0% found this document useful (0 votes)
16 views23 pages

Lec 3.v2

The document discusses protocols at the application layer of the OSI model including HTTP, SMTP, POP, IMAP, DNS, DHCP, and FTP. It provides details on how these protocols work, the ports they use, and examples of their operations and functions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views23 pages

Lec 3.v2

The document discusses protocols at the application layer of the OSI model including HTTP, SMTP, POP, IMAP, DNS, DHCP, and FTP. It provides details on how these protocols work, the ports they use, and examples of their operations and functions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Layer 7: Application Layer

1
Reference Models
The OSI Reference Model
 The application layer provides the interface between the
applications user to communicate, and the underlying network
over which messages are transmitted.
 Some of the most widely known application layer protocols
include HTTP,SMTP, POP, IMAP, DNS,DHCP, and FTP

2
Well-Known Application
Layer Protocols and Services

3
Web and Email Protocols
Hypertext Transfer Protocol
 When a web address or uniform
resource locator (URL) is typed into a
web browser, the web browser
establishes a connection to the web
service running on the server, using the
HTTP protocol.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Web and Email Protocols
Hypertext Transfer Protocol
 When a web address or uniform resource locator (URL) is typed into a web browser, the
web browser establishes a connection to the web service running on the server, using
the HTTP protocol.
 Step 1:
• The browser interprets the three parts of the URL:
 HTTP (the protocol)
 www.cisco.com (the server's name)
 Index.html (the specific filename requested)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Web and Email Protocols
Hypertext Transfer Protocol
 Step 2:
• the browser then checks with a name
server to convert www.cisco.com into
a numeric IP address which it uses
connect to the server
• The client initiates an HTTP request to
a server by sending GET request to
the server and ask for the index.html
file

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Web and Email Protocols
Hypertext Transfer Protocol
 Step 3:

• In response to the request, the server


sends the HTML code for this web
page to the browser.

 Step 4:
• The browser deciphers the HTML
code and format the page for the
browser windows

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Web and Email Protocols
HTTP and HTTPS
 HTTP is a request/response protocol.

 Three common HTTP message types


are:
• GET - A client request for data.
• POST - Uploads data files to the web
server such as form data.
• PUT - Uploads resources or content to
the web server such as image.
 HTTP Secure (HTTPS) protocol uses
encryption and authentication to secure
data.
• Hypertext Transfer Protocol (HTTP) TCP
port 80
• Secure HTTP (HTTPS) TCP port 443 8
Web and Email Protocols
Email Protocols
 Email clients communicate with mail
servers to send and receive email.
 Mail servers communicate with other
mail servers to transport messages
from one domain to another.
 Three protocols for email:
• Simple Mail Transfer Protocol (SMTP)
to send email.
• Post Office Protocol (POP) to retrieve
email.
• Internet Message Access Protocol
(IMAP) to retrieve email.
9
Web and Email Protocols
SMTP Operation
 When a client sends email, the
client SMTP process connects
with a server SMTP process on
TCP well Know port 25.

 When the server receives the


message, it either places the
message in a local account, or
relays the message to another
mail server.
 Users use email clients to
retrieve messages stored on
the server.

10
Web and Email Protocols
POP Operation
• Messages are downloaded
from the server to the client.
• Email clients direct their POP
requests to mail servers on
port TCP 110.
• POP allows for email
messages to be downloaded
to the client’s device
(computer or phone) and
removed from the server.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Web and Email Protocols
IMAP Operation
 IMAP is used to retrieve
mail from a mail server.
 Copies of messages are
downloaded from the
server to the client and the
original messages are
stored on the server.
 IMAP uses TCP port 143

12
IP Addressing Services
Domain Name Service
 Domain names convert the
numeric address into a
simple, recognizable name.
 The DNS protocol defines
an automated service that
matches resource names
with the required numeric
network address.
 DNS Uses TCP/UDP port
53

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
IP Addressing Services
Domain Name Service
 When a client makes a query, the server’s DNS process first looks at its own
records to resolve the name.
 If unable to resolve, it contacts other servers to resolve the name.

 The server temporarily stores the numbered address in the event that the same
name is requested again.
 The ipconfig /displaydns command displays all of the cached DNS entries on a
Windows PC.

14
IP Addressing Services
DNS Hierarchy

15
IP Addressing Services
Dynamic Host Configuration Protocol (DHCP)
• Computers need network IP
information to communicate over a
network.
• IP information include host IP address
and gateway addresses, mask, and DNS
server.
• DHCP allows for automated and
scalable distribution of IP information.
• DHCP-distributed addresses are
leased for a set period of time.
• Addresses are returned to the pool for
reuse when no longer in use.
• DHCP supports IPv4 and DHCPv6
supports IPv6.
A DHCP server listens to UDP port 67 and dynamically assigns IP addresses and other network 16
parameters to DHCP clients. These clients will listen for responses on UDP port 68.
IP Addressing Services
DHCP Operation
 DHCP Operation
• The client broadcasts a DHCPDISCOVER message
to identify any available DHCP servers on the
network.
• A DHCP server replies with DHCPOFFER message
, which offer a lease to the client. (if a client receives
more than one offer due to multiple DHCP servers
on the network, it must choose one).
• The client sends a DHCPREQUEST message to the
server it wants to use (in case of multiple offers).
• A client may also request an address previously
been allocated by the server.
• The server returns a DHCPACK
to confirm the lease has been finalized.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
IP Addressing Services
APIPA
 APIPA stands for Automatic Private IP Addressing.

 It is a feature Windows in operating systems which enables


computers to self-configure an IP address and subnet mask
automatically when their DHCP server isn’t reachable.
 The IP address range for APIPA is (169.254.0.1 to
169.254.255.254 ) having 65, 534 usable IP addresses, with
the subnet mask of 255.255.0.0.

18
File Sharing Services
File Transfer Protocol
• FTP was developed to allow the transfer of files over
the network.
• An FTP client is an application that runs on a client
computer used to push and pull data from an FTP
server.
• Step1: the client establishes the first connection to
the server for control traffic using TCP port 21. The
traffic consists of client commands and server replies.
• Step 2: the client establishes the second connection
to the server for the actual data transfer using TCP
port 20. This connection is created every time there is
data to be transferred.
• Step3: the data transfer can happen in either
direction. The client can download data from the
server or the client upload data to the server © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Layer 6: Presentation Layer

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Reference Models
The OSI Reference Model
 The Presentation layer is responsible for presenting the
data in the required format which may include:

• Encryption
• Compression

21
Layer 7: Session Layer

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Reference Models
The OSI Reference Model
The session layer provides the mechanism for
establishing, managing, and terminating sessions,
between two computers.
• Full duplex
• Half-duplex

23

You might also like