0% found this document useful (0 votes)
11 views26 pages

Networking-Application Layer

The document discusses the Application Layer protocols, highlighting their role in facilitating communication between end-user applications. It covers various protocols including HTTP, SMTP, POP, IMAP, DNS, DHCP, FTP, and SMB, explaining their functions and interactions in network communication. Additionally, it emphasizes the importance of these protocols in enabling services such as email, file transfers, and dynamic IP addressing.

Uploaded by

ashuraweismann
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views26 pages

Networking-Application Layer

The document discusses the Application Layer protocols, highlighting their role in facilitating communication between end-user applications. It covers various protocols including HTTP, SMTP, POP, IMAP, DNS, DHCP, FTP, and SMB, explaining their functions and interactions in network communication. Additionally, it emphasizes the importance of these protocols in enabling services such as email, file transfers, and dynamic IP addressing.

Uploaded by

ashuraweismann
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

10.

1 Application Layer Protocols


The Application Layer provides the interface to the network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Application Session and Presentation
Application Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
How Application Protocols Interact with End-User Applications
Peer-to-Peer Networks

Both devices are considered equal in the communication

The roles of client and server are set on a per request basis.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
How Application Protocols Interact with End-User Applications
Peer-to-Peer Applications
Client and server in the same communication

Both can initiate a communication and are considered equal


in the communication process
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
How Application Protocols Interact with End-User Applications
Client-Server Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
How Application Protocols Interact with End-User Applications
Client-Server Model

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Common Application Layer Protocols
HTTP and HTTPS
• Developed to publish
and retrieve HTML
pages
• Used for data transfer
• Specifies a
request/response
protocol
• Three common
message types are
GET, POST, and PUT
• GET is a client
request for data
• POST and PUT are
used to send
messages that upload
data to the web
Presentation_ID
server
© 2008 Cisco Systems, Inc. All rights reserved.7 Cisco Confidential
Common Application Layer Protocols
SMTP, POP, and IMAP
• Typically use an application
called a Mail User Agent
(email client)
• Allows messages to be sent
• Places received messages
into the client's mailbox
• SMTP - Send email from
either a client or a server
• POP - Receive email
messages from an email
server
• IMAP - Internet Message
Access Protocol
• Email client provides the
functionality of both
protocols within one
application

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Common Application Layer Protocols
SMTP, POP, and IMAP

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Common Application Layer Protocols
SMTP, POP, and IMAP (Continued)

Simple Mail Transfer


Protocol (SMTP)
§ transfers mail
§ message must be
formatted properly
§ SMTP processes
must be running on
both the client and
server
§ message header
must have a properly
formatted recipient
email address and a
sender
§ uses port 25

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Common Application Layer Protocols
SMTP, POP, and IMAP (Continued) Post Office Protocol
(POP)
§ enables a workstation
to retrieve mail from a
mail server
§ mail is downloaded
from the server to the
client and then
deleted on the server
§ uses port 110
§ POP does not store
messages
§ POP3 is desirable for
an ISP, because it
alleviates their
responsibility for
managing large
amounts of storage
for their email servers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Common Application Layer Protocols
SMTP, POP, and IMAP (Continued)

Simple Mail Transfer Protocol (SMTP)


• Transfers mail reliably and efficiently

Post Office Protocol (POP)


• Enables a workstation to retrieve mail from a mail server
• With POP, mail is downloaded from the server to the
client and then deleted on the server

Internet Message Access Protocol (IMAP)


• Another protocol that to retrieves email messages
• Unlike POP, when the user connects to an IMAP-capable
server, copies of the messages are downloaded to the
client application
• Original messages are kept on the server until manually
deleted
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Providing IP Addressing Services
Domain Name Service

A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Providing IP Addressing Services
Domain Name Service

A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Providing IP Addressing Services
DNS Hierarchy

Examples top-
level domains:

.au - Australia

.co - Colombia

.com - business
or industry

.jp - Japan

.org - non-profit
organization

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Providing IP Addressing Services
nslookup
• Operating system utility called nslookup allows the user to manually
query the name servers to resolve a given host name
• Utility can be used to troubleshoot name resolution issues and to verify
the current status of the name servers

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Providing IP Addressing Services
Dynamic Host Configuration Protocol
§ DHCP allows a host to
obtain an IP address
dynamically
§ DHCP server is
contacted and address
requested - chooses
address from a
configured range of
addresses called a pool
and “leases” it to the
host for a set period
§ DHCP used for general
purpose hosts such as
end user devices, and
static addressing is
used for network
devices such as
gateways, switches,
servers and printers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Providing File Sharing Services
File Transfer Protocol
• FTP allow data
transfers between a
client and a server
• FTP client is an
application that runs
on a computer that is
used to push and pull
data from a server
running an FTP
daemon
• To successfully
transfer data, FTP
requires two
connections between
the client and the
server, one for
commands and
replies, the other for
the actual file transfer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Providing File Sharing Services
Server Message Block
• Clients
establish a long
term connection
to servers
• After the
connection is
established, the
user can
access the
resources on
the server as if
the resource is
local to the
client host

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Move It!
The Internet of Things

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Move It!
Message Travels Through a Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Move It!
Message Travels Through a Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Move It!
Message Travels Through a Network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Move It!
Getting the Data to the End Device

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Move It!
Getting the Data through the Internetwork

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Move It!
Getting the Data to the Right Application

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26

You might also like