Application Layer Functionality and Protocols: Network Fundamentals - Chapter 3

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 74

Application Layer

Functionality and
Protocols

Network Fundamentals – Chapter 3

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
 Define the application layer as the source and
destination of data for communication across
networks.
 Explain the role of protocols in supporting
communication between server and client
processes.
 Describe the features, operation, and use of
well-known TCP/IP application layer services
(HTTP, DNS, SMTP).

ITE PC v4.0
Chapter 1 Rainier Pimentel 2
Two basic types of networks

 Peer-to-Peer Networks
 Client/Server Networks

ITE PC v4.0
Chapter 1 Rainier Pimentel 3
Peer-to-Peer Networks
 In a peer-to-peer network, networked computers act as
equal partners, or peers.
 As peers, each computer can take on the client function or
the server function.
 In a peer-to-peer network, individual users control their own
resources.
 Since individual users make these decisions, there is no
central point of control or administration in the network.

ITE PC v4.0
Chapter 1 Rainier Pimentel 4
Peer-to-Peer Networks
 Peer-to-peer networks are relatively easy to install and
operate.
 No additional equipment is necessary beyond a suitable
operating system installed on each computer.
 Since users control their own resources, no dedicated
administrators are needed.
 As networks grow, peer-to-peer relationships become
increasingly difficult to coordinate. A peer-to-peer network
works well with 10 or fewer computers.

ITE PC v4.0
Chapter 1 Rainier Pimentel 5
Peer to Peer
1. decentralized
resources
2. resource
sharing
without a
dedicated
server
3. Security is
difficult to
enforce.

A computer that responds to a file sharing request is


ITE PC v4.0
functioning as a server.
Chapter 1 Rainier Pimentel 6
A small home network has been installed
to interconnect three computers together
for gaming and file sharing. What two
properties represent this network type?
(Choose two.)
a. User accounts are centralized.
b. Security is difficult to enforce.
c. Specialized operating system software is required.
d. File permissions are controlled by a single computer.
e. A computer that responds to a file sharing request is
functioning as a server.

ITE PC v4.0
Chapter 1 Rainier Pimentel 7
A small home network has been installed
to interconnect three computers together
for gaming and file sharing. What two
properties represent this network type?
(Choose two.)
a. User accounts are centralized.
b. Security is difficult to enforce.
c. Specialized operating system software is required.
d. File permissions are controlled by a single computer.
e. A computer that responds to a file sharing request is
functioning as a server.

ITE PC v4.0
Chapter 1 Rainier Pimentel 8
What are two characteristics of peer-to-
peer networks? (Choose two.)

a. scalable
b. one way data flow
c. decentralized resources
d. centralized user accounts
e. resource sharing without a dedicated server

ITE PC v4.0
Chapter 1 Rainier Pimentel 9
What are two characteristics of peer-to-
peer networks? (Choose two.)

a. scalable
b. one way data flow
c. decentralized resources
d. centralized user accounts
e. resource sharing without a dedicated server

ITE PC v4.0
Chapter 1 Rainier Pimentel 10
Peer to Peer

 Some P2P applications use a hybrid system


where resource sharing is decentralized but the
indexes that point to resource locations are
stored in a centralized directory.
 Peer-to-peer applications can be used on peer-
to-peer networks, client/server networks, and
across the Internet.

ITE PC v4.0
Chapter 1 Rainier Pimentel 11
What are three properties of peer-to-peer
applications? (Choose three.)

a. acts as both a client and server within the same


communication
b. requires centralized account administration
c. hybrid mode includes a centralized directory of files
d. can be used in client-server networks
e. requires a direct physical connection between devices
f. centralized authentication is required

ITE PC v4.0
Chapter 1 Rainier Pimentel 12
What are three properties of peer-to-peer
applications? (Choose three.)

a. acts as both a client and server within the same


communication
b. requires centralized account administration
c. hybrid mode includes a centralized directory of files
d. can be used in client-server networks
e. requires a direct physical connection between devices
f. centralized authentication is required

ITE PC v4.0
Chapter 1 Rainier Pimentel 13
Client/Server Networks

ITE PC v4.0
Chapter 1 Rainier Pimentel 14
Client/Server Network
 Some nodes (SERVER) are dedicated to present
services to other nodes (CLIENTS)

Client1 Client3

• centralized administration
• security is easier to
enforce
Client2 Server

ITE PC v4.0
Chapter 1 Rainier Pimentel 15
Client/Server Network

centralized user accounts

Client computers initiate data


exchanges and may upload data
to servers
ITE PC v4.0
Chapter 1 Rainier Pimentel 16
Client/Server Networks
 In a client/server arrangement, network services are
located on a dedicated computer called a server.
 The server responds to the requests of clients.
 The server is a central computer that is continuously
available to respond to requests from clients for file, print,
application, and other services.
 Servers are designed to handle requests from many clients
simultaneously.

ITE PC v4.0
Chapter 1 Rainier Pimentel 17
What are two characteristics of clients in
data networks? (Choose two.)
1. initiate data exchanges
2. are repositories of data
3. may upload data to servers
4. listen for requests from servers

ITE PC v4.0
Chapter 1 Rainier Pimentel 18
What are two characteristics of clients in
data networks? (Choose two.)
1. initiate data exchanges
2. are repositories of data
3. may upload data to servers
4. listen for requests from servers

ITE PC v4.0
Chapter 1 Rainier Pimentel 19
A network administrator is designing a
network for a new branch office of twenty-five
users. What are the advantages of using a
client-server model? (Choose two.)

a. centralized administration
b. does not require specialized software
c. security is easier to enforce
d. lower cost implementation

ITE PC v4.0
Chapter 1 Rainier Pimentel 20
A network administrator is designing a
network for a new branch office of twenty-five
users. What are the advantages of using a
client-server model? (Choose two.)

a. centralized administration
b. does not require specialized software
c. security is easier to enforce
d. lower cost implementation

ITE PC v4.0
Chapter 1 Rainier Pimentel 21
Applications – The Interface Between
Human and Data Networks
 Applications provide the means for generating and
receiving data that can be transported on the network

ITE PC v4.0
Chapter 1 Rainier Pimentel 22
Application layer (definitions)

 Application layer supplies services that allow user to


interface with the network.
 It provides the interface between the applications on
either end of the network
 Application layer provides services for an application
program to ensure that effective communication with
another application program in a network. 

ITE PC v4.0
Chapter 1 Rainier Pimentel 23
Which layer of the OSI model supplies
services that allow user to interface with the
network?

a. physical
b. session
c. network
d. presentation
e. application
f. transport

ITE PC v4.0
Chapter 1 Rainier Pimentel 24
Which layer of the OSI model supplies
services that allow user to interface with the
network?

a. physical
b. session
c. network
d. presentation
e. application
f. transport

ITE PC v4.0
Chapter 1 Rainier Pimentel 25
What is the role of the OSI application
layer?

a. provides segmentation of data


b. provides encryption and conversion of data
c. provides the interface between the applications on
either end of the network
d. provides control of all the data flowing between the
source and destination devices

ITE PC v4.0
Chapter 1 Rainier Pimentel 26
What is the role of the OSI application
layer?

a. provides segmentation of data


b. provides encryption and conversion of data
c. provides the interface between the applications on
either end of the network
d. provides control of all the data flowing between the
source and destination devices

ITE PC v4.0
Chapter 1 Rainier Pimentel 27
2 Forms of Application
Layer Software
Applications
Web browsers, Email program…

Services
Application Protocols
(FTP, HTTP, DNS, Telnet, DHCP…)

ITE PC v4.0
Chapter 1 Rainier Pimentel 28
What are two forms of application layer
software? (Choose two.)

a. applications
b. dialogs
c. requests
d. services
e. spreadsheet

ITE PC v4.0
Chapter 1 Rainier Pimentel 29
What are two forms of application layer
software? (Choose two.)

a. applications
b. dialogs
c. requests
d. services
e. spreadsheet

ITE PC v4.0
Chapter 1 Rainier Pimentel 30
Application Layer Protocols
FTP and TFTP
 File Transfer Protocol (FTP)
FTP enables file sharing between hosts.
FTP is commonly used to support for file
transfers between a client and a server
 Trivial File Transfer Protocol (TFTP)
TFTP is a connectionless service that uses the
User Datagram Protocol (UDP).

ITE PC v4.0
Chapter 1 Rainier Pimentel 31
What application layer protocol is commonly used to
support for file transfers between a client and a
server?

a. DNS
b. HTTP
c. FTP
d. Telnet

ITE PC v4.0
Chapter 1 Rainier Pimentel 32
What application layer protocol is commonly used to
support for file transfers between a client and a
server?

a. DNS
b. HTTP
c. FTP
d. Telnet

ITE PC v4.0
Chapter 1 Rainier Pimentel 33
Application Layer Protocols
 Server Message Block (SMB) is an application
layer protocol that describes the services that are
used for file sharing in Microsoft networks
 Network File System (NFS) – NFS is a distributed
file system protocol suite developed by Sun
Microsystems that allows file access to a remote
storage device such as a hard disk across a
network.

ITE PC v4.0
Chapter 1 Rainier Pimentel 34
What application layer protocol describes the
services that are used for file sharing in
Microsoft networks?

a. DHCP
b. DNS
c. SMB
d. SMTP
e. WINS

ITE PC v4.0
Chapter 1 Rainier Pimentel 35
What application layer protocol describes the
services that are used for file sharing in
Microsoft networks?

a. DHCP
b. DNS
c. SMB
d. SMTP
e. WINS

ITE PC v4.0
Chapter 1 Rainier Pimentel 36
Application Layer Protocols
 Simple Mail Transfer Protocol (SMTP) – SMTP
administers the transmission of e-mail over
computer networks.
It is used to forward mail between servers.
It is a protocol that operates at the Application
layer of the OSI model

ITE PC v4.0
Chapter 1 Rainier Pimentel 37
Application Layer Protocols
(Telnet and SSH)
 Terminal emulation (Telnet) – Telnet provides the
capability to remotely access another computer.
 Secure Shell (SSH), a common network protocol for
remote administration of Unix computers.

Telnet does not support encryption

ITE PC v4.0
Chapter 1 Rainier Pimentel 38
Telnet protocol

Telnet
provides a
virtual
connection for
remote access

ITE PC v4.0
Chapter 1 Rainier Pimentel 39
Which application layer protocols correctly
match a corresponding function? (Choose
two.)

a. DNS dynamically allocates IP addresses to hosts


b. HTTP transfers data from a web server to a client
c. POP delivers email from the client to the server email
server
d. SMTP supports file sharing
e. Telnet provides a virtual connection for remote access

ITE PC v4.0
Chapter 1 Rainier Pimentel 40
Which application layer protocols correctly
match a corresponding function? (Choose
two.)

a. DNS dynamically allocates IP addresses to hosts


b. HTTP transfers data from a web server to a client
c. POP delivers email from the client to the server email
server
d. SMTP supports file sharing
e. Telnet provides a virtual connection for remote access

ITE PC v4.0
Chapter 1 Rainier Pimentel 41
As compared to SSH, what is the primary
disadvantage of telnet?

a. not widely available


b. does not support encryption
c. consumes more network bandwidth
d. does not support authentication

ITE PC v4.0
Chapter 1 Rainier Pimentel 42
As compared to SSH, what is the primary
disadvantage of telnet?

a. not widely available


b. does not support encryption
c. consumes more network bandwidth
d. does not support authentication

ITE PC v4.0
Chapter 1 Rainier Pimentel 43
Application Layer Protocols

 Simple Network Management Protocol (SNMP)


SNMP is a protocol that provides a way to monitor
and control network devices, and to manage
configurations, statistics collection, performance,
and security.

ITE PC v4.0
Chapter 1 Rainier Pimentel 44
Application Layer Protocols
HTTP and HTTPS
 HTTP - defines the rules for transferring information,
files, and multimedia on web pages. Hypertext Markup
Language (HTML) is the language used within HTTP.
 HTTPS is the secured version of the HTTP application,
which normally uses 128 bit SSL encryption to secure
the information sent and received on a web page.

These two protocols are used to


control the transfer of web
resources from a web server to
a client browser.

ITE PC v4.0
Chapter 1 Rainier Pimentel 45
Which two protocols are used to control the
transfer of web resources from a web server to
a client browser? (Choose two.)

a. ASP
b. FTP
c. HTML
d. HTTP
e. HTTPS

ITE PC v4.0
Chapter 1 Rainier Pimentel 46
Which two protocols are used to control the
transfer of web resources from a web server to
a client browser? (Choose two.)

a. ASP
b. FTP
c. HTML
d. HTTP
e. HTTPS

ITE PC v4.0
Chapter 1 Rainier Pimentel 47
DHCP

 The Dynamic Host Configuration Protocol (DHCP)


service enables devices on a network to obtain IP
addresses and other information from a DHCP server.
 DHCP allows a host to obtain an IP address
dynamically when it connects to the network. The
DHCP server is contacted and an address requested.
The DHCP server chooses an address from a
configured range of addresses called a pool and
assigns ("leases") it to the host for a set period.

ITE PC v4.0
Chapter 1 Rainier Pimentel 48
DHCP

ITE PC v4.0
Chapter 1 Rainier Pimentel 49
DHCP

The DHCP leasing process


ITE PC v4.0
Chapter 1 Rainier Pimentel 50
What is DNS?

 It is a database system that translates hostname to IP


addresses
 It is a protocol that operates at the Application layer of
the OSI model
 It is used by the server to resolve names
 It is the automated service that matches resource
names with the required IP address

ITE PC v4.0
Chapter 1 Rainier Pimentel 51
DNS

ITE PC v4.0
Chapter 1 Rainier Pimentel 52
DNS (Common Resource Records)
Record Type Use
The A record maps a DNS host name to an IP
A (host address) address. This is the most common resource
record type.
The CNAME record provides alternate names
CNAME (canonical
(or aliases) to hosts that already have an A
name)
record.
The MX record identifies servers that can be
MX (Mail Exchanger)
used to deliver mail.
The NS resource record identifies all name
NS (name server) servers that can perform name resolution for the
zone.
In a reverse lookup zone, the PTR record maps
PTR (pointer) an IP address to a host name (i.e. "points" to an
A record).
ITE PC v4.0
Chapter 1 Rainier Pimentel 53
Email Services and POP3/SMTP
Protocols
 POP3 (Post Office Protocol version 3) allows your
computer to receive emails and SMTP means it can
send emails.
 POP3 allows users to pickup email across the network.
 SMTP (Simple Mail Transfer Protocol) – delivers email
across the network.
email components are used to forward mail between
servers.

ITE PC v4.0
Chapter 1 Rainier Pimentel 54
MUA (Mail User Agent)

 MUA is also called e-mail client


 MUA is the program that the user used to create email
messages.
 To receive e-mail messages from an e-mail server, the
e-mail client can use POP. Sending e-mail from either a
client or a server uses message formats and command
strings defined by the SMTP protocol.
 MTA (Mail Transfer Agent) receives email from the
client's MUA

ITE PC v4.0
Chapter 1 Rainier Pimentel 55
MDA (Mail Delivery Agent)
 A MDA is software that delivers e-mail messages right
after they've been accepted on a server.
 MTA passes email to the MDA for final delivery.

ITE PC v4.0
Chapter 1 Rainier Pimentel 56
MTA (Mail Transfer Agent )

 The Mail Transfer Agent (MTA) process is used to forward e-


mail.
 The MTA receives messages from the MUA or from another
MTA on another e-mail server.
 Based on the message header, it determines how a message
has to be forwarded to reach its destination. If the mail is
addressed to a user whose mailbox is on the local server, the
mail is passed to the MDA. If the mail is for a user not on the
local server, the MTA routes the e-mail to the MTA on the
appropriate server.

ITE PC v4.0
Chapter 1 Rainier Pimentel 57
MTA

 MTA passes email to the MDA for final delivery.


 MTA uses SMTP to route email between servers.
 MTA receives email from the client's MUA.

ITE PC v4.0
Chapter 1 Rainier Pimentel 58
Email Services (SMTP and POP)
MTA and SMTP are
email components are
used to forward mail
between servers

ITE PC v4.0
Chapter 1 Rainier Pimentel 59
Email Services (SMTP and POP)

1. MTA receives email


from the client's MUA
2. MTA passes email to
the MDA for final
delivery
3. MTA uses SMTP to
route email between
ITE PC v4.0
servers
Chapter 1 Rainier Pimentel 60
The process of sending mails
between clients

1. MUA
2. SMTP
3. MTA
4. SMTP
5. MTA
6. MDA
7. POP
8. MUA

ITE PC v4.0
Chapter 1 Rainier Pimentel 61
Which email components are used to forward
mail between servers? (Choose two.)

a. MDA
b. IMAP
c. MTA
d. POP
e. SMTP

ITE PC v4.0
Chapter 1 Rainier Pimentel 62
Which email components are used to forward
mail between servers? (Choose two.)

a. MDA
b. IMAP
c. MTA
d. POP
e. SMTP

ITE PC v4.0
Chapter 1 Rainier Pimentel 63
Which statements are correct concerning the
role of the MTA in handling email? (Choose
three.)

a. routes email to the MDA on other servers


b. receives email from the client's MUA
c. receives email via the POP3 protocol
d. passes email to the MDA for final delivery
e. uses SMTP to route email between servers

ITE PC v4.0
Chapter 1 Rainier Pimentel 64
Which statements are correct concerning the
role of the MTA in handling email? (Choose
three.)

a. routes email to the MDA on other servers


b. receives email from the client's MUA
c. receives email via the POP3 protocol
d. passes email to the MDA for final delivery
e. uses SMTP to route email between servers

ITE PC v4.0
Chapter 1 Rainier Pimentel 65
Presentation Layer

 Presents data to the Application Layer


Provides data translation, coding, and conversion functions
Translates generically formatted data into its native format
(EBCDIC to ASCII)
 Data compression, decompression, encryption, and
decryption
Ex: PICT/TIFF/JPEG/MIDI/MPEG/QuickTime

ITE PC v4.0
Chapter 1 Rainier Pimentel 66
Port Numbers

Application layer uses support from lower layer functions


to distinguish between connections to the service

ITE PC v4.0
Chapter 1 Rainier Pimentel 67
ITE PC v4.0
Chapter 1 Rainier Pimentel 68
What is the destination port for the
communication that is represented on line 82?

a. 80
b. 1261
c. 15533
d. 3912
e. 65520

ITE PC v4.0
Chapter 1 Rainier Pimentel 69
What is the destination port for the
communication that is represented on line 82?

a. 80
b. 1261
c. 15533
d. 3912
e. 65520

ITE PC v4.0
Chapter 1 Rainier Pimentel 70
How does the application layer on a
server usually process multiple client
request for services?
a. ceases all connections to the service
b. denies multiple connections to a single daemon
c. suspends the current connection to allow the new
connection
d. uses support from lower layer functions to distinguish
between connections to the service

ITE PC v4.0
Chapter 1 Rainier Pimentel 71
How does the application layer on a
server usually process multiple client
request for services?
a. ceases all connections to the service
b. denies multiple connections to a single daemon
c. suspends the current connection to allow the new
connection
d. uses support from lower layer functions to distinguish
between connections to the service

ITE PC v4.0
Chapter 1 Rainier Pimentel 72
ITE PC v4.0
Chapter 1 Rainier Pimentel 73
Summary

ITE PC v4.0
Chapter 1 Rainier Pimentel 74

You might also like