SlideShare une entreprise Scribd logo
1  sur  20
Network Services



 Networking for Home and Small Businesses – Chapter 6
Network Services
Clients/Servers and Their Interaction
Client Server Relationship

 Server
         – host running software application that
           provides information to other hosts on
           network
         – Example: Web Server

 Client
         – name given to a computer application that
           someone uses to access information held on
           a server
         – Example: Web browser
                 • host uses web client software to request a
                   web page

 Cisco Discovery Home & Small Business Chapter 6: Network Services   2/20
Network Services
Clients/Servers and Their Interaction
Client Server Relationship                                                    Activity 6.1.1

 DNS (Domain Name Server/System)
         – provides IP address of web site with the domain name
 Telnet
         – remote login
 E-mail
         – SMTP (Simple Mail Transfer Protocol)
         – POP3 (Post Office Protocol)
         – IMAP (Internet Message Across Protocol)
 DHCP
 Web
         – uses HTTP protocol
 FTP
         – used to download and/or upload files between clients and servers

 Cisco Discovery Home & Small Business Chapter 6: Network Services                    3/20
Network Services
Clients/Servers and Their Interaction
Role of Protocols in Client Server Communication

 Application Layer Protocols
         – determine the way in which a server and client interact
         – HTTP – way to convey information on the web




 Cisco Discovery Home & Small Business Chapter 6: Network Services   4/20
Network Services
Clients/Servers and Their Interaction
Role of Protocols in Client Server Communication

 Transport Layer Protocols
         – manages individual conversations between client and servers
         – formats messages into segments (PDU) to be sent to destination
         – provides flow control
         – provides acknowledgments between hosts




 Cisco Discovery Home & Small Business Chapter 6: Network Services          5/20
Network Services
Clients/Servers and Their Interaction
Role of Protocols in Client Server Communication

 Internetwork Layer Protocols
         – assigns logical addressing (IP)
         – encapsulates segments into packets
         – provides routing to the destination




 Cisco Discovery Home & Small Business Chapter 6: Network Services   6/20
Network Services
Clients/Servers and Their Interaction
Role of Protocols in Client Server Communication

 Network Access Protocols
       –Primary functions
                 • Data link management
                         – takes IP packets and encapsulates them into frames
                         – the frame reads the MAC address
                 • Physical network transmissions
                         – how bits are represented (1 and 0)
                         – how bits are sent (media)




 Cisco Discovery Home & Small Business Chapter 6: Network Services              7/20
Network Services
Clients/Servers and Their Interaction
TCP and UDP Transport Protocols

TCP Protocols
 Provides acknowledgment of delivery of the packet
            – similar to sending a registered letter through the postal system
 How it works . . .
         – Message is broken into segments
         – Segments are then numbered in sequence
         – Keeps track of the number of segments
         – If sender not receive the segments within a period of time . .
         – The lost portion is retransmitted
 FTP and HTTP are examples of applications that use TCP to ensure
  delivery of data



 Cisco Discovery Home & Small Business Chapter 6: Network Services               8/20
Network Services
Clients/Servers and Their Interaction
TCP and UDP Transport Protocols                                      Activity 6.1.3

UDP Protocols
 U = UNRELIABLE
 “Best effort delivery”
 No acknowledgment, no guarantee
 No retransmission
 Used by:
         – streaming audio
         – streaming video
         – VoIP




 Cisco Discovery Home & Small Business Chapter 6: Network Services           9/20
Network Services
Clients/Servers and Their Interaction
TCP/IP Port Numbers

 Used by both TCP and UDP
 A port is a numeric identifier within each segment that is used to
  keep track of specific conversations and destination services
  requested
 Every message includes a source and destination port
 Destination port
         – sent by client in the segment to tell what service is requested
            • Port 80 = HTTP
            • Port 21 = FTP




 Cisco Discovery Home & Small Business Chapter 6: Network Services           10/20
Network Services
Clients/Servers and Their Interaction
TCP/IP Port Numbers

 The source port number is randomly generated by
  the sending device to identify a conversation
  between two devices.
 This allows multiple conversations to occur
  simultaneously.
 The combination of the source and destination IP
  address and the source and destination port number
  is known as a socket.


 Cisco Discovery Home & Small Business Chapter 6: Network Services   11/20
Network Services
Clients/Servers and Their Interaction
Domain Name Service                                                  Lab Activity 6.2.1

 Associates a names with an IP address
 Some groups
         – .com
         – .edu

 Port 53 = DNS
         – used if clients wants an IP address of a
           web site or host




 Cisco Discovery Home & Small Business Chapter 6: Network Services              12/20
Network Services
Clients/Servers and Their Interaction
FTP Clients and Servers                                              Lab Activity 6.2.3

 Host must run FTP client access to
  access the FTP server
 Two ports used to communicate
         – FTP Request = Port 21
         – To transfer files when open = Port 20




 Cisco Discovery Home & Small Business Chapter 6: Network Services              13/20
Network Services
Clients/Servers and Their Interaction
Email Clients and Servers                                                Lab Activity 6.2.4

Email Protocols
 SMTP (Simple Mail Transfer Protocol)
         – used by email client to send messages to local email server
         – Port #25
 POP3 (Post Office Protocol)
         – receives/stores messages for the users
         – when client connects to email server messages are downloaded to the
           client; messages are removed from server
         – Port #110
 IMAP (Internet Message Across Protocol)
         – receives/stores messages but keeps messages on the server unless
           deleted by user
         – Port #143



 Cisco Discovery Home & Small Business Chapter 6: Network Services                  14/20
Network Services
Clients/Servers and Their Interaction
Port Numbers                                                         Activity 6.2.7

 Client requests can be identified because the request is made to a specific
  destination port.
 Ports are assigned and managed by an organization known as the Internet
  Corporation for Assigned Names and Numbers (ICANN).
 Well-known ports
         – 1-1023 (destination ports)
 Registered ports
         – 1024-49151
         – source and destination ports
 Private ports
         – 49152-65535 (source ports)

 Cisco Discovery Home & Small Business Chapter 6: Network Services          15/20
Network Services
Clients/Servers and Their Interaction
Protocol Interaction

 Each upper layer relies on the layer below it
 Upper Layers
         – message content
 Lower Layers
         – help to move data




 Cisco Discovery Home & Small Business Chapter 6: Network Services   16/20
Network Services
Clients/Servers and Their Interaction
Protocol Interaction

Why Use a Layered Model?
 Assists in protocol design
 Allows competition between
  vendors
         – can all work together

 One layer does not affect other
  layers
 Allows for a common language



 Cisco Discovery Home & Small Business Chapter 6: Network Services   17/20
Network Services
Clients/Servers and Their Interaction
Protocol Operation of Sending and Receiving a Message

Encapsulation (sending data)
 From top to bottom
 Application data broken into segments
         – segments contain source and destination ports
 TCP segments sends it down to Internet layer
         – source and destination IP added (packet)
 Packet put into a frame
         – header and trailer added
                 • header = source and destination MAC
                 • trailer = error checking
 Broken into bits
         – encoded onto the media (cabling)
 Cisco Discovery Home & Small Business Chapter 6: Network Services   18/20
Network Services
Clients/Servers and Their Interaction
Protocol Operation of Sending and Receiving a Message Activity 6.3.2

De-encapsulation (receiving data)
 From bottom to top
 Bits are decoded from the media
 Frame removes header and trailer
 Packet removes the IP address
         – source and destination IP
 Segment is received and reassembled for the user
         – viewing a web page




 Cisco Discovery Home & Small Business Chapter 6: Network Services   19/20
Cisco Discovery Home & Small Business Chapter 6: Network Services   20/20

Contenu connexe

Tendances

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenĐô GiẢn
 
Chapter2 application layer
Chapter2 application layerChapter2 application layer
Chapter2 application layerKhánh Ghẻ
 
White Paper: Accelerating File Transfers
White Paper: Accelerating File TransfersWhite Paper: Accelerating File Transfers
White Paper: Accelerating File TransfersFileCatalyst
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
A Business Guide to MPLS IP VPN Migration: Five Critical Factors
A Business Guide  to MPLS IP VPN Migration: Five Critical FactorsA Business Guide  to MPLS IP VPN Migration: Five Critical Factors
A Business Guide to MPLS IP VPN Migration: Five Critical FactorsXO Communications
 
Chapter2 l2 modified_um
Chapter2 l2 modified_umChapter2 l2 modified_um
Chapter2 l2 modified_umSajid Baloch
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)mashiur
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Juniper L2 MPLS VPN
Juniper L2 MPLS VPNJuniper L2 MPLS VPN
Juniper L2 MPLS VPNmehrdad1981
 

Tendances (20)

MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
 
Voice over MPLS
Voice over MPLSVoice over MPLS
Voice over MPLS
 
Chapter2 application layer
Chapter2 application layerChapter2 application layer
Chapter2 application layer
 
White Paper: Accelerating File Transfers
White Paper: Accelerating File TransfersWhite Paper: Accelerating File Transfers
White Paper: Accelerating File Transfers
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
MQTT and CoAP
MQTT and CoAPMQTT and CoAP
MQTT and CoAP
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
unit 2
unit 2unit 2
unit 2
 
Network layer
Network layerNetwork layer
Network layer
 
A Business Guide to MPLS IP VPN Migration: Five Critical Factors
A Business Guide  to MPLS IP VPN Migration: Five Critical FactorsA Business Guide  to MPLS IP VPN Migration: Five Critical Factors
A Business Guide to MPLS IP VPN Migration: Five Critical Factors
 
Chapter2 Application
Chapter2 ApplicationChapter2 Application
Chapter2 Application
 
A1803020108
A1803020108A1803020108
A1803020108
 
Chapter2 l2 modified_um
Chapter2 l2 modified_umChapter2 l2 modified_um
Chapter2 l2 modified_um
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
MPLS
MPLSMPLS
MPLS
 
Juniper L2 MPLS VPN
Juniper L2 MPLS VPNJuniper L2 MPLS VPN
Juniper L2 MPLS VPN
 

En vedette

Aids Russian 14.01.2009
Aids Russian 14.01.2009Aids Russian 14.01.2009
Aids Russian 14.01.2009Oleg Zorak
 
Exposicion matematicas
Exposicion matematicasExposicion matematicas
Exposicion matematicasgeorgenunez
 
Novela Anterior Ala Guerra!Meritxell&Mari
Novela Anterior Ala Guerra!Meritxell&MariNovela Anterior Ala Guerra!Meritxell&Mari
Novela Anterior Ala Guerra!Meritxell&Mari4esopalamos
 
Étude des besoins de représentation cadastrale volumétrique pour la gestion m...
Étude des besoins de représentation cadastrale volumétrique pour la gestion m...Étude des besoins de représentation cadastrale volumétrique pour la gestion m...
Étude des besoins de représentation cadastrale volumétrique pour la gestion m...ACSG - Section Montréal
 
Nilai dan norma sosial
Nilai dan norma sosialNilai dan norma sosial
Nilai dan norma sosialMalik Fauzi
 
La valorisation par les Québécois de l’engagement responsable des détaillants
La valorisation par les Québécois de l’engagement responsable des détaillantsLa valorisation par les Québécois de l’engagement responsable des détaillants
La valorisation par les Québécois de l’engagement responsable des détaillantsConseil québécois du commerce de détail
 

En vedette (8)

Aids Russian 14.01.2009
Aids Russian 14.01.2009Aids Russian 14.01.2009
Aids Russian 14.01.2009
 
Exposicion matematicas
Exposicion matematicasExposicion matematicas
Exposicion matematicas
 
Novela Anterior Ala Guerra!Meritxell&Mari
Novela Anterior Ala Guerra!Meritxell&MariNovela Anterior Ala Guerra!Meritxell&Mari
Novela Anterior Ala Guerra!Meritxell&Mari
 
Étude des besoins de représentation cadastrale volumétrique pour la gestion m...
Étude des besoins de représentation cadastrale volumétrique pour la gestion m...Étude des besoins de représentation cadastrale volumétrique pour la gestion m...
Étude des besoins de représentation cadastrale volumétrique pour la gestion m...
 
Relatório Final
Relatório FinalRelatório Final
Relatório Final
 
Zacapoaxtla
ZacapoaxtlaZacapoaxtla
Zacapoaxtla
 
Nilai dan norma sosial
Nilai dan norma sosialNilai dan norma sosial
Nilai dan norma sosial
 
La valorisation par les Québécois de l’engagement responsable des détaillants
La valorisation par les Québécois de l’engagement responsable des détaillantsLa valorisation par les Québécois de l’engagement responsable des détaillants
La valorisation par les Québécois de l’engagement responsable des détaillants
 

Similaire à Chapter 6r

Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04Ankit Dubey
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlacejonatanmedeirosgomes1
 
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjCN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjPRADEEPERUKULLA2
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 

Similaire à Chapter 6r (20)

Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 
Networking in python by Rj
Networking in python by RjNetworking in python by Rj
Networking in python by Rj
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlace
 
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjCN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
CCNA 1 Chapter 10 v5.0 2014
CCNA 1 Chapter 10 v5.0 2014CCNA 1 Chapter 10 v5.0 2014
CCNA 1 Chapter 10 v5.0 2014
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Chapter 6r

  • 1. Network Services Networking for Home and Small Businesses – Chapter 6
  • 2. Network Services Clients/Servers and Their Interaction Client Server Relationship  Server – host running software application that provides information to other hosts on network – Example: Web Server  Client – name given to a computer application that someone uses to access information held on a server – Example: Web browser • host uses web client software to request a web page Cisco Discovery Home & Small Business Chapter 6: Network Services 2/20
  • 3. Network Services Clients/Servers and Their Interaction Client Server Relationship Activity 6.1.1  DNS (Domain Name Server/System) – provides IP address of web site with the domain name  Telnet – remote login  E-mail – SMTP (Simple Mail Transfer Protocol) – POP3 (Post Office Protocol) – IMAP (Internet Message Across Protocol)  DHCP  Web – uses HTTP protocol  FTP – used to download and/or upload files between clients and servers Cisco Discovery Home & Small Business Chapter 6: Network Services 3/20
  • 4. Network Services Clients/Servers and Their Interaction Role of Protocols in Client Server Communication  Application Layer Protocols – determine the way in which a server and client interact – HTTP – way to convey information on the web Cisco Discovery Home & Small Business Chapter 6: Network Services 4/20
  • 5. Network Services Clients/Servers and Their Interaction Role of Protocols in Client Server Communication  Transport Layer Protocols – manages individual conversations between client and servers – formats messages into segments (PDU) to be sent to destination – provides flow control – provides acknowledgments between hosts Cisco Discovery Home & Small Business Chapter 6: Network Services 5/20
  • 6. Network Services Clients/Servers and Their Interaction Role of Protocols in Client Server Communication  Internetwork Layer Protocols – assigns logical addressing (IP) – encapsulates segments into packets – provides routing to the destination Cisco Discovery Home & Small Business Chapter 6: Network Services 6/20
  • 7. Network Services Clients/Servers and Their Interaction Role of Protocols in Client Server Communication  Network Access Protocols –Primary functions • Data link management – takes IP packets and encapsulates them into frames – the frame reads the MAC address • Physical network transmissions – how bits are represented (1 and 0) – how bits are sent (media) Cisco Discovery Home & Small Business Chapter 6: Network Services 7/20
  • 8. Network Services Clients/Servers and Their Interaction TCP and UDP Transport Protocols TCP Protocols  Provides acknowledgment of delivery of the packet – similar to sending a registered letter through the postal system  How it works . . . – Message is broken into segments – Segments are then numbered in sequence – Keeps track of the number of segments – If sender not receive the segments within a period of time . . – The lost portion is retransmitted  FTP and HTTP are examples of applications that use TCP to ensure delivery of data Cisco Discovery Home & Small Business Chapter 6: Network Services 8/20
  • 9. Network Services Clients/Servers and Their Interaction TCP and UDP Transport Protocols Activity 6.1.3 UDP Protocols  U = UNRELIABLE  “Best effort delivery”  No acknowledgment, no guarantee  No retransmission  Used by: – streaming audio – streaming video – VoIP Cisco Discovery Home & Small Business Chapter 6: Network Services 9/20
  • 10. Network Services Clients/Servers and Their Interaction TCP/IP Port Numbers  Used by both TCP and UDP  A port is a numeric identifier within each segment that is used to keep track of specific conversations and destination services requested  Every message includes a source and destination port  Destination port – sent by client in the segment to tell what service is requested • Port 80 = HTTP • Port 21 = FTP Cisco Discovery Home & Small Business Chapter 6: Network Services 10/20
  • 11. Network Services Clients/Servers and Their Interaction TCP/IP Port Numbers  The source port number is randomly generated by the sending device to identify a conversation between two devices.  This allows multiple conversations to occur simultaneously.  The combination of the source and destination IP address and the source and destination port number is known as a socket. Cisco Discovery Home & Small Business Chapter 6: Network Services 11/20
  • 12. Network Services Clients/Servers and Their Interaction Domain Name Service Lab Activity 6.2.1  Associates a names with an IP address  Some groups – .com – .edu  Port 53 = DNS – used if clients wants an IP address of a web site or host Cisco Discovery Home & Small Business Chapter 6: Network Services 12/20
  • 13. Network Services Clients/Servers and Their Interaction FTP Clients and Servers Lab Activity 6.2.3  Host must run FTP client access to access the FTP server  Two ports used to communicate – FTP Request = Port 21 – To transfer files when open = Port 20 Cisco Discovery Home & Small Business Chapter 6: Network Services 13/20
  • 14. Network Services Clients/Servers and Their Interaction Email Clients and Servers Lab Activity 6.2.4 Email Protocols  SMTP (Simple Mail Transfer Protocol) – used by email client to send messages to local email server – Port #25  POP3 (Post Office Protocol) – receives/stores messages for the users – when client connects to email server messages are downloaded to the client; messages are removed from server – Port #110  IMAP (Internet Message Across Protocol) – receives/stores messages but keeps messages on the server unless deleted by user – Port #143 Cisco Discovery Home & Small Business Chapter 6: Network Services 14/20
  • 15. Network Services Clients/Servers and Their Interaction Port Numbers Activity 6.2.7  Client requests can be identified because the request is made to a specific destination port.  Ports are assigned and managed by an organization known as the Internet Corporation for Assigned Names and Numbers (ICANN).  Well-known ports – 1-1023 (destination ports)  Registered ports – 1024-49151 – source and destination ports  Private ports – 49152-65535 (source ports) Cisco Discovery Home & Small Business Chapter 6: Network Services 15/20
  • 16. Network Services Clients/Servers and Their Interaction Protocol Interaction  Each upper layer relies on the layer below it  Upper Layers – message content  Lower Layers – help to move data Cisco Discovery Home & Small Business Chapter 6: Network Services 16/20
  • 17. Network Services Clients/Servers and Their Interaction Protocol Interaction Why Use a Layered Model?  Assists in protocol design  Allows competition between vendors – can all work together  One layer does not affect other layers  Allows for a common language Cisco Discovery Home & Small Business Chapter 6: Network Services 17/20
  • 18. Network Services Clients/Servers and Their Interaction Protocol Operation of Sending and Receiving a Message Encapsulation (sending data)  From top to bottom  Application data broken into segments – segments contain source and destination ports  TCP segments sends it down to Internet layer – source and destination IP added (packet)  Packet put into a frame – header and trailer added • header = source and destination MAC • trailer = error checking  Broken into bits – encoded onto the media (cabling) Cisco Discovery Home & Small Business Chapter 6: Network Services 18/20
  • 19. Network Services Clients/Servers and Their Interaction Protocol Operation of Sending and Receiving a Message Activity 6.3.2 De-encapsulation (receiving data)  From bottom to top  Bits are decoded from the media  Frame removes header and trailer  Packet removes the IP address – source and destination IP  Segment is received and reassembled for the user – viewing a web page Cisco Discovery Home & Small Business Chapter 6: Network Services 19/20
  • 20. Cisco Discovery Home & Small Business Chapter 6: Network Services 20/20