SlideShare a Scribd company logo
1 of 34
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Network Fundamentals
Last Update: 12/6/2010
Abdekhalik Elsaid Mosa
abdu.elsaid@yahoo.com
http://abdelkhalik.staff.scuegypt.edu.eg/
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• OSI: is a layered, abstract representation created as a guideline
for network protocol design.
• Application Layer, provides human interface to the network.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer
• Application Layer, functions:
Provides the interface between the applications and network.
• Presentation Layer functions:
Handles the conversion of data between different formats.
 Encoding and decoding.
 Encryption and decryption.
 Compression and decompression.
• Session Layer functions:
Maintains dialogs between source and destination applications.
 Create session
 Manage and maintain session
 Terminate session
Most applications, like web browsers
Include functionality of the OSI
layers 5, 6 and 7.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application Layer Software
• The 2 forms of S/W programs that provide access to the network.
1.Network-Aware applications:
are able to communicate directly
with the protocol stack.
Ex: E-mail clients, and web browser
2.Application layer services:
are the programs that interface
with the network and prepare the
data for transfer.
Ex: network print spooling
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
User Applications, Services, and Protocols
• Applications: Provide the human interface.
• Services: Establish an interface to the network.
• Protocols: Are rules and formats that govern how data is treated.
• The (applications,
services, and protocols)
may be used by a single
exe. Program.
Ex: Telnet, FTP
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Servers
• Servers usually are repositories of data.
• The server runs a service, sometimes called a server daemon.
• Daemons run in the background and are not under an end user's
direct control.
• Daemons are described as "listening"
for a request from a client.
• When a daemon "hears"
a request from a client:
It exchanges appropriate
messages with the client,
and then sends the
requested data to the client.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Client-Server Model
• Client: the device requesting Information.
• Server: the device which responds to the request.
• Centralized Administration.
• Security is easier to enforce.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer (P2P) Networking and Applications
• Peer-to-peer networking involves two distinct forms:
1. Peer-to-peer network design
2. Peer-to-peer applications.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Network Design
• Two or more computers are connected via a network and can
share resources without having a dedicated server.
• End device (peer) can function as either a server or a client.
• Decentralized Administration.
• Security is difficult to enforce.
• Used in small home networks
for file sharing and games.
• One computer might
assume the role of
server for one transaction
while simultaneously serving as a client for another.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Peer-to-Peer Applications
• P2P applications allows a device to act as both a client and a
server within the same communication.
• Every client is a server and every server a client.
• Peer-to-peer applications can be used on peer-to-peer
networks, client/server networks, and across the Internet.
• Some P2P applications use a hybrid system.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Application layer Protocols and Port numbers
• The Transport layer uses port number addressing .
• Port numbers identify applications and Application layer services.
• Server programs generally use predefined port numbers that are
commonly known by clients.
• Examples:
Telnet - TCP Port 23DNS - TCP/UDP Port 53
DHCP - UDP Port 67HTTP - TCP Port 80
FTP - TCP Ports 20 and 21SMTP - TCP Port 25
POP - UDP Port 110
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Domain Name System (DNS)
• Devices are labeled with numeric IP addresses.
• Domain Names were created to convert the numeric address into
a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com
• DNS client is sometimes called DNS Resolver.
• A DNS Server provides name resolution using the name daemon.
• The DNS server stores different types of resource records (RRs)
used to resolve names.
• These records contain the
name, address, and others.
nslookup
• Displays default DNS server for
your host.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Servers Hierarchy
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DNS Name Resolution
Step 1:
• The DNS resolver sends a
recursive query to its Local
DNS server.
• Requests IP address for "www.example.com".
• The Local DNS server is responsible for resolving the name.
– Cannot refer the DNS client to another DNS server.
1
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 2:
• Local DNS Server forwards
the query to a
Root DNS server.
Step 3:
• Root DNS server
Makes note of .com suffix
Returns a list of IP addresses for TLD Servers responsible for
.com.
DNS Name Resolution
1
2
2
3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Root DNS Servers: There are
13 Root DNS servers (labeled
A through M)
• TLD Servers
– Responsible for domains
such as .com, edu, org,
.net, .uk.
– There are redundant
servers throughout the
world.
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 4:
• The local DNS server sends
query for www.example.com
to one of the TLD servers.
Step 5:
• TLD Server
– Makes note of example.com
– Returns IP address for authoritative server example.com
(such as dns.example.com server)
4
4
5
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 6:
• Local DNS server sends
query directly to DNS server
for example.com
Step 7:
• example.com DNS server
responds with its IP address
for www.example.com
6
6
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Step 8:
• Local DNS server sends the IP
of www.example.com to the
DNS client.
• DNS Caching: When a DNS
server receives a DNS reply ,
it can cache the information
in its local memory.
• ipconfig /displaydns: Displays cashed DNS entries.
• ipconfig /flushdns: Manually deletes entries.
8
7
DNS Name Resolution
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP – Dynamic Host Configuration Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
DHCP
• DHCP automates the assignment
of IP address, Subnet mask, Default
gateway, DNS Server
• DHCP servers can be:
–Server on LAN
–Router
–Server at ISP
• DHCP addresses are not
permanently assigned to hosts but
are leased for a period of time
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Telnet
• Allows a user to remotely
access another device.
• A connection using Telnet is
called a Virtual Terminal (VTY)
session.
• Telnet clients (Teraterm
,Hyperterm)
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• The Telnet server runs a service called Telnet daemon.
• Telnet supports user authentication, but does not encrypt data.
• Telnet transfers data as plain text.
• Secure Shell (SSH) protocol offers an alternate and secure
method for server access.
• SSH benefits over Telnet
– Stronger authentication
– Encryption
• As a best practice, network professionals should always use SSH
in place of Telnet, whenever possible.
Telnet and SSH
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP (HyperText Transfer Protocol)
HTTP: developed to publish and retrieve HTML pages, “data
transfer”.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Request Message
Request Line
• GET: Browser/client is requesting an object.
• /~index/: Browser is requesting this object in this directory
(default is index.html).
• HTTP/1.1: Browser implements the HTTP/1.1.
GET /~index/ HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Request line
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
Header Lines
• Accept-Language: User prefers this language of the object
• User-Agent: The browser type making the request
• Host: Host on which the object resides
• Connection: Client/browser is telling the server to keep this TCP
connection Open, known as a persistent connection.
GET /~ index / HTTP/1.1
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0;
SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR
3.0.04506; InfoPath.1)
Host: www.cisco.com
Connection: Keep-Alive
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
HTTP Response Message
HTTP/1.1 200 OK
Date: Fri, 22 Feb 2008 16:34:18 GMT
Server: Apache/2.0.52 (Red Hat)
Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT
Content-Length: 15137
Connection: close
Content-Type: text/html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
 Response message:
Status line
Header lines
Entity body
 HTTP is not a secure protocol.
 For secure communication, the HTTP Secure
(HTTPS) is used for accessing or posting web server
information.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
FTP (File Transfer Protocol)
• FTP was developed to allow for file transfers between a client
and a server.
• Used to push and pull files from a server running the FTP
daemon (FTPd).
• FTP requires two connections:
1. Control Connection:
- For commands and replies.
- Port 21.
2. Data Connection:
- For the actual file transfer.
- Port 20.
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
– Mail User agent (MUA) “Mail Client”
• Allows messages to be sent and
places received messages into the
client's mailbox.
• GUI user agents: Outlook, Eudora,
Messenger
– Mail servers: Stores user mail boxes,
communicates with local user agents and
other mail servers.
– SMTP: allows you to send e-mail from
either a client or a server.
– POP: allows you to receive e-mail
messages from an e-mail server ,
(Mail access protocol)
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
The e-mail server operates two separate processes:
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)
MTA: is used to forward
e-mail either to another MTA
or to a MDA.
MTA uses SMTP to
route email between
servers.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
MDA: governs transfer of email
from mail servers to clients.
SMTP: an outbound e-mail
delivery protocol.
POP/POP3: an inbound e-mail
delivery protocol.
SMTP – POP3
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
SMB: is a client/server file sharing protocol.
Developed by IBM to describe the structure of shared network
resources, such as directories, files, printers, and serial ports.
Microsoft windows and Apple Macintosh operating systems
support resource sharing using the SMB protocol.
SMB Protocol
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy
• Peers (hosts) act as both clients and servers.
• The actual file transfer usually rely on HTTP services.
• No centralized file server.
• Many client applications are available for accessing the Gnutella network, including:
BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX
P2P File Sharing and Gnutella Protocol
The Gnutella protocol defines five
different packet types:
1. Ping: for device discovery
2. Pong: as a reply to a ping
3. Query: for file location
4. query hit: as a reply to a query
5. Push: as a download request
Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy

More Related Content

What's hot

Local area network
Local area networkLocal area network
Local area networkSEDYK
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Network devices
Network devicesNetwork devices
Network devicesAshok R
 
Computer networking
Computer networkingComputer networking
Computer networkingAbdul Rehman
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnologyvineetkathan
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and StandardsJeffrey Des Binwag
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman IhsanSubhan_Virk_UAF
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
Integrated services digital network (isdn)
Integrated services digital network (isdn)Integrated services digital network (isdn)
Integrated services digital network (isdn)Gulu University
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATMDr Rajiv Srivastava
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 

What's hot (20)

Local area network
Local area networkLocal area network
Local area network
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and Standards
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
WLAN
WLANWLAN
WLAN
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
C n practical file
C n practical fileC n practical file
C n practical file
 
Lan network
Lan networkLan network
Lan network
 
Integrated services digital network (isdn)
Integrated services digital network (isdn)Integrated services digital network (isdn)
Integrated services digital network (isdn)
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 

Viewers also liked

Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Application Layer
Application LayerApplication Layer
Application Layerrosmida
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAbdelkhalik Mosa
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerAbdelkhalik Mosa
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkAbdelkhalik Mosa
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layeradil raja
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 

Viewers also liked (20)

Application Layer
Application Layer Application Layer
Application Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programmingdifatta
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process CommunicationAbhishek Sagar
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Abdelkhalik Mosa
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People SPC Adriatics
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxhishamousl
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumSteven Miller
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxSmithaV19
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Jack Zheng
 

Similar to Network Fundamentals: Ch3 - Application Layer Functionality and Protocols (20)

Chapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).pptChapter - 1 Introduction to networking (3).ppt
Chapter - 1 Introduction to networking (3).ppt
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Iso model
Iso modelIso model
Iso model
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programming
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Demystifying SharePoint Infrastructure – for NON-IT People
 Demystifying SharePoint Infrastructure – for NON-IT People  Demystifying SharePoint Infrastructure – for NON-IT People
Demystifying SharePoint Infrastructure – for NON-IT People
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Cloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming CurriculumCloud Computing in Systems Programming Curriculum
Cloud Computing in Systems Programming Curriculum
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Web Fendamentals
Web FendamentalsWeb Fendamentals
Web Fendamentals
 
CCNA part 1 osi
CCNA part 1 osiCCNA part 1 osi
CCNA part 1 osi
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Ch10
Ch10Ch10
Ch10
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016Web Landscape - updated in Jan 2016
Web Landscape - updated in Jan 2016
 

More from Abdelkhalik Mosa

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Abdelkhalik Mosa
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)Abdelkhalik Mosa
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Abdelkhalik Mosa
 

More from Abdelkhalik Mosa (11)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
IPv6
IPv6IPv6
IPv6
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Network Fundamentals: Ch3 - Application Layer Functionality and Protocols

  • 1. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals Last Update: 12/6/2010 Abdekhalik Elsaid Mosa abdu.elsaid@yahoo.com http://abdelkhalik.staff.scuegypt.edu.eg/
  • 2. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • OSI: is a layered, abstract representation created as a guideline for network protocol design. • Application Layer, provides human interface to the network.
  • 3. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer • Application Layer, functions: Provides the interface between the applications and network. • Presentation Layer functions: Handles the conversion of data between different formats.  Encoding and decoding.  Encryption and decryption.  Compression and decompression. • Session Layer functions: Maintains dialogs between source and destination applications.  Create session  Manage and maintain session  Terminate session Most applications, like web browsers Include functionality of the OSI layers 5, 6 and 7.
  • 4. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application Layer Software • The 2 forms of S/W programs that provide access to the network. 1.Network-Aware applications: are able to communicate directly with the protocol stack. Ex: E-mail clients, and web browser 2.Application layer services: are the programs that interface with the network and prepare the data for transfer. Ex: network print spooling
  • 5. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy User Applications, Services, and Protocols • Applications: Provide the human interface. • Services: Establish an interface to the network. • Protocols: Are rules and formats that govern how data is treated. • The (applications, services, and protocols) may be used by a single exe. Program. Ex: Telnet, FTP
  • 6. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Servers • Servers usually are repositories of data. • The server runs a service, sometimes called a server daemon. • Daemons run in the background and are not under an end user's direct control. • Daemons are described as "listening" for a request from a client. • When a daemon "hears" a request from a client: It exchanges appropriate messages with the client, and then sends the requested data to the client.
  • 7. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Client-Server Model • Client: the device requesting Information. • Server: the device which responds to the request. • Centralized Administration. • Security is easier to enforce.
  • 8. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer (P2P) Networking and Applications • Peer-to-peer networking involves two distinct forms: 1. Peer-to-peer network design 2. Peer-to-peer applications.
  • 9. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Network Design • Two or more computers are connected via a network and can share resources without having a dedicated server. • End device (peer) can function as either a server or a client. • Decentralized Administration. • Security is difficult to enforce. • Used in small home networks for file sharing and games. • One computer might assume the role of server for one transaction while simultaneously serving as a client for another.
  • 10. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Peer-to-Peer Applications • P2P applications allows a device to act as both a client and a server within the same communication. • Every client is a server and every server a client. • Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and across the Internet. • Some P2P applications use a hybrid system.
  • 11. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Application layer Protocols and Port numbers • The Transport layer uses port number addressing . • Port numbers identify applications and Application layer services. • Server programs generally use predefined port numbers that are commonly known by clients. • Examples: Telnet - TCP Port 23DNS - TCP/UDP Port 53 DHCP - UDP Port 67HTTP - TCP Port 80 FTP - TCP Ports 20 and 21SMTP - TCP Port 25 POP - UDP Port 110
  • 12. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Domain Name System (DNS) • Devices are labeled with numeric IP addresses. • Domain Names were created to convert the numeric address into a simple, recognizable name. Ex: IP: 198.133.219.25 DN: www.cisco.com • DNS client is sometimes called DNS Resolver. • A DNS Server provides name resolution using the name daemon. • The DNS server stores different types of resource records (RRs) used to resolve names. • These records contain the name, address, and others. nslookup • Displays default DNS server for your host.
  • 13. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Servers Hierarchy
  • 14. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DNS Name Resolution Step 1: • The DNS resolver sends a recursive query to its Local DNS server. • Requests IP address for "www.example.com". • The Local DNS server is responsible for resolving the name. – Cannot refer the DNS client to another DNS server. 1
  • 15. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 2: • Local DNS Server forwards the query to a Root DNS server. Step 3: • Root DNS server Makes note of .com suffix Returns a list of IP addresses for TLD Servers responsible for .com. DNS Name Resolution 1 2 2 3
  • 16. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Root DNS Servers: There are 13 Root DNS servers (labeled A through M) • TLD Servers – Responsible for domains such as .com, edu, org, .net, .uk. – There are redundant servers throughout the world. DNS Name Resolution
  • 17. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 4: • The local DNS server sends query for www.example.com to one of the TLD servers. Step 5: • TLD Server – Makes note of example.com – Returns IP address for authoritative server example.com (such as dns.example.com server) 4 4 5 DNS Name Resolution
  • 18. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 6: • Local DNS server sends query directly to DNS server for example.com Step 7: • example.com DNS server responds with its IP address for www.example.com 6 6 7 DNS Name Resolution
  • 19. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Step 8: • Local DNS server sends the IP of www.example.com to the DNS client. • DNS Caching: When a DNS server receives a DNS reply , it can cache the information in its local memory. • ipconfig /displaydns: Displays cashed DNS entries. • ipconfig /flushdns: Manually deletes entries. 8 7 DNS Name Resolution
  • 20. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP – Dynamic Host Configuration Protocol
  • 21. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy DHCP • DHCP automates the assignment of IP address, Subnet mask, Default gateway, DNS Server • DHCP servers can be: –Server on LAN –Router –Server at ISP • DHCP addresses are not permanently assigned to hosts but are leased for a period of time
  • 22. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Telnet • Allows a user to remotely access another device. • A connection using Telnet is called a Virtual Terminal (VTY) session. • Telnet clients (Teraterm ,Hyperterm)
  • 23. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • The Telnet server runs a service called Telnet daemon. • Telnet supports user authentication, but does not encrypt data. • Telnet transfers data as plain text. • Secure Shell (SSH) protocol offers an alternate and secure method for server access. • SSH benefits over Telnet – Stronger authentication – Encryption • As a best practice, network professionals should always use SSH in place of Telnet, whenever possible. Telnet and SSH
  • 24. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP (HyperText Transfer Protocol) HTTP: developed to publish and retrieve HTML pages, “data transfer”.
  • 25. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Request Message Request Line • GET: Browser/client is requesting an object. • /~index/: Browser is requesting this object in this directory (default is index.html). • HTTP/1.1: Browser implements the HTTP/1.1. GET /~index/ HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive Request line
  • 26. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy Header Lines • Accept-Language: User prefers this language of the object • User-Agent: The browser type making the request • Host: Host on which the object resides • Connection: Client/browser is telling the server to keep this TCP connection Open, known as a persistent connection. GET /~ index / HTTP/1.1 Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; InfoPath.1) Host: www.cisco.com Connection: Keep-Alive
  • 27. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy HTTP Response Message HTTP/1.1 200 OK Date: Fri, 22 Feb 2008 16:34:18 GMT Server: Apache/2.0.52 (Red Hat) Last-Modified: Thu, 15 Nov 2007 19:33:12 GMT Content-Length: 15137 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">  Response message: Status line Header lines Entity body  HTTP is not a secure protocol.  For secure communication, the HTTP Secure (HTTPS) is used for accessing or posting web server information.
  • 28. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy FTP (File Transfer Protocol) • FTP was developed to allow for file transfers between a client and a server. • Used to push and pull files from a server running the FTP daemon (FTPd). • FTP requires two connections: 1. Control Connection: - For commands and replies. - Port 21. 2. Data Connection: - For the actual file transfer. - Port 20.
  • 29. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy – Mail User agent (MUA) “Mail Client” • Allows messages to be sent and places received messages into the client's mailbox. • GUI user agents: Outlook, Eudora, Messenger – Mail servers: Stores user mail boxes, communicates with local user agents and other mail servers. – SMTP: allows you to send e-mail from either a client or a server. – POP: allows you to receive e-mail messages from an e-mail server , (Mail access protocol) SMTP – POP3
  • 30. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy The e-mail server operates two separate processes:  Mail Transfer Agent (MTA)  Mail Delivery Agent (MDA) MTA: is used to forward e-mail either to another MTA or to a MDA. MTA uses SMTP to route email between servers. SMTP – POP3
  • 31. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy MDA: governs transfer of email from mail servers to clients. SMTP: an outbound e-mail delivery protocol. POP/POP3: an inbound e-mail delivery protocol. SMTP – POP3
  • 32. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy SMB: is a client/server file sharing protocol. Developed by IBM to describe the structure of shared network resources, such as directories, files, printers, and serial ports. Microsoft windows and Apple Macintosh operating systems support resource sharing using the SMB protocol. SMB Protocol
  • 33. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy • Peers (hosts) act as both clients and servers. • The actual file transfer usually rely on HTTP services. • No centralized file server. • Many client applications are available for accessing the Gnutella network, including: BearShare, Gnucleus, LimeWire, Morpheus, WinMX and XoloX P2P File Sharing and Gnutella Protocol The Gnutella protocol defines five different packet types: 1. Ping: for device discovery 2. Pong: as a reply to a ping 3. Query: for file location 4. query hit: as a reply to a query 5. Push: as a download request
  • 34. Suez Canal University – Faculty of Computers & Informatics - Local Cisco Academy