Transport and Application Layer: DFC20143 Introduction To Networks

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

CHAPTER 4

TRANSPORT AND
APPLICATION LAYER

DFC20143
INTRODUCTION TO NETWORKS
Chapter 4.2 - Sections & Objectives
 4.2 Application Layer Protocols

• Explain the operation of the application layer in providing support to end-user applications.
• Explain how the functions of the application layer, session layer, and presentation layer work together
to provide network services to end user applications
• Explain how common application layer protocols interact with end user applications.
 Well-Known Application Protocols and Services
• Explain how well-known TCP/IP application layer protocols operate.
• Explain how web and email protocols operate.
• Explain how DNS and DHCP operate.
• Explain how file transfer protocols operate.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
4.2 Application Layer
Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Application, Presentation, and Session
Application Layer
 Application Layer:
• Closest to the end user.
• Used to exchange data between
programs running on the source and
destination hosts.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Application, Presentation, and Session
Presentation and Session Layer
 Presentation Layer function:
• Formatting data at the source device
into a compatible form for the
receiving device.
• Compressing data.
• Encrypting data.
 Session Layer Function
• Create and maintain dialogs between
source and destination applications.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Application, Presentation, and Session
TCP/IP Application Layer Protocols • Post Office Protocol (POP) TCP 110 -
Enables clients to retrieve email from a mail
server.
• Internet Message Access Protocol (IMAP)
TCP 143 - Enables clients to retrieve email
from a mail server, maintains email on server.
• File Transfer Protocol (FTP) TCP 20 and 21 -
Reliable, connection-oriented, and
acknowledged file delivery protocol.
• Domain Name Server (DNS) TCP,UDP 53 - Translates
domain names, such as cisco.com, into IP addresses. • Trivial File Transfer Protocol (TFTP) UDP 69 –
• (BOOTP) – Bootstrap Protocol - BOOTP is being simple connectionless file transfer protocol.
superseded by DHCP. • Hypertext Transfer Protocol (HTTP) TCP 80,
• Dynamic Host Configuration Protocol (DHCP) UDP client 8080 - Set of rules for exchanging text,
68, server 67 – Dynamically assigns IP addresses to graphic images, etc. on the World Wide Web.
client stations at start-up.
• Hypertext Transfer Protocol Secure (HTTPS)
• Simple Mail Transport Protocol (SMTP) TCP 25 - Enables
TCP, UDP 443 – Uses encryption and
clients to send email to a mail server.
authentication to secure
© 2016 Cisco and/or communication.
its affiliates. All rights reserved. Cisco Confidential 6
How Application Protocols Interact with End-User Applications
Client-Server Model
 Client and server processes are
considered to be in the application
layer.
 Application layer protocols
describe the format of the
requests and responses between
clients and servers.
 Example of a client-server
network is using an ISP’s email
service to send, receive and store
email.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
How Application Protocols Interact with End-User Applications
Peer-to-Peer Networks
 Data is accessed from a peer
device without the use of a
dedicated server.
 Each device (known as a peer)
can function as both a server and
a client.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
How Application Protocols Interact with End-User Applications
Peer-to-Peer Applications
 A P2P application allows a device
to act as both a client and a
server within the same
communication.
 P2P applications require that each
end device provide a user
interface and run a background
service.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
How Application Protocols Interact with End-User Applications
Common P2P Applications
 Common P2P networks include:
• G2
• Bitcoin
• BitTorrent
• eDonkey
 Some P2P applications are based on
the Gnutella protocol, where each
user shares whole files with other
users.
 Many P2P applications allow users to
share pieces of many files with each
other at the same time –this is
BitTorrent technology.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
How Application Protocols Interact with End-User Applications
Researching Peer-to-Peer File Sharing

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
4.2.2 Explain how web and
email protocols operate

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Web and Email Protocols
Hypertext Transfer Protocol and Hypertext Markup Language
 When a web address or uniform resource
locator (URL) is typed into a web
browser, the web browser establishes a
connection to the web service running on
the server, using the HTTP protocol.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Web and Email Protocols
HTTP and HTTPS
 HTTP is a request/response protocol.

 Three common HTTP message types


are:
• GET - A client request for data.
• POST - Uploads data files to the web
server.
• PUT - Uploads resources or content to the
web server.
 HTTP Secure (HTTPS) protocol uses
encryption and authentication to secure
data.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Web and Email Protocols
Email Protocols
 Email clients communicate with mail
servers to send and receive email.
 Mail servers communicate with other
mail servers to transport messages
from one domain to another.
 Three protocols for email:
• Simple Mail Transfer Protocol (SMTP) to
send email.
• Post Office Protocol (POP) to retrieve
email.
• Internet Message Access Protocol
(IMAP) to retrieve email.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Web and Email Protocols
SMTP Operation
 SMTP is used to send email

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Web and Email Protocols
POP Operation
 POP is used to retrieve
email from a mail server.
 Email is downloaded from
the server to the client and
then deleted on the server.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Web and Email Protocols
IMAP Operation
 IMAP is used to retrieve
mail from a mail server.
 Copies of messages are
downloaded from the server
to the client and the original
messages are stored on the
server.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Web and Email Protocols
Packet Tracer – Web and Email

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
4.2.3 Explain how DNS and
DHCP operate

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
IP Addressing Services
Domain Name Service
 Domain names convert the
numeric address into a
simple, recognizable name.
 The DNS protocol defines
an automated service that
matches resource names
with the required numeric
network address.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
IP Addressing Services
DNS Message Format
 When a client makes a query, the
server’s DNS process first looks at its
own records to resolve the name.
 If unable to resolve, it contacts other
servers to resolve the name.
 The server temporarily stores the
numbered address in the event that
the same name is requested again.
 The ipconfig /displaydns command
displays all of the cached DNS
entries on a Windows PC.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
IP Addressing Services
DNS Hierarchy

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
IP Addressing Services
The nslookup Command
 Nslookup - a utility that allows a user
to manually query the name servers
to resolve a given host.
• Can also be used to troubleshoot name
resolution issues and to verify the
current status of the name servers.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
IP Addressing Services
Dynamic Host Configuration Protocol
 The Dynamic Host Configuration Protocol
(DHCP) for IPv4 automates the
assignment of IPv4 addresses, subnet
masks, gateways, and other parameters.
 DHCP-distributed addresses are leased
for a set period of time, then returned to
pool for reuse.
 DHCP is usually employed for end user
devices. Static addressing is used for
network devices, such as gateways,
switches, servers, and printers.
 DHCPv6 (DHCP for IPv6) provides similar
services for IPv6 clients.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
IP Addressing Services
DHCP Operation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
IP Addressing Services
Packet Tracer – DHCP and DNS Servers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
IP Addressing Services
Lab – Observing DNS Resolution

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
File Sharing Services
File Transfer Protocol
 FTP requires two connections between
the client and the server, one for
commands and replies, the other for the
actual file transfer:
• The client establishes the first connection to
the server for control traffic using TCP port
21.
• The client establishes the second connection
to the server for the actual data transfer
using TCP port 20.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
File Sharing Services
Server Message Block
 The Server Message Block (SMB) is
a client/server file sharing protocol:
• SMB file-sharing and print services
have become the mainstay of Microsoft
networking.
• Clients establish a long-term connection
to servers and can access the
resources on the server as if the
resource is local to the client host.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
File Sharing Services
Packet Tracer - FTP

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
File Sharing Services
Lab – Exploring FTP

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Summary

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Conclusion
Packet Tracer - Explore a Network

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Conclusion
Packet Tracer - Multiuser - Tutorial

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Conclusion
Packet Tracer Multiuser - Implement Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Conclusion
Chapter 4: Application Layer

 Explain the operation of the application layer in providing support to end-


user applications.
 Explain how well-known TCP/IP application layer protocols operate.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37

You might also like