Application Layer Protocols
|
|
|
- Samson Strickland
- 9 years ago
- Views:
Transcription
1 Application Layer Protocols Network Applications Requirements Application Layer Protocol Functions. Sample Internet Applications & Protocols: File Transfer Protocol (FTP). Sending SMTP. HyperText Transfer Protocol (HTTP). Domain Name System (DNS) #1 lec #15 Spring
2 Network Applications & Application Layer Protocols The development of numerous network applications and the associated application-layer protocols has been a major driving force for computer network advancements over the past 30 years. The range of such diverse applications include: Text-based applications such as telnet, electronic mail, file transfer, newsgroups, most popular in the 70 s-80 s. More recent graphics- and multimedia-based applications such as the World Wide Web (the Internet s killer-app), Internet telephony, video conferencing, and streaming audio/video on demand, and interactive games. #2 lec #15 Spring
3 Common Network Applications Requirements Application Type Data Loss Bandwidth Requirements Latency sensitivity File transfer No loss Variable none Web documents No loss Variable none Real-time audio/video Loss-tolerant Audio: few Kbps to 1Mbpsyes 100's of msec Video: 10's Kbps to 5 Mbps Stored audio/video Loss-tolerant Same as interactive audio/video few seconds Interactive games Loss-tolerant Few Kbps to 10's Kbps 100's msecs Financial applications No loss Variable Application-dependent #3 lec #15 Spring
4 Application Layer Protocols An application layer protocol defines how an application processes (clients and servers), running on different end systems, pass messages to each other. In particular, an application layer protocol defines: The types of messages, e.g., request messages and response messages. The syntax of the various message types, i.e., the fields in the message and how the fields are delineated. The semantics of the fields, i.e., the meaning of the information that the field is supposed to contain; Rules for determining when and how a process sends messages and responds to messages. Many Internet application-layer protocols are fully specified in Request For Comments documents (RFCs) and are therefore in the public domain. For example, the HTTP 1.1 specification is included in RFC 2068, which was finalized and made public January If a browser (HTTP client) developer follows the rules of the HTTP 1.1 RFC, the browser will be able to retrieve Web pages from any Web server that has also has followed the rules of the HTTP 1.1 RFC. #4 lec #15 Spring
5 Structure of Internet Applications Using TCP & The Sockets API Client Server One or more TCP connections Request or Command Server Reply or Response #5 lec #15 Spring
6 Sample Internet Applications Application Type Application-layer protocol Transport Protocol Used/Port Electronic mail SMTP [RFC 821] Send: Simple Mail Transfer Protocol TCP 25 Receive: Post Office Protocol v3 TCP 110 POP3 [RCF 1939] Remote terminal access Telnet [RFC 854] TCP 23 World Wide Web (WWW) HyperText Transfer Protocol 1.1 TCP 80 HTTP 1.1 [RFC 2068] File Transfer FTP [RFC 959] File Transfer Protocol TCP 21 Trivial File Transfer Protocol UDP 69 TFTP [RFC 1350] Remote file server NFS [McKusik 1996] UDP or TCP Streaming multimedia Proprietary (e.g., Real Networks) UDP or TCP Internet telephony Proprietary (e.g., Vocaltec) Usually UDP #6 lec #15 Spring
7 Common Network/System Services & Ports Port Number Process Name Description 1 TCPMUX TCP Port Service Multiplexer 5 RJE Remote Job Entry 7 ECHO Echo 9 DISCARD Discard 11 USERS Active Users 13 DAYTIME Daytime 17 Quote Quotation of the Day 19 CHARGEN Character generator 20 FTP-DATA File Transfer Protocol - Data 21 FTP File Transfer Protocol - Control 23 TELNET Telnet 25 SMTP Simple Mail Transfer Protocol 27 NSW-FE NSW User System Front End 29 MSG-ICP MSG-ICP 31 MSG-AUTH MSG Authentication 33 DSP Display Support Protocol 35 Private Print Servers 37 TIME Time 39 RLP Resource Location Protocol 41 GRAPHICS Graphics 42 NAMESERV Host Name Server 43 NICNAME Who Is 49 LOGIN Login Host Protocol 53 DOMAIN Domain Name Server 67 BOOTPS Bootstrap Protocol Server 68 BOOTPC Bootstrap Protocol Client #7 lec #15 Spring
8 Common Network/System Services & Ports Port Number Process Name Description 69 TFTP Trivial File Transfer Protocol 79 FINGER Finger 80 HTTP HyperText Transfer Protocol 101 HOSTNAME NIC Host Name Server 102 ISO-TSAP ISO TSAP 103 X400 X X400SND X.400 SND 105 CSNET-NS CSNET Mailbox Name Server 109 POP2 Post Office Protocol v2 110 POP3 Post Office Protocol v3 111 RPC Sun RPC Portmap 119 NNTP Network News Transfer Protocol 137 NETBIOS-NS NETBIOS Name Server 138 NETBIOS-DG NETBIOS Datagram Service 139 NETBIOS-SS NETBIOS Session Service 146 ISO-TP0 ISO TP0 147 ISO-IP ISO IP 150 SQL-NET SQL NET 153 SGMP SGMP 156 SQLSRV SQL Service 160 SGMP-TRAPS SGMP TRAPS 161 SNMP Simple Network Management Protocol 162 SNMPTRAP SNMPTRAP 163 CMIP-MANAGE CMIP/TCP Manager 164 CMIP-AGENT CMIP/TCP Agent 165 XNS-Courier Xerox 179 BGP Border Gateway Protocol #8 lec #15 Spring
9 File Transfer Protocol (FTP), RFC 595 A protocol dating back to 1971 used for transferring files between hosts. In a typical FTP session: The user first provides the hostname of the remote host. The FTP client process in the local host establishes a control TCP connection with the FTP server process in the remote host on port 21. The user then provides the user identification and password, which get sent over this TCP connection as part of the FTP commands. Once the server has authorized the user, for each file to be transferred, FTP opens a data TCP connection on server port 20 which is used to transfer the file and is closed once the transfer is completed. #9 lec #15 Spring
10 Common FTP Commands and Replies FTP commands, from client to server, and replies, from server to client, are sent across the control TCP connection encoded in 7-bit ASCII. In order to delineate successive commands, a carriage return and a line feed end each command (and reply). Commands consist of four uppercase ASCII characters, some with optional arguments. Some of the more common commands are given below (with options in italics): USER username : Used to send the user identification to server. PASS password : Used to send the user password to the server. LIST : Used to ask the server to send back a list of all the files in the current remote directory. The list of files is sent over a (new and non-persistent) data TCP connection and not over the control TCP connection. RETR filename : Used to get a file from the current directory of the remote host. STOR filename : Used to store a file into the current directory of the remote host. There is typically a one-to-one correspondence between the commands the user issues and the FTP command sent across the TCP control connection. Each command is followed by a reply, sent from server to client. Replies are three-digit numbers, with an optional message following the number. message; Typical replies along with possible messages are as follows: 331 Username OK, password required 125 Data connection already open; transfer starting 425 Can't open data connection 452 Error writing file #10 lec #15 Spring
11 Sending Electronic Mail: Simple Mail Transfer Protocol (SMTP), RFC 821 SMTP transfers messages from senders' mail servers to the recipients' mail servers using TCP connections. SMPT existed long before it was fully specified by RFC 821 in Following the client/server model: SMTP has two sides: a client side which executes on a sender's mail server, and server side which executes on recipient's mail server. Both the client and server sides of SMTP run on every mail server. When a mail server sends mail (to other mail servers), it acts as an SMTP client. When a mail server receives mail (from other mail servers) it acts as an SMTP server. The process of sending a message: A user agent (mail reader) is used to create a message to be sent. The user agent directs the message to the outgoing message queue in the user's local mail server (acting as an SMTP client). The local mail server (SMTP client) opens a TCP connection directly to the remote destination SMTP mail server. After initial SMTP handshaking, the SMTP client sends the 7-bit ASCII encoded message into the TCP connection. The remote SMTP server receives the message over the TCP connection, closes the connection and places the message in the receipt's mailbox. #11 lec #15 Spring
12 The Internet Mail System All messages must be 7-bit ASCII Encoded #12 lec #15 Spring
13 Once the SMTP client (sender) established a TCP connection to the remote receiving SMTP server, the following is sent into the connection: Example Transaction Between An SMTP Client & Server Server: 220 receive.edu Client: HELO send.edu Server: 250 Hello send.edu, pleased to meet you Client: MAIL FROM: <[email protected]> Server: 250 [email protected]... Sender ok Client: RCPT TO: <[email protected]> Server: 250 [email protected]... Recipient ok Client: DATA Server: 354 Enter mail, end with "." on a line by itself Client: First line of message in seven-bit ASCII Client: Second and last line of example message. Client:. Server : 250 Message accepted for delivery Client: QUIT Server: 221 receive.edu closing connection #13 lec #15 Spring
14 Multipurpose Internet Mail Extensions (MIME) SMTP can only handle ASCII-encoded messages, hence binary data is first encoded to ASCII in such a way that certain ASCII characters (including ".") are not used, using base64 encoding for example. If binary data is included in a message MIME headers are used to inform the receiving mail agent: Content-Transfer-Encoding: header. Alerts the receiving user agent that the message body has been ASCII encoded and the type of encoding used. Content-Type: header. Informs the receiving mail agent about the type of data included in the message. Example message header when a base64-encoded JPEG image is included in the body of the message: From: [email protected] To: [email protected] Subject: A picture. MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Type: image/jpeg base64 encoded data base64 encoded data #14 lec #15 Spring
15 MIME Document Types/Subtypes Examples The content type of a document is described in the MIME Content-Type: header using a standard list of document types and subtypes. A few are shown here. File text html Jpeg Wav MPEG pdf VRML MIME Type/Sub-type text/plain text/html image/jpeg audio/x-wav video/mpeg application/pdf x-world/x-vrml #15 lec #15 Spring
16 The World Wide Web (WWW): HyperText Transfer Protocol (HTTP) The WWW was practically invented at CERN by Tim Berners-Lee and associates in when initial versions of HTML, HTTP, a Web server and a crude text-based browser (Web client) were developed. Marc Andreeseen, who helped to develop the popular GUI browser Mosaic for X at The National Center for Supercomputing Applications (NCSA), released an alpha version of his browser in 1993, and in 1994 formed Mosaic Communications which later became Netscape. The Hypertext Transfer Protocol (HTTP) the Web's main application-layer protocol although current browsers can access other types of servers. As are most application-layer protocols, HTTP is implemented in two programs: a client program: Web browser and server program: Web server that talk to each other by exchanging HTTP messages. HTTP defines the structure of these messages and how the client and server exchange the messages. HTTP utilizes TCP connections to send client requests and server replies. Current HTTP version: HTTP 1.1 (RFC 2068) January 97, adds among other enhancements persistent connections to transfer several objects per connection. #16 lec #15 Spring
17 HTML Document HTTP HTML Web Servers Web Clients Web Clients Web Server e.g. jasmine.isc.rit.edu:8000 Web server running on non-standard port Components of The Web Model #17 lec #15 Spring
18 Common HTML Tags #18 lec #15 Spring
19 Uniform Resource Locators (URLs) Web browsers may utilize several high level protocols to request data from a variety of servers in addition to HTTP servers. A uniform source locator (URL) specifies the following: Protocol used. Host name, alias, or IP address. Port number (if different from the default protocol port). Path to data requested. Resource requested (usually a file name). A few types of URLs: http e.g. FTP ftp://hostname:port/path/file e.g. ftp://beast.isc.rit.edu:25 Local file file:///path/file e.g. file:///my_files/file1.txt Telnet telnet://hostname:port e.g. telnet:// jasmine.isc.rit.edu gopher gopher://hostname/path/ news news://hostname:port #19 lec #15 Spring
20 Steps of Transferring A Web Page From Server To Client Using Non-Persistent TCP Connections 1. The HTTP client initiates a TCP connection to the server 2. The HTTP client sends a HTTP request message into the TCP connection. The request message either includes the entire URL or simply the path name /~meseec/eecc694-spring2000/index.html. 3. The HTTP server receives the request message, retrieves the object /~meseec/eecc694-spring2000/index.html from its storage, encapsulates the object in a HTTP response message, and sends the response message into the TCP connection. 4. The HTTP server tells TCP to close the TCP connection. (TCP doesn't terminate the connection until the client has received the response message) 5. The HTTP client receives the response message. The message indicates that the encapsulated object is an HTML file. The client extracts the file from the response message, parses the HTML file and finds references to a number of JPEG and GIF objects. 6. The first four steps are then repeated for each of the referenced JPEG and GIF objects. #20 lec #15 Spring
21 HTTP Message Examples Typical Request Message From A Client: GET /eecc694-spring2000/index.html HTTP/1.0 Connection: close User-agent: Mozilla/4.72 [en] (Win98; I) Accept: text/html, image/gif, image/jpeg Accept-language:en (extra carriage return, line feed) Typical Response Message From A Server: HTTP/ OK Connection: close Date: Wed, 05 April :00:15 GMT Server: NCSA/1.5.2 Last-Modified: Tue, 25 April :23:24 GMT Content-Length: Content-Type: text/html data data and more data... #21 lec #15 Spring
22 HTTP Message Formats: General Format of A Request Message Messages encoded in standard ASCII text. Method: GET, POST, and HEAD. The great majority of HTTP request messages use the GET method. The GET method is used when the browser requests an object, with the object identified in the URL. POST is used when the client user fills out a form. URL: No need to include server hostname since the TCP connection is already connected to the server. Version: HTTP version number used. (e.g. HTTP/1.0 or HTTP/1.1) Entity Body: Not used in the GET method, form data included in POST method. Space Line feed Carriage Return Connection: close, to request non-persistent TCP connections. User-agent: Browser used. Accept: type of objects the browser is prepared to accept Accept-language: #22 lec #15 Spring
23 HTTP Message Formats: General Format of A Response Message Version: HTTP version number used (e.g. HTTP/1.0 or HTTP/1.1). Status code and associated phrase indicate the result of the request. Some example status codes and associated phrases include: 200 OK: Request succeeded and the information is returned in the response. 301 Moved Permanently: Requested object has been permanently moved; new URL is specified in Location: header of the response message. The client software will automatically retrieve the new URL. 400 Bad Request: A generic error code indicating that the request could not be understood by the server. 404 Not Found: The requested document does not exist 505 HTTP Version Not Supported: The request HTTP protocol version is not supported by the server. Entity Body: The requested object if the response is successful. Connection: close for non-persistent TCP connections. Date: Current GMT date Server: Server type used Last-Modified: of object Content-Length: of object Content-Type: MIME Type/sub-type of object #23 lec #15 Spring
24 Domain Name System (DNS) DNS is a hierarchical system, based on a distributed database, that uses a hierarchy of Name Servers to resolve Internet host names into the corresponding IP addresses required for packet routing by issuing a DNS query to a name server. Name servers are usually Unix machines running the Berkeley Internet Name Domain (BIND) software. On many Unix-based machines using the sockets-api, gethostbyname() is the library routine that an application calls in order to issue a DNS query. Resource record: Associated with each host on the Internet, includes IP address, domain name, domain name server, etc. When resolving a host name, DNS returns the associated resource record of the host. Internet domain names are divided into generic top-level domains (edu, com, gov, mil) which include all US domains and country domains. The DNS space is divided into non-overlapping zones. Resource records of all hosts in a sub-domain are kept as a DNS database stored at the domain name server responsible for that sub-domain or zone. #24 lec #15 Spring
25 Principal DNS Resource Record Types #25 lec #15 Spring
26 A Partial DNS Database #26 lec #15 Spring
27 Zone Division of DNS Name Space #27 lec #15 Spring
28 #28 lec #15 Spring
29 Recursive DNS Queries Example A two-level name server hierarchy is shown here as an example. In reality, several levels of name servers may be queried recursively. Hostname to be resolved A network application running on beast.isc.rit.edu issues a DNS query using gethostbyname()to resolve hostname halcyon.usc.edu Returns DNS Resource recordfor halcyon.usc.edu including IP address(s) #29 lec #15 Spring
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360
CPSC 360 - Network Programming E, FTP, and NAT Michele Weigle Department of Computer Science Clemson University [email protected] April 18, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:
The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
FTP and email. Computer Networks. FTP: the file transfer protocol
Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer
TCP/UDP # General Name Short Description
This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found
FTP: the file transfer protocol
FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer
Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections
: the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles
The Application Layer. CS158a Chris Pollett May 9, 2007.
The Application Layer CS158a Chris Pollett May 9, 2007. Outline DNS E-mail More on HTTP The Domain Name System (DNS) To refer to a process on the internet we need to give an IP address and a port. These
FTP: the file transfer protocol
File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW
Application Example WWW Communication in the WWW In the following application protocol examples for WWW and E-Mail World Wide Web (WWW) Access to linked documents, which are distributed over several computers
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Introduction to LAN/WAN. Application Layer (Part II)
Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used
Chapter 27 Hypertext Transfer Protocol
Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI
WHAT IS A WEB SERVER?
4663ch01.qxd_lb 12/2/99 12:54 PM Page 1 CHAPTER 1 WHAT IS A WEB SERVER? Never trust a computer you can t throw out a window. Steve Wozniak CHAPTER OBJECTIVES In this chapter you will learn about: Client/Server
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
What really is a Service?
Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
Internet Services. Sadiq M. Sait, Ph.D
Internet Services Sadiq M. Sait, Ph.D [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Internet Short Course 1-1 What really
Distributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.
CS326e Spring 2014 Midterm Exam Name SOLUTIONS UTEID The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. 1. [4 Points]
Domain Name System (DNS)
Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
World Wide Web. Before WWW
World Wide Web [email protected] Before WWW Major search tools: Gopher and Archie Archie Search FTP archives indexes Filename based queries Gopher Friendly interface Menu driven queries João Neves 2
Network Applications
Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing
CONTENT of this CHAPTER
CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.
CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file
Data Communication I
Data Communication I Urban Bilstrup (E327) 090901 [email protected] www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able
Principles of Network Applications. Dr. Philip Cannata
Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
The Application Layer: DNS
Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)
CSCI-1680 SMTP Chen Avin
CSCI-1680 Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Electronic Three major components: s s simple transfer protocol: User Agent a.k.a. reader composing, editing, reading
TCP/IP Networking An Example
TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
The Web History (I) The Web History (II)
Goals of Today s Lecture EE 122: The World Wide Web Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Network Working Group Request for Comments: 840 April 1983. Official Protocols
Network Working Group Request for Comments: 840 J. Postel ISI April 1983 This RFC identifies the documents specifying the official protocols used in the Internet. Annotations identify any revisions or
41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver 8021-8022 TCP/UDP
TCP/IP ports that might be used with Canon office equipment (in alphabetical order) 3/1/2009 Axis Print server. This port is used to identify the status the axis print server. This is performed approx
Communicating Applications
Communicating Applications Network Applications The raison d'être of computer networks Innovation happens in the application layer There is always a killer application Remote login -> Email -> Web -> P2P
Application Layer -1- Network Tools
EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2015, Lecture 08 Kaan Bür Previously on EITF25 Addressing above IP Ports, sockets Process-to-process delivery Transport
INF3190 Application Layer DNS, Web, Mail
INF3190 Application Layer DNS, Web, Mail Carsten Griwodz Email: [email protected] Application layer Introduction What is it? Internet view everything above the socket interface is application layer function
Internet Technologies Internet Protocols and Services
QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department [email protected] http://ce.qu.edu.az/~aadamov
Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen
Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Lecture 2. Internet: who talks with whom?
Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
Computer Networks. Examples of network applica3ons. Applica3on Layer
Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
You can do THAT with SAS Software? Using the socket access method to unite SAS with the Internet
You can do THAT with SAS Software? Using the socket access method to unite SAS with the Internet David L. Ward, DZS Software Solutions, Inc., Bound Brook, NJ ABSTRACT The addition of the socket access
Computer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
M3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015
CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,
Basic Operation & Management of TCP/IP Networks
Basic Operation & Management of TCP/IP Networks SYSTEMS, Inc. For the MU-SPIN Coordination Office Slide 1 Presentation Contents Introduction to the Internet, Protocols and TCP/IP IP addressing, Name Resolution
FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL
FTP FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL Peter R. Egli INDIGOO.COM 1/22 Contents 1. FTP versus TFTP 2. FTP principle of operation 3. FTP trace analysis
File Transfer Protocol (FTP) & SSH
http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.
Product Standard General Interworking: Internet Server
General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
Application Layer: HTTP and the Web. Srinidhi Varadarajan
Application Layer: HTTP and the Web Srinidhi Varadarajan The Web: the http protocol http: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests,
SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
Basic Internet programming Formalities. Hands-on tools for internet programming
Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl [email protected] DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23
Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006
Network Services Email SMTP, Internet Message Format Johann Oberleitner SS 2006 Agenda Email SMTP Internet Message Format Email Protocols SMTP Send emails POP3/IMAPv4 Read Emails Administrate mailboxes
Introduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
Configuring a Backup Path Test Using Network Monitoring
6AOSCG0006-29B February 2011 Configuration Guide Configuring a Backup Path Test Using Network Monitoring This configuration guide describes how to configure a demand routing test call to test the availability
Web Programming. Robert M. Dondero, Ph.D. Princeton University
Web Programming Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn: The fundamentals of web programming... The hypertext markup language (HTML) Uniform resource locators (URLs) The
Internet Technologies 4-http. F. Ricci 2010/2011
Internet Technologies 4-http F. Ricci 2010/2011 Content Hypertext Transfer Protocol Structure of a message Methods Headers Parameters and character encoding Proxy Caching HTTP 1.1: chunked transfer and
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
7 Why Use Perl for CGI?
7 Why Use Perl for CGI? Perl is the de facto standard for CGI programming for a number of reasons, but perhaps the most important are: Socket Support: Perl makes it easy to create programs that interface
