You are on page 1of 36

Data Communication and Networks

Department of Computer Science


Najran University
Application Layer Functionality and Protocols
Applications Layer – allows user to interface with the network!
Protocols

•  DNS – Matches domain names with IP


addresses
•  HTTP – Used to transfer data between
clients/servers using a web browser
•  SMTP & POP3 – used to send email
messages from clients to servers over the
internet
Protocols
•  FTP – allows the download/upload of files
between a client/server
•  Telnet – allows users to login to a host
from a remote location and take control as
if they were sitting at the machine (virtual
connection)
•  DHCP – assigns IP addresses, subnet
masks, default gateways, DNS servers,
etcs. To users as they login the network
Application layer software
•  2 types
Applications – Provide the human (user)
interface.
Services – establish an interface to the
network where protocols provide the rules
and formats that govern how data is treated
How data requests occur & are filled

•  Client/server model
Advantages:
Centralized administration
Security is easier to enforce
•  Application layer services and protocols
•  Peer-to-peer networking and applications
Client/Server Model
•  Client – device requesting information (initiates the data
exchange)
Can also UPLOAD data to the servers
•  Server – device responding to the request
Relies on support from the lower layer functions to
distinguish between services and conversations.
Server relies on a service called a server daemon – runs
in the background and ‘listens’ for requests for that
service. It can then exchange messages as appropriate
& send requested data.
•  Examples:
E-mail Client on an employee computer issues a request
to the e-mail server for any unread e-mail. The server
responds by sending the e-mail to the client.
Conversations can originate with either party.
Peer-to-Peer (P2P) Network Model
•  Two or more computers are connected
and are able to share resources without
having a dedicated server
•  Every end device can function as a client
or server on a ‘per request’ basis
•  Resources are decentralized
(information can be located anywhere)
•  Difficult to enforce security and policies
•  User accounts and access rights have to
be set individually on each peer device
DOMAIN NAME SYSTEM (DNS)
DNS Services

•  DNS resolver – supports name resolution


for other network applications and
services that need it.

•  Uses different types of resource records


to actually resolve the name/IP address
issues
DSN Services and Protocol

DNS Servers resolve names to IP addresses. It would be


difficult to remember the IP address of every website we like to
visit, but we can remember names.
Domain Name System (DNS)

•  U"lity - nslookup:
•  Windows opera"ng systems provide the nslookup u"lity.
•  Use to query a domain name and get the IP Address.
WWW SERVICE & HTTP
WWW Service and HTTP
•  Steps:
1) URL is typed in the address bar.
2)  Browser checks with DNS server to convert it to an
IP address
3)  Connects to the server requested
4)  Using HTTP or HTTPS protocol requirements, the
browser sends a GET request to the server to ask
for the desired html document (usually index.html)
5)  The server sends the HTML code for the web page
to the browser.
6)  The browser interprets the HTML code and formats
the page to fit the browser window.
7)  See the next slide for an example.
WWW Service and HTTP

HTTP/HTTPS are
some of the
MOST used
application
protocols
WWW Service & HTTP
—  HTTP specifies a request/response protocol. When a client, typically a
web browser, sends a request message to a server, the HTTP protocol
defines the message types the client uses to request the web page and
also the message types the server uses to respond. The three common
message types are GET, POST, and PUT.
—  Although it is remarkably flexible, HTTP is not a secure protocol.
—  The POST messages upload information to the server in plain text that
can be intercepted and read.
—  Similarly, the server responses, typically HTML pages, are also
unencrypted.
—  So in come HTTPS. What is HTTPS??
—  For secure communication across the Internet, the HTTP Secure
(HTTPS) protocol is used for accessing or posting web server
information.
WWW Service & HTTP

—  GET is a client request for data. A web browser sends


the GET message to request pages from a web
server.
—  POST and PUT are used to send messages that
upload data to the web server.
—  For example, when the user enters data into a form embedded in a web
page, POST includes the data in the message sent to the server.
—  PUT uploads resources or content to the web server.
EMAIL SERVICES AND SMTP/POP
PROTOCOLS
E-mail services and SMTP/POP protocols

E-mail requires several applica"ons and services.


• Two example Applica"on layer protocols are
• Post Office Protocol (POP) and
• Simple Mail Transfer Protocol (SMTP)
• As with HTTP, these protocols define client/server
processes.
• When people compose e-mail messages, they
typically use an applica"on called a Mail User Agent
(MUA), or e-mail client ,The MUA allows messages to be
sent and places received messages into the client's
mailbox
FILE TRANSFER PROTOCOL (FTP)
File Transfer Protocol (FTP)

•  The File Transfer Protocol (FTP) is another


commonly used Application layer protocol.
•  FTP was developed to allow for file
transfers between a client and a server.
•  An FTP client is an application that runs on
a computer that is used to push (upload)
and pull (download) files from a server
running the FTP daemon (FTPd).
File Transfer Protocol (FTP)
TCP Port 21

TCP Port 20

•  Uses two well-known ports:


•  Port 21 is used to establish the connec"on and the transfer of control informa"on.
•  Port 20 is used for the actual data transfer.
File Transfer Protocol (FTP)
Client initiates a TCP control connection on Port 21.
Username and password….

21

20

For each file transferred, TCP opens and


closes a Data connection on Port 20.
THE DYNAMIC HOST CONFIRMATION
PROTOCOL (DHCP)
DHCP
—  The DHCP service
enables devices on a
network to obtain IP
addresses and other
information from a
DHCP server.
—  This service automates
the assignment of IP
addresses, subnet
masks, gateway and
other IP networking
parameters.
DHCP
•  The DHCP server is contacted and an address requested. The
DHCP server chooses an address from a configured range of
addresses called a pool and assigns ("leases") it to the host for
a set period.
•  If the host is powered down or taken off the network, the
address is returned to the pool for reuse. This is especially
helpful with mobile users .
DHCP
•  DHCP is a four step process.

1. Client broadcasts a DHCP Discover frame to find a DHCP


server. There may be more than one available.
DHCP

2.  A DHCP server responds with a DHCP Offer frame


containing a lease time, an IP Address, Subnet Mask, and
addresses for a Default Gateway and DNS Server.
DHCP

3.  The client responds by broadcasting a DHCP Request that


identifies the server and the lease offer it is accepting.
DHCP

4.  If the offer is still valid, the server returns a DHCP


Acknowledgement and records that information as used. If
it is no longer valid, a DHCP Negative Acknowledgement is
sent and the process begins again.
TELNET
Telnet
•  Telnet provides a standard method of emulating text-based terminal
devices over the data network.
•  A connection using Telnet is called a Virtual Terminal (VTY)
session, or connection.
•  Rather than using a physical device to connect to the server, Telnet
uses software to create a virtual device that provides the same
features of a terminal session with access to the server command
line interface (CLI).
•  To support Telnet client connections, the server runs a service called
the Telnet daemon. A virtual terminal connection is established from
an end device using a Telnet client application.
•  If security is a concern, the Secure Shell (SSH) protocol offers an
alternate and secure method for server access.

You might also like