Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
40 views

Chapter 2: Application Layer: (PART 2)

This document summarizes key concepts in the application layer from Chapter 2, including HTTP and the web, FTP, electronic mail protocols like SMTP and POP3, DNS for hostname to IP address resolution, and peer-to-peer applications like BitTorrent. It describes the client-server models and functions of these various protocols.

Uploaded by

sylinx
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Chapter 2: Application Layer: (PART 2)

This document summarizes key concepts in the application layer from Chapter 2, including HTTP and the web, FTP, electronic mail protocols like SMTP and POP3, DNS for hostname to IP address resolution, and peer-to-peer applications like BitTorrent. It describes the client-server models and functions of these various protocols.

Uploaded by

sylinx
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

55490005

Chapter 2: Application Layer


(PART 2)

Computer Networking: A Top Down


Approach 6th Edition
1 Jim Kurose, Keith Ross
2

Outline
 Web and HTTP
 FTP
 Electronic Mail
 SMTP, POP3, IMAP
 DNS
 P2P Applicaitons
3

Web and HTTP


 Web page consists of objects
 Object can be HTML file, JPEG image, Java applet
 Web page consists of base HTML-file which includes
several referenced objects
4

Web and HTTP


 HTTP: Hypertext transfer protocol
 It is web’s application layer protocol
 It uses client/server model
 Client: The browser that requests, receives and display
web objects
 Server: Web server sends objects to requested hosts
5

Web and HTTP


 HTTP: Hypertext transfer protocol
 HTTP uses TCP
 Clientinitiates TCP connection to server, port 80
 Server accepts TCP connection from client
 HTTP messages exchanged between browser and web server
 TCP connection closed
6

Web and HTTP


 HTTP: Hypertext transfer protocol
 Non-persistent HTTP
 Atmost one object sent over TCP connection
 Multiple objects required multiple connections
 Persistent HTTP
 Multipleobjects can be sent over single TCP connection
between client server
7

Web and HTTP


 User-server state: Cookies
 Many web sites use cookies:
 Cookie header line of HTTP response message
 Cookie header line in next HTTP request message
 Cookie file kept on user’s host
 Back-end database at web site
 Cookies can be used for:
 Authorization
 Shoppingcarts
 Recommendations
 Web email
8

Web and HTTP


 Web Caches
 They are used to service client without using original
server
 Browser sends all HTTP requests to cache
 If the object is in cache: cache returns object
 If the object is not in cache: cache requests object from origin
server, then returns object to client
9

FTP
 FTP: the file transfer protocol
 It is used to transfer to/from remote host
 Client/server model
 Clientside initiates transfer
 Server is the remote host
 FTP server: port 21
10

FTP
 FTP: two connections one for control, the other for data
 TCP control connection server port 21
 TCP data connection server port 20
 The control connection is out of band
11

Electronic Mail
 Three major components
 User agents
 Mail reader
 Composing, editing, reading mail messages
 Outlook, Thunderbird
 Mail servers
 Mailbox contains incoming messages for user
 Message queue
 Simple mail transfer protocol: SMTP
 Between mail servers to send email messages
12

Electronic Mail
 SMTP uses persistent connections
 SMTP requires message to be in 7-bit ASCII
 Comparison with HTTP
 HTTP: pull
 SMTP: push
 Both have ASCII command/response interaction
13

Electronic Mail
 Mail access protocol: Retrieval from server
 POP: Post Office Protocol
 IMAP: Internet Mail Access Protocol
 HTTP: Gmail, Hotmail, Yahoo
14

DNS
 Domain Name System (DNS)
 Distributed database
 Implemented in hierarchy of many name servers
 Application-layer protocol
 Core internet function
 Hostname to IP address translation
 Host aliasing
 Mail server aliasing
 Load distribution
15

DNS
 Domain Name System (DNS)
 Why not centralize DNS?
 Single point of failure
 Traffic volume
 Distant centralized database
 Maintenance
16

P2P Applications
 No always on server
 End systems directly communicate
 Peers may change IP addresses
 Examples:
 File distribution (BitTorrent)
 Streaming
 VoIP (Skype)
17

P2P Applications
 P2P file distribution: BitTorrent
 Tracker: Tracks peers participating in torrent
 Torrent: Group of peere exchanging chunks of a file
 Churn: Peers may come and go
 Once peer has entire file, it may leave or remain in torrent

You might also like