Professional Documents
Culture Documents
CCNA1-CH15-Application Layer
CCNA1-CH15-Application Layer
HTTP HTTP
• TCP/IP application layer fits roughly to the OSI: “Application, Presentation and
Session layers”.
• Application Layer:
The first step for getting data on to the network , uses a protocol that
encapsulate , arrange and format data i.e. HTTP Protocol in a form to be
readable to the destination.
• Application Software:
Formatting, or presenting, data at the source device into a compatible format for receipt
by the destination device.
Compressing data in a way that can be decompressed by the destination device.
Encrypting data for transmission and decrypting data upon receipt.
The presentation layer formats data for the application layer, and it sets standards for file
formats. Some well-known standards for video include Matroska Video (MKV), Motion Picture
Experts Group (MPG), and QuickTime Video (MOV). Some well-known graphic image formats
are Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPG), and Portable
Network Graphics (PNG) format.
4
The Session Layer
Handles :
5
Application Layer – OSI and TCP/IP Models
APPLICATIONS
APPLICATIONS
Telnet: Terminal emulation – Remote access “CLI” to servers and network devices.
Application Layer – OSI and TCP/IP Models
APPLICATIONS
SMTP (Simple Mail Transfer Protocol): Transfer of mail messages and attachments.
Application Layer – OSI and TCP/IP Models
APPLICATIONS
APPLICATIONS
APPLICATIONS
HTTP (Hypertext Transfer Protocol): Transfer files that make up web pages.
Application Layer – OSI and TCP/IP Models
Web
APPLICATIONS
HTTP - Hypertext Transfer Protocol
TCP 80, 8080
A set of rules for exchanging text, graphic images, sound, video, and other
multimedia files on the World Wide Web
APPLICATIONS
File Transfer
APPLICATIONS
• Web server.
• Email server.
• FTP Server: File or database server (Different files ) , may require an account
and password before allowing a transfer.
• Domain Controller Server: Will require a user name and password in order to
access the network.
19
Peer-to-Peer (P2P) Networking and Applications
Peer-to-Peer Model
User accounts and access rights must be set individually on each peer device.
P2P File Sharing Application
Is an application that is installed on stations connected using any type of network
and unlike a peer-to-peer network, it allows a device to act as both a client and a
server within the same communication.
Some P2P applications use a hybrid system where resource sharing is decentralized,
but the indexes that point to resource locations are stored in a centralized directory.
In a hybrid system, each peer accesses an index server to get the location of
a resource stored on another peer.
Once connected, the communication takes place between the two peers without
additional communication to the index server.
Napster 21
P2P File Sharing Application
Peer-to-peer applications such as:
Shareaz
eDonkey
and Bitcoin
allow one network device to assume the role of server, while one or more other
network devices assume the role of client using the peer-to-peer application.
Napster 22
Application Layer Protocols
TCP/IP Application Layer Protocols
Application
Layer
HTTP SMTP POP FTP DNS DHCP TFTP SNMP
Transport
Layer
TCP UDP
Internet
Layer
IP
Network
Access
Layer LAN / WAN
Introduction
IP TCP HTTP
Header Header Header
Data
IP TCP HTTP
Header Header Header
Data
Telnet Telnet 23
Dynamic Host Configuration Protocol
DHCP 67,68
“UDP”
File Transfer Protocol FTP 20, 21
HTTP (WWW)
DHCP
(IP address
resolution)
FTP
(file transfer) DNS
(domain name
resolution)
SMB
SMTP (email) (file sharing)
P2P
Telnet (file sharing)
(remote login)
27
DNS – Domain Name System
28
Domain Name System (DNS)
1
2 www.cisco.com
3
www.cisco.com = 198.133.219.25
1
2 www.cisco.com
3 4
www.cisco.com = 198.133.219.25 198.133.219.25
4. The DNS server then sends the IP Address back to the client that made the
request. The IP Address will be used in the encapsulation process as the
destination address for packets going to www.cisco.com.
Name Resolution
Recursive queries
Iterative queries
34
DNS Name Resolution
:Example
Step 1.
The DNS resolver on the DNS client sends a recursive query to its configured
Local DNS server.
Requests IP address for "www.example.com".
The DNS server for that client is responsible for resolving the name
• Cannot refer the DNS client to another DNS server.
35
2
2
DNS Name Resolution 3
Step 2.
Local DNS Server forwards the query to a Root DNS server , if not saved in cash
Step 3.
36
DNS Name Resolution
4
4
Step 4.
The local DNS server sends query for www.example.com to one of the TLD
servers.
Step 5.
TLD Server
• Makes note of example.com
• Returns IP address for authoritative server example.com (such as
dns.example.com server)
37
DNS Name Resolution
6
7
Step 6.
Local DNS server sends query for www.example.com directly to DNS server for
example.com
Step 7.
38
DNS Name Resolution
Step 8.
Local DNS server sends the IP address of www.example.com to the DNS client.
DNS Caching
39
DNS Name Resolution
The DNS server stores different types of resource records that are used to resolve
names. These records contain the name, address, and type of record. Some of these
record types are as follows:
40
DNS Name Resolution
The different top-level domains represent either the type of organization or the
country of origin. Examples of top-level domains are the following:
.com - a business or industry
.org - a non-profit organization
.au - Australia
.co - Colombia
41
DNS Name Resolution
42
Domain Name System (DNS)
• Utility - nslookup:
• Windows operating systems provide the nslookup utility.
• Use to query a domain name and get the IP Address.
Domain Name System (DNS)
Utility:
ipconfig /displaydns
ipconfig /flushdns
Protocol
Browser
• Web browsers are the client applications used to interpret the HTTP
application protocol received from a web server.
• When a URL is requested , the web browser establishes a connection
request to the web service “d” running on the HTTP server .
WWW Service and HTTP
• Web Server:
• Stores the web pages that contains objects (HTML, Pictures, Video, Files).
• Each is accessible by a URL.
• Examples : Apache, Microsoft Internet Information Server (MIIS)
http://www.cambriancollege.ca/Pages/Home.aspx
http://www.cambriancollege.ca:80/Search/Results.aspx?k=CETY
e.g. GET : Is a client request for data. A web browser sends the GET message
to request pages from a web server.
POST - Uploads data files to the web server such as form data.
PUT - Uploads resources or content to the web server such as an image.
WWW Service and HTTP
50
Email Services & SMTP/POP Protocols
Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP) are involved in
email services. “POP for receiving and SMTP for sending”
Users use an application called a Mail User Agent (MUA), or e-mail client to
allow messages to be sent and places received messages into the client's mailbox.
51
SMTP – Simple Mail Transfer Protocol
POP3 IMAP
• User agents
Allows users to read, reply, compose, forward, save, etc., mail messages
• Mail servers
Stores user mail boxes, communicates with local user agents and other
mail servers.
• Mail protocols: SMTP, POP3, IMAP, HTTP
52
SMTP – Simple Mail Transfer Protocol
POP3
IMAP
SMTP
• Transfers messages from sender’s mail server to recipient’s mail server
• Push protocol, not a pull protocol
Push (from client to server or server to server)
Pull (from server to client)
Retrieving email
• Historically, users would log into local mail server to read mail.
• Since early 1990’s, clients use mail access protocols:
POP3
IMAP
HTTP
53
FYI- POP – Post Office Protocole
Web-based email
55
Mail Protocols
POP, POP3, and IMAP are protocols that are used to retrieve email from servers.
SMTP is the default protocol that is used to send email. DNS may be used by
the sender email server to find the address of the destination email server.
56
FTP (File Transfer Protocol)
FTP Server
FTP Client
FTP was developed to allow for file transfers between a client and a server.
An FTP client is an application that runs on a computer Used to push and pull
files from a server running the FTP daemon (FTPd).
Uses get and put commands.
57
FTP (File Transfer Protocol)
Client initiates a TCP control connection on Port 21. Username and password….
21
20
For each file transferred, TCP opens and closes a Data connection on Port 20.
Client initiates a TCP control connection with FTP server using port 21.
• This connection remains open until the user quits the FTP application.
• TCP port 21 connection includes:
Username and password is sent over TCP port 21.
58
Server Message Block Protocol (SMB)
• IP address.
• Subnet mask.
• Default gateway.
• Domain name.
• DNS Server.
• Server on LAN.
• Router.
• Server at ISP “Accessed
remotely on the WAN.
63
Dynamic Host Configuration Protocol (DHCP)
• DHCP is a four step process , starts usually when the client is powered on
3. The client may receive multiple DHCP OFFER packets if there is more
than one DHCP server on the local network, so it must choose
between them, The client responds by broadcasting a DHCP Request
that identifies the server and the lease offer it is accepting.
Dynamic Host Configuration Protocol (DHCP)
4. If the offer is still valid, the server returns a DHCP Acknowledgement and
records that information as used. If it is no longer valid perhaps due to a
time-out or another client allocating the lease, a DHCP Negative
Acknowledgement “NACK” is sent and the process begins again.
Telnet
Allows a user to remotely access another device (host, router, switch) with a Telnet
server software from any Telnet client end device “ Putty , Teraterm , Hyperterm”.
68
Telnet
Telnet supports user
authentication, but does not
encrypt data.
• Stronger authentication
• Encrypts data
70