MIME content types and example subtypes.

25 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Transfer (1) A multipart message containing HTML and audio alternatives....

26 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Transfer (2) A multipart message containing HTML and audio alternatives....

27 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Transfer (3) Sending a message from alice@cs.washington.edu to bob@ee.uwa.edu.au....

28 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Transfer (4) Sending a message from alice@cs.washington.edu to bob@ee.uwa.edu.au....

29 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Message Transfer (5) Some SMTP extensions.

30 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Final Delivery (1) IMAP (version 4) commands....

31 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Final Delivery (2) IMAP (version 4) commands....

32 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The World Wide Web Architectural overview Static web pages Dynamic web pages, web applications The hypertext transfer protocol The mobile web Web search

33 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (1) Architecture of the Web.

34 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (2) Three questions had to be answered before a selected page could be displayed: 1.What is the page called? 2.Where is the page located? 3.How can the page be accessed?

35 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (3) Steps that occur when link is selected: 1.Browser determines the URL 2.Browser asks DNS for the IP address of the server 3.DNS replies 4.The browser makes a TCP connection 5.Sends HTTP request for the page 6.Server sends the page as HTTP response 7.Browser fetches other URLs as needed 8.The browser displays the page 9.The TCP connections are released

36 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (4) Some common URL schemes.

37 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (5) (a) A browser plug-in. (b) A helper application.

38 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (6) Steps server performs in main loop 1.Accept a TCP connection from client 2.Get path to page, name of file requested. 3.Get the file (from disk). 4.Send contents of the file to the client. 5.Release the TCP connection.

39 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (7) A multithreaded Web server with a front end and processing modules.

40 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (8) A processing module performs a series of steps: 1.Resolve name of Web page requested. 2.Perform access control on the Web page. 3.Check the cache. 4.Fetch requested page from disk or run program 5.Determine the rest of the response 6.Return the response to the client. 7.Make an entry in the server log.

41 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Architectural Overview (9) Some examples of cookies

42 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Web Pages (1) The HTML for a sample Web page.

43 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Web Pages (2) The formatted page.

44 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Web Pages (3) Some differences between HTML versions.

45 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Web Pages (4) The HTML for an order form.

46 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Static Web Pages (5) The formatted page.

47 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (1) Dynamic pages

48 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (2) (a) A Web page containing a form. (b) A PHP script for handling the output of the form. (c) Output from the PHP script when the inputs are ‘‘Barbara’’ and ‘‘32’’, respectively. (a) (b) (c)

49 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (3) Use of JavaScript for processing a form.

50 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (4) (a)Server-side scripting with PHP. (b)Client-side scripting withJavaScript.

51 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (5) AJAX Technologies 1.HTML and CSS: present information as pages. 2.DOM: change parts of pages while they are viewed. 3.XML: let programs exchange data with the server. 4.An asynchronous way to send and retrieve XML data. 5.JavaScript as a language to bind all this together.

52 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (6) The DOM tree for the HTML in Fig. 7-30(a).Fig. 7-30(a).

53 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (7) A simple XML document.

54 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Dynamic Web Pages, Web Applications (8) Various technologies used to generate dynamic pages.

55 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The HyperText Transfer Protocol (1) HTTP with (a) multiple connections and sequential requests. (b) A persistent connection and sequential requests. (c) A persistent connection and pipelined requests.

56 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The HyperText Transfer Protocol (2) The built-in HTTP request methods.

57 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The HyperText Transfer Protocol (3) The status code response groups

58 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The HyperText Transfer Protocol (4) Some HTTP message headers....

59 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The HyperText Transfer Protocol (5) Some HTTP message headers....

60 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The HyperText Transfer Protocol (6) HTTP caching.

61 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Mobile Web (1) Difficulties for mobile phones browsing the web 1. Relatively small screens 2. Limited input capabilities, lengthy input. 3. Network bandwidth is limited 4. Connectivity may be intermittent. 5. Computing power is limited

62 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Mobile Web (2) The XHTML Basic modules and tags.

63 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Audio and Video Digital audio Digital video Streaming stored media Streaming live media Real-time conferencing

64 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Audio (1) (a) A sine wave. (b) Sampling the sine wave. (c) Quantizing the samples to 4 bits.

65 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Audio (2) (a) The threshold of audibility as a function of frequency. (b) The masking effect.

66 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (1) Steps in JPEG lossy sequential encoding.

67 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (2) (a) RGB input data. (b) After block preparation.

68 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (3) (a) One block of the Y matrix. (b) The DCT coefficients.

69 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (4) Computation of the quantized DCT coefficients.

70 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (5) The order in which the quantized values are transmitted.

71 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (6) MPEG output consists of three kinds of frames: a)I- (Intracoded) : Self-contained compressed still pictures. b)P- (Predictive) : Block-by-block difference with previous frames. c)B- (Bidirectional) : block-by-block differences between previous and future frames.

72 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Digital Video (7) Three consecutive frames

73 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (1) Playing media over the Web via simple downloads.

74 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (2) Streaming media using the Web and a media server.

75 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (3) Major tasks of the media player: 1.Manage the user interface. 2.Handle transmission errors. 3.Decompress the content. 4.Eliminate jitter.

76 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (4) Using a parity packet to repair loss.

77 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (5) When packets carry alternate samples, the loss of a packet reduces the temporal resolution rather than creating a gap in time.

78 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (6) The media player buffers input from the media server and plays from the buffer rather than directly from the network.

79 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Stored Media (7) RTSP commands from the player to the server.

80 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Live Media (1) Multicast streaming media with a parity packet.

81 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Streaming Live Media (2) A student radio station.

82 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Real-Time Conferencing (1) The H.323 architectural model for Internet telephony.

83 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Real-Time Conferencing (2) The H.323 protocol stack.

84 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Real-Time Conferencing (3) Logical channels between the caller and callee during a call.

85 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Real-Time Conferencing (4) SIP methods.

86 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Real-Time Conferencing (5) Use of a proxy server and redirection with SIP.

87 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Real-Time Conferencing (6) Comparison of H.323 and SIP.

88 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Content Delivery Content and internet traffic Server farms and web proxies Content delivery networks Peer-to-peer networks

89 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Content and Internet Traffic Zipf distribution (a) On a linear scale. (b) On a log-log scale.

90 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Server Farms and Web Proxies (1) A server farm.

91 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Server Farms and Web Proxies (2) A proxy cache between Web browsers and Web servers.

92 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Content Delivery Networks (1) CDN distribution tree.

93 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Content Delivery Networks (2) Directing clients to nearby CDN nodes using DNS.

94 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Content Delivery Networks (3) (a) Original Web page. (b) Same page after linking to the CDN

95 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Peer-to-Peer Networks (1) Problems to be solved with BitTorrent sharing 1.How does a peer find other peers 2.How is content replicated by peers to provide high-speed downloads 3.How do peers encourage each other to upload content to others

96 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Peer-to-Peer Networks (2) BitTorrent.

97 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Peer-to-Peer Networks (3) (a) A set of 32 node identifiers arranged in a circle. The shaded ones correspond to actual machines. The arcs show the fingers from nodes 1, 4 and 12. The labels on the arcs are the table indices. (b) Examples of the finger tables.

98 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 End Chapter 7


Download ppt "Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter 7."

Similar presentations


Ads by Google