SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Practical Approach -
Application Layer with Transport Layer
Agenda
• Review of models
• Application layer interacts with transport / Scenarios
• Port Addressing
• Responsibilities ofTransport Layer
• Tools to help understand and monitor
The entire picture – top down approach
• OSI – theoretical, reference model
• Internet Protocol Suite – practical & widely used, protocol stack on which the internet
works.
Cisco Systems(2007),Application Layer Functionality and Protocols, Retrieved from
http://ciscoserver.eastms.edu/scoleman/ccna1.html
Application layer protocols
• DNS – Matches/ resolves domain names with IP addresses
• HTTP – Used to transfer data between clients/servers using a web browser
• SMTP & POP3 – used to send email messages from clients to servers over the
internet
• FTP – allows the download/upload of files between a client/server
• Telnet – allows users to login to a host from a remote location and take control as if
they were sitting at the machine (virtual connection)
• DHCP – assigns IP addresses, subnet masks, default gateways, DNS servers, to users
as they login the network
Cisco Systems(2007),Application Layer Functionality and Protocols, Retrieved from
http://ciscoserver.eastms.edu/scoleman/ccna1.html
Applications – Processes and Services
DNS
Server
• Telnet
Server DHCP
• Email
Server
• Web
Server
• FTP
Server
DNS Telnet
SMTP,
POP, IMAP HTTP DHCP FTP
In and IT Environment – Companies, Enterprises etc.
Examples
DHCP
Retrieved from
http://wintips4u.blogspot.com/2
002/11/dhcp-
gujaratikanudo.html
TELNET DNS
Retrieved from
http://www.cisco.com/en/US/products/
hw/optical/ps2006/products_tech_note
09186a008052e85f.shtml
Retrieved from
http://ciscoserver.eastms.edu/s
coleman/ccna1.html
Applications need transport
Transport layer = LIAISON
Protocols at this layer oversee the delivery of data from an application program on one
computer to an application program on another computer. More importantly, they act as a
liaison between the application-layer protocols and the services provided by the lower layers
(network, data link, and physical).
Retrieved from http://highered.mcgraw-hill.com/sites/0072397020/student_view0/chapter3/
Stallings (2010), Each application within a host must have an address that is unique within the
host; this allows the host-to-host protocol (TCP) to deliver data to the proper process.These
latter addresses are known as Ports.
How is the application identified? –Transport layer uses application identifier – PORTS
Internal address reserved for a specific application. It determines which application layer
protocols is used.
Application connects to transport layer
Link layer Network
IP Internet
TCP port UDP port
20 21 80 69 53
FTP HTTP TFTP DNS Application
TCP UDP Transport
Socket interface
Socket
 IP address &
TCP/UDP port
PORT ADDRESSINGTRANSPORT LAYER
• Many common application have default port assignments.
• Port numbers are assigned in different ways depending on whether it is a request or response.
• The source port in a segment of a client request is generated randomly once it does not conflict with existing
used ports.
• The destination port is either assigned by default or manually
IANA assignment ports – International Assigned Numbers Authority http://www.iana.org/
• 0 to 1023 - Well Known (Contact) Ports
• 1024 to 49151 – Registered Ports
• 49152 to 65535 – Private and/or Dynamic Ports
Responsibility ofTransport Layer – Port Addressing
Retrieved from
http://ciscoserver.eastms.edu/scoleman/ccna1.html
Other responsibilities - TRANSPORT Layer
• Segmentation
• Session Multiplexing
• Identification of different applications
• Sequencing
• Flow Control
• Connection Oriented
• Reliability
RELIABLE BEST EFFORT
Connection Type Connection-oriented Connectionless
Protocol TCP UDP
Sequencing Yes No
Uses
Email / File Sharing
/Downloading
Voice Streaming / Video
Streaming/ Online
Gaming
TCP / UDP
TCP
TRANSPORT
LAYER
UDP
TCP
FTP – 20-21
Telnet – 23
SMTP – 25
DNS – 53 (BothTCP & UDP)
HTTP – 80
UDP
DHCP – 67 & 68
DNS - 53
TFTP – 69
www.iana.org
RFC 1700 - http://www.cse.ohio-state.edu/cgi-
bin/rfc/rfc1700.html
NETWORK UTILITIES
TCP – 3WAY HANDSHAKE INTCP /
Connection Oriented
CONNECTION ESTABLISHMENT
Retrieved from –
http://blogs.ixiacom.com/ixia-blog/tcp-portals-the-
handshakes-a-lie/
Protocol Analyzer
Connection Request
Retrieved from -
http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
Protocol Analyzer
• Connection confirmation
Retrieved from -
http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
Protocol Analyzer
• Acknowledgement of
confirmation
Retrieved from -
http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
NetStat
• Examine openTCP connections
over the network host
• UnexplainedTCP connections
which can pose a threat by
consuming resources
Retrieved from -
http://www.highteck.net/IT/Transport/Livello_OSI_Transport.h
tml
Troubleshooting Network Utility tools
• FIDDLER
• Microsoft Network monitor
SUMMARY
• When we use apps over the internet the application layer protocols takes the request
down to lower layers.
• The transport layer is the liaison, responsible for delivering the segments to lower
layer.
• A port is what connects the application layer to the transport layer.Tells the transport
layer which protocol is speaking and whether to use tcp/udp to deliver.
• TCP – Reliable connection oriented
• UDP – Connectionless
• Application protocols + ports tells us whetherTCP/UDP to use.
• Tools to use for monitoring and troubleshootingTCP connections.
REFERENCES
Coleman S.. (2007), Application Layer Functionality and Protocols, In Network Fundamentals CCNACisco
Systems– (Chapter 3)
Retrieved from http://ciscoserver.eastms.edu/scoleman/ccna1.html
Stallings ,W. (2010), Cryptography and Network Security, Fifth Edition William Stallings Prentice Hall.
http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
http://wintips4u.blogspot.com/2002/11/dhcp-gujaratikanudo.html
http://www.cisco.com/en/US/products/hw/optical/ps2006/products_tech_note09186a008052e85f.shtml
http://blogs.ixiacom.com/ixia-blog/tcp-portals-the-handshakes-a-lie/
http://www.iana.org/numbers

Contenu connexe

Tendances

Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...smitha273566
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
(Ftp) file transfer protocol
(Ftp)   file transfer protocol(Ftp)   file transfer protocol
(Ftp) file transfer protocolGouasmia Zakaria
 
Application layer
Application layerApplication layer
Application layerFarah Hunny
 
Unit 4 - Transport Layer
Unit 4 - Transport LayerUnit 4 - Transport Layer
Unit 4 - Transport LayerKalpanaC14
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layerKritika Purohit
 

Tendances (20)

Web services
Web servicesWeb services
Web services
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Network layer
Network layerNetwork layer
Network layer
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking recap
Networking recapNetworking recap
Networking recap
 
Day 1.3 osi reference
Day 1.3 osi referenceDay 1.3 osi reference
Day 1.3 osi reference
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
 
(Ftp) file transfer protocol
(Ftp)   file transfer protocol(Ftp)   file transfer protocol
(Ftp) file transfer protocol
 
Application layer
Application layerApplication layer
Application layer
 
TCP/IP Models
TCP/IP ModelsTCP/IP Models
TCP/IP Models
 
Unit 4 - Transport Layer
Unit 4 - Transport LayerUnit 4 - Transport Layer
Unit 4 - Transport Layer
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 

En vedette

Advanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceAdvanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceSmart Coders
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyPriyanka Aash
 
Unified log-meetup-20160420
Unified log-meetup-20160420Unified log-meetup-20160420
Unified log-meetup-20160420Oli Deakin
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...Robert Parker
 
An analysis of TLS handshake proxying
An analysis of TLS handshake proxyingAn analysis of TLS handshake proxying
An analysis of TLS handshake proxyingNick Sullivan
 
Kubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений ОльковKubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений ОльковAvitoTech
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
Docker ansible-make-chef-puppet-unnecessary-minnihan
Docker ansible-make-chef-puppet-unnecessary-minnihanDocker ansible-make-chef-puppet-unnecessary-minnihan
Docker ansible-make-chef-puppet-unnecessary-minnihanjbminn
 
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
IT Automation with Ansible
IT Automation with AnsibleIT Automation with Ansible
IT Automation with AnsibleRayed Alrashed
 
IBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveIBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveMorag Hughson
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveMorag Hughson
 

En vedette (16)

Advanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a serviceAdvanced Crypto Service Provider – cryptography as a service
Advanced Crypto Service Provider – cryptography as a service
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
 
Unified log-meetup-20160420
Unified log-meetup-20160420Unified log-meetup-20160420
Unified log-meetup-20160420
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
 
An analysis of TLS handshake proxying
An analysis of TLS handshake proxyingAn analysis of TLS handshake proxying
An analysis of TLS handshake proxying
 
Kubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений ОльковKubernetes в Avito - Евгений Ольков
Kubernetes в Avito - Евгений Ольков
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
Automation and ansible
Automation and ansibleAutomation and ansible
Automation and ansible
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
Docker ansible-make-chef-puppet-unnecessary-minnihan
Docker ansible-make-chef-puppet-unnecessary-minnihanDocker ansible-make-chef-puppet-unnecessary-minnihan
Docker ansible-make-chef-puppet-unnecessary-minnihan
 
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
IT Automation with Ansible
IT Automation with AnsibleIT Automation with Ansible
IT Automation with Ansible
 
IBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-DiveIBM MQ V8 Security: Latest Features Deep-Dive
IBM MQ V8 Security: Latest Features Deep-Dive
 
IBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep DiveIBM WebSphere MQ V8 Security Features: Deep Dive
IBM WebSphere MQ V8 Security Features: Deep Dive
 

Similaire à Aplication and Transport layer- a practical approach

Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptKristopher Hefner
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdfMiftaNurFarid2
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 
Master Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertMaster Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertAbhishek Sagar
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptxLalanFakir1
 
Computer design and Architechure and Algorithm
Computer design and Architechure and AlgorithmComputer design and Architechure and Algorithm
Computer design and Architechure and Algorithmmirzaahmadali
 
02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.pptstriker78669
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptxmilon24
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 

Similaire à Aplication and Transport layer- a practical approach (20)

Datacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.pptDatacom_Section_2_-_Protocols.ppt
Datacom_Section_2_-_Protocols.ppt
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Master Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertMaster Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to Expert
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Application Layer
Application Layer Application Layer
Application Layer
 
Computer design and Architechure and Algorithm
Computer design and Architechure and AlgorithmComputer design and Architechure and Algorithm
Computer design and Architechure and Algorithm
 
02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
 
cn1.ppt
cn1.pptcn1.ppt
cn1.ppt
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 

Dernier

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Dernier (20)

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 

Aplication and Transport layer- a practical approach

  • 1. Practical Approach - Application Layer with Transport Layer
  • 2. Agenda • Review of models • Application layer interacts with transport / Scenarios • Port Addressing • Responsibilities ofTransport Layer • Tools to help understand and monitor
  • 3. The entire picture – top down approach • OSI – theoretical, reference model • Internet Protocol Suite – practical & widely used, protocol stack on which the internet works. Cisco Systems(2007),Application Layer Functionality and Protocols, Retrieved from http://ciscoserver.eastms.edu/scoleman/ccna1.html
  • 4. Application layer protocols • DNS – Matches/ resolves domain names with IP addresses • HTTP – Used to transfer data between clients/servers using a web browser • SMTP & POP3 – used to send email messages from clients to servers over the internet • FTP – allows the download/upload of files between a client/server • Telnet – allows users to login to a host from a remote location and take control as if they were sitting at the machine (virtual connection) • DHCP – assigns IP addresses, subnet masks, default gateways, DNS servers, to users as they login the network Cisco Systems(2007),Application Layer Functionality and Protocols, Retrieved from http://ciscoserver.eastms.edu/scoleman/ccna1.html
  • 5. Applications – Processes and Services DNS Server • Telnet Server DHCP • Email Server • Web Server • FTP Server DNS Telnet SMTP, POP, IMAP HTTP DHCP FTP In and IT Environment – Companies, Enterprises etc.
  • 6. Examples DHCP Retrieved from http://wintips4u.blogspot.com/2 002/11/dhcp- gujaratikanudo.html TELNET DNS Retrieved from http://www.cisco.com/en/US/products/ hw/optical/ps2006/products_tech_note 09186a008052e85f.shtml Retrieved from http://ciscoserver.eastms.edu/s coleman/ccna1.html
  • 7. Applications need transport Transport layer = LIAISON Protocols at this layer oversee the delivery of data from an application program on one computer to an application program on another computer. More importantly, they act as a liaison between the application-layer protocols and the services provided by the lower layers (network, data link, and physical). Retrieved from http://highered.mcgraw-hill.com/sites/0072397020/student_view0/chapter3/ Stallings (2010), Each application within a host must have an address that is unique within the host; this allows the host-to-host protocol (TCP) to deliver data to the proper process.These latter addresses are known as Ports. How is the application identified? –Transport layer uses application identifier – PORTS Internal address reserved for a specific application. It determines which application layer protocols is used.
  • 8. Application connects to transport layer
  • 9. Link layer Network IP Internet TCP port UDP port 20 21 80 69 53 FTP HTTP TFTP DNS Application TCP UDP Transport Socket interface Socket  IP address & TCP/UDP port
  • 10. PORT ADDRESSINGTRANSPORT LAYER • Many common application have default port assignments. • Port numbers are assigned in different ways depending on whether it is a request or response. • The source port in a segment of a client request is generated randomly once it does not conflict with existing used ports. • The destination port is either assigned by default or manually IANA assignment ports – International Assigned Numbers Authority http://www.iana.org/ • 0 to 1023 - Well Known (Contact) Ports • 1024 to 49151 – Registered Ports • 49152 to 65535 – Private and/or Dynamic Ports
  • 11. Responsibility ofTransport Layer – Port Addressing Retrieved from http://ciscoserver.eastms.edu/scoleman/ccna1.html
  • 12. Other responsibilities - TRANSPORT Layer • Segmentation • Session Multiplexing • Identification of different applications • Sequencing • Flow Control • Connection Oriented • Reliability RELIABLE BEST EFFORT Connection Type Connection-oriented Connectionless Protocol TCP UDP Sequencing Yes No Uses Email / File Sharing /Downloading Voice Streaming / Video Streaming/ Online Gaming
  • 13. TCP / UDP TCP TRANSPORT LAYER UDP TCP FTP – 20-21 Telnet – 23 SMTP – 25 DNS – 53 (BothTCP & UDP) HTTP – 80 UDP DHCP – 67 & 68 DNS - 53 TFTP – 69 www.iana.org RFC 1700 - http://www.cse.ohio-state.edu/cgi- bin/rfc/rfc1700.html
  • 14. NETWORK UTILITIES TCP – 3WAY HANDSHAKE INTCP / Connection Oriented CONNECTION ESTABLISHMENT Retrieved from – http://blogs.ixiacom.com/ixia-blog/tcp-portals-the- handshakes-a-lie/
  • 15. Protocol Analyzer Connection Request Retrieved from - http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
  • 16. Protocol Analyzer • Connection confirmation Retrieved from - http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
  • 17. Protocol Analyzer • Acknowledgement of confirmation Retrieved from - http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html
  • 18. NetStat • Examine openTCP connections over the network host • UnexplainedTCP connections which can pose a threat by consuming resources Retrieved from - http://www.highteck.net/IT/Transport/Livello_OSI_Transport.h tml
  • 19. Troubleshooting Network Utility tools • FIDDLER • Microsoft Network monitor
  • 20. SUMMARY • When we use apps over the internet the application layer protocols takes the request down to lower layers. • The transport layer is the liaison, responsible for delivering the segments to lower layer. • A port is what connects the application layer to the transport layer.Tells the transport layer which protocol is speaking and whether to use tcp/udp to deliver. • TCP – Reliable connection oriented • UDP – Connectionless • Application protocols + ports tells us whetherTCP/UDP to use. • Tools to use for monitoring and troubleshootingTCP connections.
  • 21. REFERENCES Coleman S.. (2007), Application Layer Functionality and Protocols, In Network Fundamentals CCNACisco Systems– (Chapter 3) Retrieved from http://ciscoserver.eastms.edu/scoleman/ccna1.html Stallings ,W. (2010), Cryptography and Network Security, Fifth Edition William Stallings Prentice Hall. http://www.highteck.net/IT/Transport/Livello_OSI_Transport.html http://wintips4u.blogspot.com/2002/11/dhcp-gujaratikanudo.html http://www.cisco.com/en/US/products/hw/optical/ps2006/products_tech_note09186a008052e85f.shtml http://blogs.ixiacom.com/ixia-blog/tcp-portals-the-handshakes-a-lie/ http://www.iana.org/numbers