Professional Documents
Culture Documents
Application Layer Functionality and Protocols: Network Fundamentals - Chapter 3
Application Layer Functionality and Protocols: Network Fundamentals - Chapter 3
Application Layer Functionality and Protocols: Network Fundamentals - Chapter 3
Functionality and
Protocols
ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
Define the application layer as the source and
destination of data for communication across
networks.
Explain the role of protocols in supporting
communication between server and client
processes.
Describe the features, operation, and use of
well-known TCP/IP application layer services
(HTTP, DNS, SMTP).
ITE PC v4.0
Chapter 1 Rainier Pimentel 2
Two basic types of networks
Peer-to-Peer Networks
Client/Server Networks
ITE PC v4.0
Chapter 1 Rainier Pimentel 3
Peer-to-Peer Networks
In a peer-to-peer network, networked computers act as
equal partners, or peers.
As peers, each computer can take on the client function or
the server function.
In a peer-to-peer network, individual users control their own
resources.
Since individual users make these decisions, there is no
central point of control or administration in the network.
ITE PC v4.0
Chapter 1 Rainier Pimentel 4
Peer-to-Peer Networks
Peer-to-peer networks are relatively easy to install and
operate.
No additional equipment is necessary beyond a suitable
operating system installed on each computer.
Since users control their own resources, no dedicated
administrators are needed.
As networks grow, peer-to-peer relationships become
increasingly difficult to coordinate. A peer-to-peer network
works well with 10 or fewer computers.
ITE PC v4.0
Chapter 1 Rainier Pimentel 5
Peer to Peer
1. decentralized
resources
2. resource
sharing
without a
dedicated
server
3. Security is
difficult to
enforce.
ITE PC v4.0
Chapter 1 Rainier Pimentel 7
A small home network has been installed
to interconnect three computers together
for gaming and file sharing. What two
properties represent this network type?
(Choose two.)
a. User accounts are centralized.
b. Security is difficult to enforce.
c. Specialized operating system software is required.
d. File permissions are controlled by a single computer.
e. A computer that responds to a file sharing request is
functioning as a server.
ITE PC v4.0
Chapter 1 Rainier Pimentel 8
What are two characteristics of peer-to-
peer networks? (Choose two.)
a. scalable
b. one way data flow
c. decentralized resources
d. centralized user accounts
e. resource sharing without a dedicated server
ITE PC v4.0
Chapter 1 Rainier Pimentel 9
What are two characteristics of peer-to-
peer networks? (Choose two.)
a. scalable
b. one way data flow
c. decentralized resources
d. centralized user accounts
e. resource sharing without a dedicated server
ITE PC v4.0
Chapter 1 Rainier Pimentel 10
Peer to Peer
ITE PC v4.0
Chapter 1 Rainier Pimentel 11
What are three properties of peer-to-peer
applications? (Choose three.)
ITE PC v4.0
Chapter 1 Rainier Pimentel 12
What are three properties of peer-to-peer
applications? (Choose three.)
ITE PC v4.0
Chapter 1 Rainier Pimentel 13
Client/Server Networks
ITE PC v4.0
Chapter 1 Rainier Pimentel 14
Client/Server Network
Some nodes (SERVER) are dedicated to present
services to other nodes (CLIENTS)
Client1 Client3
• centralized administration
• security is easier to
enforce
Client2 Server
ITE PC v4.0
Chapter 1 Rainier Pimentel 15
Client/Server Network
ITE PC v4.0
Chapter 1 Rainier Pimentel 17
What are two characteristics of clients in
data networks? (Choose two.)
1. initiate data exchanges
2. are repositories of data
3. may upload data to servers
4. listen for requests from servers
ITE PC v4.0
Chapter 1 Rainier Pimentel 18
What are two characteristics of clients in
data networks? (Choose two.)
1. initiate data exchanges
2. are repositories of data
3. may upload data to servers
4. listen for requests from servers
ITE PC v4.0
Chapter 1 Rainier Pimentel 19
A network administrator is designing a
network for a new branch office of twenty-five
users. What are the advantages of using a
client-server model? (Choose two.)
a. centralized administration
b. does not require specialized software
c. security is easier to enforce
d. lower cost implementation
ITE PC v4.0
Chapter 1 Rainier Pimentel 20
A network administrator is designing a
network for a new branch office of twenty-five
users. What are the advantages of using a
client-server model? (Choose two.)
a. centralized administration
b. does not require specialized software
c. security is easier to enforce
d. lower cost implementation
ITE PC v4.0
Chapter 1 Rainier Pimentel 21
Applications – The Interface Between
Human and Data Networks
Applications provide the means for generating and
receiving data that can be transported on the network
ITE PC v4.0
Chapter 1 Rainier Pimentel 22
Application layer (definitions)
ITE PC v4.0
Chapter 1 Rainier Pimentel 23
Which layer of the OSI model supplies
services that allow user to interface with the
network?
a. physical
b. session
c. network
d. presentation
e. application
f. transport
ITE PC v4.0
Chapter 1 Rainier Pimentel 24
Which layer of the OSI model supplies
services that allow user to interface with the
network?
a. physical
b. session
c. network
d. presentation
e. application
f. transport
ITE PC v4.0
Chapter 1 Rainier Pimentel 25
What is the role of the OSI application
layer?
ITE PC v4.0
Chapter 1 Rainier Pimentel 26
What is the role of the OSI application
layer?
ITE PC v4.0
Chapter 1 Rainier Pimentel 27
2 Forms of Application
Layer Software
Applications
Web browsers, Email program…
Services
Application Protocols
(FTP, HTTP, DNS, Telnet, DHCP…)
ITE PC v4.0
Chapter 1 Rainier Pimentel 28
What are two forms of application layer
software? (Choose two.)
a. applications
b. dialogs
c. requests
d. services
e. spreadsheet
ITE PC v4.0
Chapter 1 Rainier Pimentel 29
What are two forms of application layer
software? (Choose two.)
a. applications
b. dialogs
c. requests
d. services
e. spreadsheet
ITE PC v4.0
Chapter 1 Rainier Pimentel 30
Application Layer Protocols
FTP and TFTP
File Transfer Protocol (FTP)
FTP enables file sharing between hosts.
FTP is commonly used to support for file
transfers between a client and a server
Trivial File Transfer Protocol (TFTP)
TFTP is a connectionless service that uses the
User Datagram Protocol (UDP).
ITE PC v4.0
Chapter 1 Rainier Pimentel 31
What application layer protocol is commonly used to
support for file transfers between a client and a
server?
a. DNS
b. HTTP
c. FTP
d. Telnet
ITE PC v4.0
Chapter 1 Rainier Pimentel 32
What application layer protocol is commonly used to
support for file transfers between a client and a
server?
a. DNS
b. HTTP
c. FTP
d. Telnet
ITE PC v4.0
Chapter 1 Rainier Pimentel 33
Application Layer Protocols
Server Message Block (SMB) is an application
layer protocol that describes the services that are
used for file sharing in Microsoft networks
Network File System (NFS) – NFS is a distributed
file system protocol suite developed by Sun
Microsystems that allows file access to a remote
storage device such as a hard disk across a
network.
ITE PC v4.0
Chapter 1 Rainier Pimentel 34
What application layer protocol describes the
services that are used for file sharing in
Microsoft networks?
a. DHCP
b. DNS
c. SMB
d. SMTP
e. WINS
ITE PC v4.0
Chapter 1 Rainier Pimentel 35
What application layer protocol describes the
services that are used for file sharing in
Microsoft networks?
a. DHCP
b. DNS
c. SMB
d. SMTP
e. WINS
ITE PC v4.0
Chapter 1 Rainier Pimentel 36
Application Layer Protocols
Simple Mail Transfer Protocol (SMTP) – SMTP
administers the transmission of e-mail over
computer networks.
It is used to forward mail between servers.
It is a protocol that operates at the Application
layer of the OSI model
ITE PC v4.0
Chapter 1 Rainier Pimentel 37
Application Layer Protocols
(Telnet and SSH)
Terminal emulation (Telnet) – Telnet provides the
capability to remotely access another computer.
Secure Shell (SSH), a common network protocol for
remote administration of Unix computers.
ITE PC v4.0
Chapter 1 Rainier Pimentel 38
Telnet protocol
Telnet
provides a
virtual
connection for
remote access
ITE PC v4.0
Chapter 1 Rainier Pimentel 39
Which application layer protocols correctly
match a corresponding function? (Choose
two.)
ITE PC v4.0
Chapter 1 Rainier Pimentel 40
Which application layer protocols correctly
match a corresponding function? (Choose
two.)
ITE PC v4.0
Chapter 1 Rainier Pimentel 41
As compared to SSH, what is the primary
disadvantage of telnet?
ITE PC v4.0
Chapter 1 Rainier Pimentel 42
As compared to SSH, what is the primary
disadvantage of telnet?
ITE PC v4.0
Chapter 1 Rainier Pimentel 43
Application Layer Protocols
ITE PC v4.0
Chapter 1 Rainier Pimentel 44
Application Layer Protocols
HTTP and HTTPS
HTTP - defines the rules for transferring information,
files, and multimedia on web pages. Hypertext Markup
Language (HTML) is the language used within HTTP.
HTTPS is the secured version of the HTTP application,
which normally uses 128 bit SSL encryption to secure
the information sent and received on a web page.
ITE PC v4.0
Chapter 1 Rainier Pimentel 45
Which two protocols are used to control the
transfer of web resources from a web server to
a client browser? (Choose two.)
a. ASP
b. FTP
c. HTML
d. HTTP
e. HTTPS
ITE PC v4.0
Chapter 1 Rainier Pimentel 46
Which two protocols are used to control the
transfer of web resources from a web server to
a client browser? (Choose two.)
a. ASP
b. FTP
c. HTML
d. HTTP
e. HTTPS
ITE PC v4.0
Chapter 1 Rainier Pimentel 47
DHCP
ITE PC v4.0
Chapter 1 Rainier Pimentel 48
DHCP
ITE PC v4.0
Chapter 1 Rainier Pimentel 49
DHCP
ITE PC v4.0
Chapter 1 Rainier Pimentel 51
DNS
ITE PC v4.0
Chapter 1 Rainier Pimentel 52
DNS (Common Resource Records)
Record Type Use
The A record maps a DNS host name to an IP
A (host address) address. This is the most common resource
record type.
The CNAME record provides alternate names
CNAME (canonical
(or aliases) to hosts that already have an A
name)
record.
The MX record identifies servers that can be
MX (Mail Exchanger)
used to deliver mail.
The NS resource record identifies all name
NS (name server) servers that can perform name resolution for the
zone.
In a reverse lookup zone, the PTR record maps
PTR (pointer) an IP address to a host name (i.e. "points" to an
A record).
ITE PC v4.0
Chapter 1 Rainier Pimentel 53
Email Services and POP3/SMTP
Protocols
POP3 (Post Office Protocol version 3) allows your
computer to receive emails and SMTP means it can
send emails.
POP3 allows users to pickup email across the network.
SMTP (Simple Mail Transfer Protocol) – delivers email
across the network.
email components are used to forward mail between
servers.
ITE PC v4.0
Chapter 1 Rainier Pimentel 54
MUA (Mail User Agent)
ITE PC v4.0
Chapter 1 Rainier Pimentel 55
MDA (Mail Delivery Agent)
A MDA is software that delivers e-mail messages right
after they've been accepted on a server.
MTA passes email to the MDA for final delivery.
ITE PC v4.0
Chapter 1 Rainier Pimentel 56
MTA (Mail Transfer Agent )
ITE PC v4.0
Chapter 1 Rainier Pimentel 57
MTA
ITE PC v4.0
Chapter 1 Rainier Pimentel 58
Email Services (SMTP and POP)
MTA and SMTP are
email components are
used to forward mail
between servers
ITE PC v4.0
Chapter 1 Rainier Pimentel 59
Email Services (SMTP and POP)
1. MUA
2. SMTP
3. MTA
4. SMTP
5. MTA
6. MDA
7. POP
8. MUA
ITE PC v4.0
Chapter 1 Rainier Pimentel 61
Which email components are used to forward
mail between servers? (Choose two.)
a. MDA
b. IMAP
c. MTA
d. POP
e. SMTP
ITE PC v4.0
Chapter 1 Rainier Pimentel 62
Which email components are used to forward
mail between servers? (Choose two.)
a. MDA
b. IMAP
c. MTA
d. POP
e. SMTP
ITE PC v4.0
Chapter 1 Rainier Pimentel 63
Which statements are correct concerning the
role of the MTA in handling email? (Choose
three.)
ITE PC v4.0
Chapter 1 Rainier Pimentel 64
Which statements are correct concerning the
role of the MTA in handling email? (Choose
three.)
ITE PC v4.0
Chapter 1 Rainier Pimentel 65
Presentation Layer
ITE PC v4.0
Chapter 1 Rainier Pimentel 66
Port Numbers
ITE PC v4.0
Chapter 1 Rainier Pimentel 67
ITE PC v4.0
Chapter 1 Rainier Pimentel 68
What is the destination port for the
communication that is represented on line 82?
a. 80
b. 1261
c. 15533
d. 3912
e. 65520
ITE PC v4.0
Chapter 1 Rainier Pimentel 69
What is the destination port for the
communication that is represented on line 82?
a. 80
b. 1261
c. 15533
d. 3912
e. 65520
ITE PC v4.0
Chapter 1 Rainier Pimentel 70
How does the application layer on a
server usually process multiple client
request for services?
a. ceases all connections to the service
b. denies multiple connections to a single daemon
c. suspends the current connection to allow the new
connection
d. uses support from lower layer functions to distinguish
between connections to the service
ITE PC v4.0
Chapter 1 Rainier Pimentel 71
How does the application layer on a
server usually process multiple client
request for services?
a. ceases all connections to the service
b. denies multiple connections to a single daemon
c. suspends the current connection to allow the new
connection
d. uses support from lower layer functions to distinguish
between connections to the service
ITE PC v4.0
Chapter 1 Rainier Pimentel 72
ITE PC v4.0
Chapter 1 Rainier Pimentel 73
Summary
ITE PC v4.0
Chapter 1 Rainier Pimentel 74