Chapter 3 Notes

  • Uploaded by: Trevor
  • 0
  • 0
  • October 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Chapter 3 Notes as PDF for free.

More details

  • Words: 1,087
  • Pages: 4
Chapter 3  Application Layer Functionality and Protocols  Protocols: • Define processes on either end of the communication • Define the types of messages • Define the syntax of messages • Define the meaning of any informational fields • Define how messages are sent and the expected response • Define interaction with the next lower layer  Examples: • Domain Name Service Protocol (DNS) ♦ Used to resolve internet names to IP addresses • Hypertext Transfer Protocol (HTTP) ♦ Used to transfer files that make up the Web pages of the World Wide Web • Simple Mail Transfer Protocol (SMTP) ♦ Used for the transfer of mail messages and attachments • Telnet ♦ Used to provide remote access to servers and networking devices • File Transfer Protocol (FTP) ♦ Used for interactive file transfer between systems  Two forms of software programs or processes • Network-Aware Applications ♦ Software used by people to communicate over the network • Application Layer Services ♦ The programs that interface with the network and prepare the data for transfer  The Client/Server Model ➢ The device requesting the information is called a client and the device responding to the request is called a server  Data transfer from a client to a server is referred to as an upload  Data transfer from a server to a client is referred to as a download ➢ Servers  In a general networking context, any device that responds to requests from client applications is functioning as a server  The server runs a service, or process sometimes called a server daemon • Daemons run in the background • Listen for a request • When request is heard, it exchanges appropriate message with client  The Peer-to-Peer Model ➢ Two or more computers are connected via a network and can share resources without having a dedicated server ➢ Every device functions as a server and a client  DNS Services and Protocol ➢ Transport layer uses an addressing scheme called a port number  TCP/UDP services:

• DNS – TCP/UDP Port 53 • HTTP – TCP Port 80 • SMTP – TCP Port 25 • POP – UDP Port 110 • Telnet – TCP Port 23 • DHCP – UDP Port 67 • FTP – TCP Port 20 & 21  DNS uses a distributed set of servers to resolve the names associated with these numbered addresses  DNS protocol defines an automated service that matches resource names with the required numeric network address • Transfer use a single format called a message  DNS client, or DNS Resolver supports name resolution for our other network applications and other services that need it  DNS server stores different types of resource records used to resolve names • A – an end device address • NS – an authoritative name server • CNAME – the canonical name (fully qualified domain name) for an alias ♦ Used when multiple services have the single network address but each service has its own entry in DNS • MX – mail exchange record ♦ Maps a domain name to a list of mail exchange servers for that domain ➢ WWW Service and HTTP  Steps used by HTTP • Client requests a page • HTTP response – server returns code for a web page • Client browser interprets code and displays a webpage  HTTP specifies a request/response protocol • GET – client request for data • POST & PUT - used to send messages that upload data to the web server ♦ POST – upload information to the server in plain text that can be intercepted and read ♦ PUT – uploads resources or content to the web server ➢ E-mail Services and SMTP/POP Protocols  Mail User Agent (MUA) - allows messages to be sent and places received messages into the client’s mailbox  Mail Transfer Agent (MTA) – governs e-mail handling between servers and servers  Mail Delivery Agent (MDA) – governs delivery of e-mail between servers and clients  SMTP Protocols • HELO – identifies the SMTP client process to the SMTP server process • EHLO – a newer version of HELO; includes services extensions • MAIL FROM – identifies the sender

• RCPT TO – identifies the recipient • DATA – identifies the body of the message ➢ FTP  Two connections between server and client • Control Connection♦ Client opens first connection to the server for control traffic •









Data Connection♦ Client opens second connection for data traffic Dynamic Host Configuration Protocol (DHCP) ➢ Enables devices on a network to obtain IP addresses and other information from a DHCP server ➢ Client IPs are dynamic (change)  Once a client is done with address, it is put back into pool for reallocation ➢ DHCP Address Request Steps:  Client sends DHCP DISCOVER to find server  Server sends DHCP OFFER to client  Client sends DHCP REQUEST to identify server and lease  Server sends DHCP ACK (acknowledge) which tells client that the lease is finalized • DHCP NAK (not acknowledged) – process starts over Server Message Block (SMB) Protocol ➢ Client-server, request-response protocol ➢ Servers can make their resources available to clients on the network ➢ Messages can:  Start, authenticate, and terminate sessions  Control file and printer access  Allow an application to send/receive messages to/from another device P2P Services and Gnutella Protocol ➢ Share files over Gnutella protocol ➢ 5 Types of packets:  ping - for device discovery  pong - as a reply to a ping  query - for file location  query hit - as a reply to a query  push - as a download request Telnet ➢ Provides a way to use a computer, connected via the network, to access a network device as if the keyboard and monitor were directly connected to the device ➢ uses software to create a virtual device that provides the same features of a terminal session with access to the server command line interface (CLI) ➢ Each command consists of at least 2 bytes  First byte is called Interpret as command (IAC) ➢ Other commands:  Are You There (AYT) - Lets the user request that something appear on the terminal screen to indicate that the VTY session is active.  Erase Line (EL) - Deletes all text from the current line.



Interrupt Process (IP) - Suspends, interrupts, aborts, or terminates the process to which the Virtual Terminal is connected.

Related Documents

Chapter 3 Notes
October 2019 23
Chapter 3 Notes
April 2020 13
Chapter 3 Notes
July 2020 6
Chapter 3 Notes
July 2020 9

More Documents from ""

Chapter 9 Notes
October 2019 17
Chapter 3 Notes
October 2019 23
Chapter 8 Notes
October 2019 16
Ethnicity.docx
May 2020 12
Chapter 7 Notes
October 2019 22
Chapter 2 Lecture
October 2019 30