Networking-Application Layer
Networking-Application Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Application Session and Presentation
Application Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
How Application Protocols Interact with End-User Applications
Peer-to-Peer Networks
The roles of client and server are set on a per request basis.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
How Application Protocols Interact with End-User Applications
Peer-to-Peer Applications
Client and server in the same communication
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
How Application Protocols Interact with End-User Applications
Client-Server Model
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Common Application Layer Protocols
HTTP and HTTPS
• Developed to publish
and retrieve HTML
pages
• Used for data transfer
• Specifies a
request/response
protocol
• Three common
message types are
GET, POST, and PUT
• GET is a client
request for data
• POST and PUT are
used to send
messages that upload
data to the web
Presentation_ID
server
© 2008 Cisco Systems, Inc. All rights reserved.7 Cisco Confidential
Common Application Layer Protocols
SMTP, POP, and IMAP
• Typically use an application
called a Mail User Agent
(email client)
• Allows messages to be sent
• Places received messages
into the client's mailbox
• SMTP - Send email from
either a client or a server
• POP - Receive email
messages from an email
server
• IMAP - Internet Message
Access Protocol
• Email client provides the
functionality of both
protocols within one
application
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Common Application Layer Protocols
SMTP, POP, and IMAP
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Common Application Layer Protocols
SMTP, POP, and IMAP (Continued)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Common Application Layer Protocols
SMTP, POP, and IMAP (Continued) Post Office Protocol
(POP)
§ enables a workstation
to retrieve mail from a
mail server
§ mail is downloaded
from the server to the
client and then
deleted on the server
§ uses port 110
§ POP does not store
messages
§ POP3 is desirable for
an ISP, because it
alleviates their
responsibility for
managing large
amounts of storage
for their email servers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Common Application Layer Protocols
SMTP, POP, and IMAP (Continued)
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Providing IP Addressing Services
Domain Name Service
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Providing IP Addressing Services
DNS Hierarchy
Examples top-
level domains:
.au - Australia
.co - Colombia
.com - business
or industry
.jp - Japan
.org - non-profit
organization
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Providing IP Addressing Services
nslookup
• Operating system utility called nslookup allows the user to manually
query the name servers to resolve a given host name
• Utility can be used to troubleshoot name resolution issues and to verify
the current status of the name servers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Providing IP Addressing Services
Dynamic Host Configuration Protocol
§ DHCP allows a host to
obtain an IP address
dynamically
§ DHCP server is
contacted and address
requested - chooses
address from a
configured range of
addresses called a pool
and “leases” it to the
host for a set period
§ DHCP used for general
purpose hosts such as
end user devices, and
static addressing is
used for network
devices such as
gateways, switches,
servers and printers
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Providing File Sharing Services
File Transfer Protocol
• FTP allow data
transfers between a
client and a server
• FTP client is an
application that runs
on a computer that is
used to push and pull
data from a server
running an FTP
daemon
• To successfully
transfer data, FTP
requires two
connections between
the client and the
server, one for
commands and
replies, the other for
the actual file transfer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Providing File Sharing Services
Server Message Block
• Clients
establish a long
term connection
to servers
• After the
connection is
established, the
user can
access the
resources on
the server as if
the resource is
local to the
client host
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Move It!
The Internet of Things
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Move It!
Message Travels Through a Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Move It!
Message Travels Through a Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Move It!
Message Travels Through a Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Move It!
Getting the Data to the End Device
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Move It!
Getting the Data through the Internetwork
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Move It!
Getting the Data to the Right Application
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26