Chapter 2
Application Layer
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers). Computer
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs. Networking: A Top
They obviously represent a lot of work on our part. In return for use, we only
ask the following: Down Approach
If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
6th edition
If you post any slides on a www site, that you note that they are adapted Jim Kurose, Keith Ross
from (or perhaps identical to) our slides, and note our copyright of this
material.
Addison-Wesley
March 2012
Thanks and enjoy! JFK/KWR
All material copyright 1996-2012
J.F Kurose and K.W. Ross, All Rights Reserved
Application Layer 2-1
Chapter 2: outline
2.1 Principles of network 2.6 P2P applications
applications 2.7 socket programming
2.2 Web and HTTP with UDP and TCP
2.3 FTP
2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
Application Layer 2-2
Chapter 2: application layer
our goals: learn about protocols by
conceptual, examining popular
implementation aspects application-level
of network application protocols
protocols HTTP
transport-layer FTP
service models SMTP / POP3 / IMAP
client-server DNS
paradigm creating network
peer-to-peer applications
paradigm socket API
TPB - AFK
Application Layer 2-3
Some network apps
e-mail voice over IP (e.g., Skype)
web real-time video
text messaging conferencing
remote login social networking
P2P file sharing search
multi-user network games …
streaming stored video …
(YouTube, Hulu, Netflix)
Application Layer 2-4
Creating a network app application
transport
network
data link
write programs that: physical
run on (different) end systems
communicate over network
e.g., web server software
communicates with browser
software
no need to write software for application
network-core devices transport
network
data link application
network-core devices do not physical transport
network
run user applications data link
physical
applications on end systems
allows for rapid app
development, propagation
Application Layer 2-5
Application architectures
possible structure of applications:
client-server
peer-to-peer (P2P)
Application Layer 2-6
Client-server architecture
server: which one?
always-on host
permanent IP address
data centers for scaling
clients: which one?
communicate with server
client/server may be intermittently
connected
may have dynamic IP
addresses
do not communicate directly
with each other
Application Layer 2-7
P2P architecture
no always-on server peer-peer
arbitrary end systems
directly communicate
peers request service from
other peers, provide service
in return to other peers
self scalability – new
peers bring new service
capacity, as well as new
service demands
peers are intermittently
connected and change IP
addresses
complex management
Application Layer 2-8
Processes communicating
process: program running clients, servers
within a host client process: process that
within same host, two initiates communication
processes communicate server process: process that
using inter-process waits to be contacted
communication (defined
by OS)
processes in different hosts
communicate by exchanging aside:
messages applications with P2P
architectures have client
processes & server
processes
Application Layer 2-9
Sockets
process sends/receives messages to/from its socket
socket analogous to door
sending process shoves message out door
sending process relies on transport infrastructure to
deliver message to receiving process’s socket.
application application
socket controlled by
process process app developer
transport transport
network network controlled
link by OS
link Internet
physical physical
Application Layer 2-10
Addressing processes
to receive messages, identifier includes: both IP
process must have identifier address and port numbers
host device has unique 32- associated with process on
bit IP address host.
Q: “IP address of host on example port numbers:
which process runs HTTP server: 80
suffice for identifying mail server: 25
the process”. to send HTTP message to
TRUE/FALSE? gaia.cs.umass.edu
A: FALSE; many web server:
processes can be IP address: 128.119.245.12
running on same host port number: 80
more: shortly…
Application Layer 2-11
App-layer protocol defines
types of messages open protocols:
exchanged, defined in RFCs
e.g., request, response allows for interoperability
message syntax: e.g., HTTP, SMTP
what fields in messages proprietary protocols:
& how fields are
e.g., Skype
delineated
message semantics
meaning of information
in fields
rules for when and how
processes send & respond
to messages
Application Layer 2-12
What transport service does an app need?
data integrity throughput
some apps (e.g., file transfer, some apps (e.g.,
web transactions) require multimedia) require
100% reliable data transfer minimum amount of
other apps (e.g., audio) can
throughput to be
tolerate some loss “effective”
other apps (“elastic apps”)
timing make use of whatever
throughput they get
some apps (e.g., Internet
telephony, interactive security
games) require low delay
to be “effective” encryption, data integrity,
…
Application Layer 2-13
Transport service requirements: common apps
application data loss throughput time sensitive
file transfer no loss elastic no
e-mail no loss elastic no
Web documents no loss elastic no
real-time audio/video loss-tolerant audio: 5kbps-1Mbps yes, 100’s msec
video:10kbps-5Mbps
stored audio/video loss-tolerant same as above yes, few secs
interactive games loss-tolerant few kbps up yes, 100’s msec
text messaging no loss elastic yes and no
Application Layer 2-14
Internet transport protocols services
TCP service UDP service
reliable transport between unreliable data transfer
sending and receiving between sending and
process receiving process
flow control: sender won’t does not provide:
overwhelm receiver
reliability,
congestion control: throttle
sender when network flow control,
overloaded congestion control,
does not provide: timing, timing,
minimum throughput throughput guarantee,
guarantee, security security,
connection-oriented: setup or connection setup.
required between client and
server processes Q: why bother? Why is
there a UDP?
Application Layer 2-15
Internet apps: application, transport protocols
application underlying
application layer protocol transport protocol
e-mail SMTP [RFC 2821] TCP
remote terminal access Telnet [RFC 854] TCP
Web HTTP [RFC 2616] TCP
file transfer FTP [RFC 959] TCP
streaming multimedia HTTP (e.g., YouTube), TCP or UDP
RTP [RFC 1889]
Internet telephony SIP, RTP, proprietary
(e.g., Skype) TCP or UDP
Application Layer 2-16
Chapter 2: outline
2.1 principles of network 2.6 P2P applications
applications 2.7 socket programming
app architectures with UDP and TCP
app requirements
2.2 Web and HTTP
2.3 FTP
2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
Application Layer 2-17
Web and HTTP
First, a review…
web page consists of objects
object can be HTML file, JPEG image, Java applet, audio
file,…
web page consists of base HTML-file which includes
several referenced objects
each object is addressable by a URL, e.g.
www.someschool.edu/someDept/pic.gif
host name path name
Internet? WWW? Web? Website? Homepage? HTTP?
PTIIK Staf Akademik Gedung C Loket Akdmk SOP
Application Layer 2-18
HTTP overview
HTTP: hypertext
transfer protocol
Web’s application layer
protocol PC running
client/server model Firefox browser
client: browser that
requests, receives,
(using HTTP protocol) server
and “displays” Web running
objects Apache Web
server: Web server server
sends (using HTTP
protocol) objects in iphone running
response to requests Safari browser
Application Layer 2-19
HTTP overview (continued)
uses TCP: HTTP is “stateless”
client initiates TCP server maintains no
connection (creates information about
socket) to server, port 80 past client requests
server accepts TCP
connection from client aside
protocols that maintain
HTTP messages “state” are complex!
(application-layer protocol
past history (state) must be
messages) exchanged maintained
between browser (client) if server/client crashes, their
and Web server views of “state” may be
TCP connection closed inconsistent, must be
reconciled
Application Layer 2-20
HTTP connections
non-persistent HTTP persistent HTTP
at most one object multiple objects can
sent over TCP be sent over single
connection TCP connection
connection then between client, server
closed
downloading multiple
objects required
multiple connections
Application Layer 2-21
Non-persistent HTTP
suppose user enters URL: (contains text,
www.someSchool.edu/someDepartment/home.index references to 10
jpeg images)
1a. HTTP client initiates TCP
connection to HTTP server
(process) at 1b. HTTP server at host
www.someSchool.edu:80 www.someSchool.edu waiting
for TCP connection at port 80.
“accepts” connection, notify
2. HTTP client sends HTTP request client
message (containing URL) into
TCP socket. Tells that client 3. HTTP server receives; forms
wants object response message containing
someDepartment/home.index requested object, sends
message into its socket.
time
Application Layer 2-22
Non-persistent HTTP (cont.)
4. HTTP server closes TCP
connection.
5. HTTP client receives response
message containing html file,
displays html. Parsing html file,
finds 10 referenced jpeg objects.
time
6. Steps 1-5 repeated for each of
10 jpeg objects.
Application Layer 2-23
Non-persistent HTTP: response time
RTT (definition): time for a
small packet to travel from
client to server and back
HTTP response time: initiate TCP
one RTT to initiate TCP
connection
connection RTT
one RTT for HTTP request
request
file
and first few bytes of HTTP RTT
time to
response to return transmit
file
file transmission time file
received
non-persistent HTTP
response time =
time time
2RTT+ file transmission
time
Application Layer 2-24
Persistent HTTP
non-persistent HTTP issues: persistent HTTP:
requires 2 RTTs per object server leaves connection
OS overhead for each TCP open after sending
connection response
browsers often open subsequent HTTP
parallel TCP connections messages (between same
to fetch referenced objects client/server) sent over
open connection
client sends requests as
soon as it encounters a
referenced object
only one RTT for all the
referenced objects
Application Layer 2-25
HTTP request message
two types of HTTP messages: request, response
HTTP request message:
ASCII (human-readable format)
carriage return character
line-feed character
request line
(GET, POST, GET /index.html HTTP/1.1\r\n
HEAD commands) Host: www-net.cs.umass.edu\r\n
User-Agent: Firefox/3.6.10\r\n
Accept: text/html,application/xhtml+xml\r\n
header Accept-Language: en-us,en;q=0.5\r\n
lines Accept-Encoding: gzip,deflate\r\n
Accept-Charset: ISO-8859-1,utf-8;q=0.7\r\n
carriage return, Keep-Alive: 115\r\n
line feed at start Connection: keep-alive\r\n
\r\n
of line indicates
end of header lines
Application Layer 2-26
HTTP request message: general format
method sp URL sp version cr lf request
line
header field name value cr lf
header
~
~ ~
~ lines
header field name value cr lf
cr lf
~
~ entity body ~
~ body
Application Layer 2-27
HTTP response message
status line
(protocol
status code HTTP/1.1 200 OK\r\n
status phrase) Date: Sun, 26 Sep 2010 20:09:20 GMT\r\n
Server: Apache/2.0.52 (CentOS)\r\n
Last-Modified: Tue, 30 Oct 2007 17:00:02
GMT\r\n
header ETag: "17dc6-a5c-bf716880"\r\n
Accept-Ranges: bytes\r\n
lines Content-Length: 2652\r\n
Keep-Alive: timeout=10, max=100\r\n
Connection: Keep-Alive\r\n
Content-Type: text/html; charset=ISO-8859-
1\r\n
\r\n
data, e.g., data data data data data ...
requested
HTML file
Application Layer 2-28
HTTP response status codes
status code appears in 1st line in server-to-
client response message.
some sample codes:
200 OK
request succeeded, requested object later in this msg
301 Moved Permanently
requested object moved, new location specified later in this msg
(Location:)
400 Bad Request
request msg not understood by server
404 Not Found
requested document not found on this server
505 HTTP Version Not Supported
Application Layer 2-29
Trying out HTTP (client side) for yourself
1. Telnet to your favorite Web server:
ptiik.ub.ac.id 80↵ opens TCP connection to port 80
(deflt port for HTTP server) at ptiik.ub.ac.id.
anything typed in sent
to port 80 at ptiik.ub.ac.id
2. type in a GET HTTP request:
GET / HTTP/1.1↵ by typing this in (hit carriage
Host: ptiik.ub.ac.id↵↵ return twice), you send
this minimal (but complete)
GET request to HTTP server
3. look at response message sent by HTTP server!
(or use Wireshark to look at captured HTTP request/response)
Application Layer 2-30
Cookies: keeping “state”
client server:
Amazon
ebay 8734
usual http request msg Amazon server
cookie file creates ID
usual http response
1678 for user create backend
ebay 8734
set-cookie: 1678 entry database
amazon 1678
usual http request msg
cookie: 1678 cookie- access
specific
usual http response msg action
one week later:
access
ebay 8734 usual http request msg
amazon 1678 cookie: 1678 cookie-
specific
usual http response msg action
Application Layer 2-31
Cookies (continued)
aside
what cookies can be used for: cookies and privacy:
authorization cookies permit sites to
shopping carts learn a lot about you
recommendations
you may supply name and
user session state (Web e- e-mail to sites
mail)
how to keep “state”:
protocol endpoints: maintain state at
sender/receiver over multiple
transactions
cookies: http messages carry state
Application Layer 2-32
Web caches (proxy server)
goal: satisfy client request without involving origin server
user sets browser: Web
accesses via cache
browser sends all HTTP proxy
requests to cache server
object in cache: cache client
origin
returns object server
else cache requests
object from origin
server, then returns
object to client
client origin
server
Application Layer 2-33
More about Web caching
cache acts as both why Web caching?
client and server reduce response time
server for original for client request
requesting client
client to origin server reduce traffic on an
typically, cache is institution’s access link
installed by ISP Internet dense with
(university, company, caches: enables “poor”
residential ISP) content providers to
effectively deliver
content (so too does
P2P file sharing)
Application Layer 2-34
Conditional GET
client server
Goal: don’t send object if
cache has up-to-date
cached version HTTP request msg
object
If-modified-since: <date>
no object transmission not
delay modified
lower link utilization HTTP response
before
HTTP/1.0
cache: specify date of 304 Not Modified
<date>
cached copy in HTTP
request
If-modified-since:
<date> HTTP request msg
server: response contains If-modified-since: <date> object
modified
no object if cached copy after
HTTP response
is up-to-date: HTTP/1.0 200 OK <date>
HTTP/1.0 304 Not <data>
Modified
Application Layer 2-35
Chapter 2: outline
2.1 principles of network 2.6 P2P applications
applications 2.7 socket programming
app architectures with UDP and TCP
app requirements
2.2 Web and HTTP
2.3 FTP
2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
Application Layer 2-36
See you next week!
Any question?
Introduction 1-37