App-layer protocol defines

Similar documents
The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

1 Introduction: Network Applications

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Principles of Network Applications. Dr. Philip Cannata

Distributed Systems. 2. Application Layer

Network Applications

DATA COMMUNICATOIN NETWORKING

Computer Networks. Examples of network applica3ons. Applica3on Layer

Network Technologies

Application Layer: HTTP and the Web. Srinidhi Varadarajan

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

Computer Networks & Security 2014/2015

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

Final for ECE374 05/06/13 Solution!!

CONTENT of this CHAPTER

First Midterm for ECE374 03/09/12 Solution!!

The Web History (I) The Web History (II)

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Chapter 2 Application Layer

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Review of Networking Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Computer Networks - CS132/EECS148 - Spring

Lecture 2. Internet: who talks with whom?

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Transport Layer Protocols

CMPE 80N: Introduction to Networking and the Internet

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Lecture 28: Internet Protocols

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Advanced Higher Computing. Computer Networks. Homework Sheets

Streaming Stored Audio & Video

M3-R3: INTERNET AND WEB DESIGN

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

LESSON Networking Fundamentals. Understand TCP/IP

Introduction to Computer Networks

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Data Communication I

Sage ERP Accpac Online

Computer System Management: Hosting Servers, Miscellaneous

Application-layer protocols

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

Today s Lecture : Introduction to Telecommunication Networks Lectures 2: Protocol Stack. Applications and Application Protocols

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

Remote login (Telnet):

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Introdução aos Sistemas Distribuídos

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW

Multimedia Communications Voice over IP

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Objectives of Lecture. Network Architecture. Protocols. Contents

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

Transport and Network Layer

Lecture 8a: WWW Proxy Servers and Cookies

internet technologies and standards

TCP/IP and the Internet

Deployment Guide Microsoft IIS 7.0

Communicating Applications

Introduction to LAN/WAN. Application Layer (Part II)

Firewalls, IDS and IPS

Java Secure Application Manager

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

The Different Types of TCPIP and Their Uses

Internet Control Protocols Reading: Chapter 3

Computer Networks CS321

S y s t e m A r c h i t e c t u r e

Internet Concepts. What is a Network?

Transport Layer Security Protocols

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Architecture and Performance of the Internet

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Computer Networks. Instructor: Niklas Carlsson

02 Internet!= Web. Internet Technology. MSc in Communication Sciences Program in Technologies for Human Communication.

Frequently Asked Questions

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

FTP: the file transfer protocol

TSIN02 - Internetworking

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

UC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One

File Transfer Protocol (FTP) & SSH

Understanding Slow Start

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Internet Privacy Options

Cookies Overview and HTTP Proxies

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

CS268 Exam Solutions. 1) End-to-End (20 pts)

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Transcription:

App-layer protocol defines Types of messages exchanged, e.g., request, response Message syntax: what fields in messages & how fields are delineated Message semantics meaning of information in fields Rules for when and how processes send & respond to messages Public-domain protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP Proprietary protocols: e.g., Skype 2: Application Layer 1

What transport service does an app need? Data loss some apps (e.g., audio) can tolerate some loss other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing some apps (e.g., Internet telephony, interactive games) require low delay to be effective Throughput some apps (e.g., multimedia) require minimum amount of throughput to be effective other apps ( elastic apps ) make use of whatever throughput they get Security Encryption, data integrity, 2: Application Layer 2

Transport service requirements of common apps Application Data loss Throughput Time Sensitive file transfer no loss elastic no e-mail no loss elastic no Web documents no loss elastic no real-time audio/video stored audio/video loss-tolerant audio: 5kbps-1Mbps video: 10kbps-5Mbps yes, 100 s of msecs loss-tolerant same as above yes, few secs interactive games loss-tolerant few kbps up instant messaging yes, 100 s of msecs no loss elastic yes and no 2: Application Layer 3

Primary Internet Transport-layer protocols and services TCP service: connection-oriented: setup required between client and server processes reliable transport: between sending and receiving process flow control: sender won t overwhelm receiver congestion control: throttle sender when network overloaded does not provide: timing, minimum throughput guarantees, security UDP service: unreliable data transfer between sending and receiving process does not provide: connection setup, reliability, flow control, congestion control, timing, throughput guarantee, or security Q: why bother? Why is there a UDP? 2: Application Layer 4

Internet apps: application, transport protocols Application App-layer Protocol Underlying Transport Protocol e-mail SMTP (RFC 2821) TCP remote terminal access Telnet (RFC 854) TCP Web HTTP (RFC 2616) TCP file transfer FTP (RFC 959 TCP streaming HTTP (e.g. Youtube), multimedia RTP (RFC 1889) TCP or UDP Internet telephony SIP (various RFCs), RTP, proprietary (e.g. Skype) typically UDP 2: Application Layer 5

Chapter 2: Application layer 2.1 Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket programming with UDP 2: Application Layer 6

Web and HTTP First some jargon Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which can include referenced objects Each object is addressable by a URL Example URL: www.someschool.edu/somedept/pic.gif host name path name 2: Application Layer 7

HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests, receives, displays Web objects server: Web server sends objects in response to requests PC running Explorer HTTP request HTTP response HTTP request HTTP response Server running Apache Web server Mac running Navigator 2: Application Layer 8

HTTP overview (continued) Uses TCP: client initiates TCP connection (creates socket) to server, using port 80 server accepts TCP connection from client HTTP messages (applicationlayer protocol messages) exchanged between browser (HTTP client) and Web server (HTTP server) TCP connection closed HTTP is stateless server maintains no information about past client requests 2: Application Layer 9

HTTP: how does it work?

HTTP connections Nonpersistent HTTP At most one object is sent over a TCP connection. Persistent HTTP Multiple objects can be sent over single TCP connection between client and server. 2: Application Layer 11

Nonpersistent HTTP Suppose user enters URL www.someschool.edu/somedepartment/home.index (contains text, references to 10 jpeg images) 1a. HTTP client initiates TCP connection to HTTP server (process) at www.someschool.edu on port 80 2. HTTP client sends HTTP request message (containing URL) into TCP connection socket. Message ask for the object somedepartment/home.index 4. HTTP client receives response message containing html file, displays html. Parsing html file, finds 10 referenced jpeg objects 1b. HTTP server at host www.someschool.edu,waiting for TCP connection at port 80. accepts connection, notifying client 3a. HTTP server receives request message, forms response message containing requested object, and sends message into its socket 3b. HTTP server closes TCP connection. 5. Steps 1-4 repeated for each of 10 jpeg objects time 2: Application Layer 12

Persistent HTTP Suppose user enters URL www.someschool.edu/somedepartment/home.index (contains text, references to 10 jpeg images) 1a. HTTP client initiates TCP connection to HTTP server (process) at www.someschool.edu on port 80 2. HTTP client sends HTTP request message (containing URL) into TCP connection socket. Message ask for the object somedepartment/home.index 1b. HTTP server at host www.someschool.edu,waiting for TCP connection at port 80. accepts connection, notifying client 3. HTTP server receives request message, forms response message containing requested object, and sends message into its socket 4. HTTP client receives response message containing html file, displays html. Parsing html file, finds 10 referenced jpeg objects 5. Only steps 2-4 repeated for the 10 jpeg objects. time 6. HTTP server closes TCP connection. 2: Application Layer 14

Non-Persistent HTTP: Response time Definition of RTT: Round-Trip Time, time for a small packet to travel from client to server and back. Response time: one RTT to initiate TCP connection one RTT for HTTP request and first few bytes of HTTP response to return file transmission time total = 2RTT+transmit time initiate TCP connection RTT request file RTT file received time to transmit file time time 2: Application Layer 15

Persistent HTTP Nonpersistent HTTP issues: requires 2 RTTs per object OS overhead for each TCP connection To speed things up, browsers often open parallel TCP connections to fetch referenced objects Persistent HTTP server leaves connection open after sending response subsequent HTTP messages between same client/server sent over open connection client sends requests as soon as it encounters a referenced object as little as one RTT for each of the referenced objects 2: Application Layer 16

what does HTTP look like? There are two types of HTTP messages: request response

HTTP request message HTTP request message: ASCII (human-readable format) request line (GET, POST, HEAD commands) header lines Carriage return, line feed indicates end of message GET /somedir/page.html HTTP/1.1 Host: www.someschool.edu User-agent: Mozilla/4.0 Connection: close Accept-language:fr (extra carriage return, line feed) 2: Application Layer 18

HTTP request message: general format 2: Application Layer 19

Uploading form input Post method: Web page often includes form input Input is uploaded to server in entity body URL method: Uses GET method Input is uploaded in URL field of request line: www.somesite.com/animalsearch?monkeys&banana 2: Application Layer 20

Method types HTTP/1.0 GET POST HEAD asks server to leave requested object out of response HTTP/1.1 GET, POST, HEAD PUT uploads file in entity body to path specified in URL field DELETE deletes file specified in the URL field 2: Application Layer 21

HTTP response message status line (protocol status code status phrase) data, e.g., requested HTML file header lines HTTP/1.1 200 OK Connection close Date: Thu, 06 Aug 1998 12:00:15 GMT Server: Apache/1.3.0 (Unix) Last-Modified: Mon, 22 Jun 1998... Content-Length: 6821 Content-Type: text/html data data data data data... 2: Application Layer 22

HTTP response status codes In first line in server->client response message. A few sample codes: 200 OK request succeeded, requested object later in this message 301 Moved Permanently requested object moved, new location specified later in this message (Location:) 400 Bad Request request message not understood by server 404 Not Found requested document not found on this server 505 HTTP Version Not Supported 2: Application Layer 23

Trying out HTTP (client side) for yourself 1. Telnet to your favorite Web server: telnet cis.poly.edu 80 Opens TCP connection to port 80 (default HTTP server port) at cis.poly.edu. Anything typed in sent to port 80 at cis.poly.edu 2. Type in a GET HTTP request: GET /~ross/ HTTP/1.1 Host: cis.poly.edu By typing this in (hit carriage return twice), you send this minimal (but complete) GET request to HTTP server 3. Look at response message sent by HTTP server! 2: Application Layer 24

Additions and extensions to HTTP Cookies Proxies conditional GET

User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP response message 2) cookie header line in HTTP request message 3) cookie file kept on user s host, managed by user s browser 4) back-end database at Web site Example: Susan always access Internet always from PC visits specific e-commerce site for first time when initial HTTP requests arrives at site, site creates: unique ID entry in backend database for ID 2: Application Layer 27

Cookies: keeping state (cont.) client ebay 8734 cookie file ebay 8734 amazon 1678 one week later: ebay 8734 amazon 1678 usual http request msg usual http response Set-cookie: 1678 usual http request msg cookie: 1678 usual http response msg usual http request msg cookie: 1678 usual http response msg server Amazon server creates ID 1678 for user create entry cookiespecific action cookiespectific action access access backend database 2: Application Layer 28

Cookies (continued) What cookies can bring: authorization shopping carts recommendations user session state (Web e- mail) aside Cookies and privacy: cookies permit sites to learn a lot about you you may supply name and e-mail to sites How to keep state : protocol endpoints: maintain state at sender/receiver across multiple transactions cookies: http messages transmit state information 2: Application Layer 29

Web caches (proxy server) Goal: satisfy client request without involving origin server user sets browser: Web accesses via cache browser sends all HTTP requests to cache object in cache: cache returns object else cache requests object from origin server, then returns object to client client HTTP request HTTP response HTTP request HTTP response Proxy server HTTP request HTTP response origin server client origin server 2: Application Layer 30

More about Web caching cache acts as both client and server typically cache is installed by ISP (university, company, residential ISP) Why Web caching? reduce response time for client request reduce traffic on an institution s access link. Internet dense with caches: enables poor content providers to effectively deliver content (but so does P2P file sharing) 2: Application Layer 31

Caching example Assumptions average object size = 100,000 bits avg. request rate from institution s browsers to origin servers = 15/sec delay from institutional router to any origin server and back to router = 2 sec Consequences utilization on LAN = 15% utilization on access link = 100% total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + milliseconds institutional network public Internet 1.5 Mbps access link 10 Mbps LAN origin servers institutional cache 2: Application Layer 32

Caching example (cont) possible solution increase bandwidth of access link to, say, 10 Mbps consequence utilization on LAN = 15% utilization on access link = 15% Total delay = Internet delay + access delay + LAN delay = 2 sec + msecs + msecs often a costly upgrade institutional network public Internet 10 Mbps access link 10 Mbps LAN origin servers institutional cache 2: Application Layer 33

Caching example (cont) possible solution: install cache suppose hit rate is 0.4 consequence 40% requests will be satisfied almost immediately 60% requests satisfied by origin server utilization of access link reduced to 60%, resulting in negligible delays (say 10 msec) total avg delay = Internet delay + access delay + LAN delay =.6*(2.01) secs +.4*milliseconds < 1.4 secs institutional network public Internet 1.5 Mbps access link 10 Mbps LAN origin servers institutional cache 2: Application Layer 34

Conditional GET Goal: don t send object if cache has up-to-date cached version cache: specify date of cached copy in HTTP request If-modified-since: <date> server: response contains no object if cached copy is up-todate: HTTP/1.0 304 Not Modified cache HTTP request msg If-modified-since: <date> HTTP response HTTP/1.0 304 Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/1.0 200 OK <data> server object not modified object modified 2: Application Layer 35