Danh mục

Lecture Introduction to Networks - Chapter 10: Application Layer

Số trang: 44      Loại file: pdf      Dung lượng: 1.09 MB      Lượt xem: 5      Lượt tải: 0    
Thư viện của tui

Xem trước 5 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

This chapter explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications; describe how common application layer protocols interact with end user applications; describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email;...
Nội dung trích xuất từ tài liệu:
Lecture Introduction to Networks - Chapter 10: Application Layer Chapter 10: Application Layer Network BasicsPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1Chapter 10 Objectives Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications. Describe how common application layer protocols interact with end user applications. Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email. Describe application layer protocols that provide IP addressing services, including DNS and DHCP. Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, File Sharing Services, SMB protocol. Explain how data is moved across the network, from opening an application to receiving data.Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2Chapter 10 10.1 Application Layer Protocols 10.2 Well-Known Application Layer Protocols and Service 10.3 The Message Heard Around the World 10.4 SummaryPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 310.1 Application Layer Protocols The Application Layer provides the interface to the network.Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4Application, Session and PresentationOSI and TCP/IP Models Revisited The key parallels are in the transport and network layer .Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5Application Session and PresentationApplication LayerPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6Application, Session and PresentationPresentation and Session Layers Presentation layer has three primary functions: • Coding and conversion of application layer data • Compression of the data • Encryption of the data for transmission and the decryption of data upon receipt by the destination Session Layer • Functions create and maintain dialogs between source and destination applications • Handles the exchange of information to initiate dialogs, keep them active, and to restart sessionsPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7Application, Session and PresentationPresentation and Session LayersPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8Application, Session and PresentationTCP/IP Application Layer Protocols Domain Name Service Protocol (DNS) - used to resolve Internet names to IP addresses Telnet - a terminal emulation protocol used to provide remote access to servers and networking devices Bootstrap Protocol (BOOTP) - a precursor to the DHCP protocol, a network protocol used to obtain IP address information during bootup Dynamic Host Control Protocol (DHCP) - used to assign an IP address, subnet mask, default gateway and DNS server to a host Hypertext Transfer Protocol (HTTP) - used to transfer files that make up the Web pages of the World Wide WebPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9Application, Session and PresentationTCP/IP Application Layer Protocols File Transfer Protocol (FTP) - used for interactive file transfer between systems Trivial File Transfer Protocol (TFTP) - used for connectionless active file transfer Simple Mail Transfer Protocol (SMTP) - used for the transfer of mail messages and attachments Post Office Protocol (POP) - used by email clients to retrieve email from a remote server Internet Message Access Protocol (IMAP) – another protocol for email retrievalPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10How Application Protocols Interact with End-User ApplicationsPeer-to-Peer Networks Both devices are considered equal in the communication The roles of client and server are set on a per request basis.Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11How Application Protocols Interact with End-User ApplicationsPeer-to-Peer Applications Client and server in the same communication Both can initiate a communication and are considered equal in the communication processPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12How Application Protocols Interact with End-User ApplicationsCommon P2P Applications  With P2P applications, each computer in the network running the application can act as a client or a server for the other computers in the network running the application  Common P2P applications include: • eDonkey • eMule • Shareaza • BitTorrent • Bitcoin • LionShare  Some P2P applications are based on the Gnutella protocol which enables people to share files on their hard disks with othersPresentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13How Application Protocols ...

Tài liệu được xem nhiều: