SlideShare a Scribd company logo
2
Objectives
 Identify the Application layer as the source
and destination of data for communication
across networks.
 Role of protocols in supporting communication
between server and client processes.
 Features, operation, and use of well-known
TCP/IP application layer services (HTTP,
DNS, SMTP).

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Most read
7
Networking Applications
•DNS is used to resolve
Internet names to IP
addresses.
•HTTP is used to transfer files
that make up the Web pages of
the World Wide Web
•SMTP is used for the transfer
of mail messages and
attachments.
•Telnet, a terminal emulation
protocol, is used to provide
remote access to servers and
networking devices.
•FTP is used for interactive file
transfer between systems.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Most read
12
E-mail, one of the most popular network
services
 Features of the Post Office Protocol (POP) and Simple Mail
Transfer Protocol (SMTP) protocols; Support e-mail services

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Most read
Application Layer
Functionality and
Protocols

Network Fundamentals – Chapter 3

ITE I Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives
 Identify the Application layer as the source
and destination of data for communication
across networks.
 Role of protocols in supporting communication
between server and client processes.
 Features, operation, and use of well-known
TCP/IP application layer services (HTTP,
DNS, SMTP).

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Applications – generate data at the top
of the OSI model
 Applications provide the means for generating and
receiving data that can be transported on the network

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Applications – The Interface Between
Human and Data Networks
 Application layer provides an interface between the
user and the network via network applications

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
OSI layers and TCP/IP Application layer
 OSI top layers map to TCP/IP Application layer

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Presentation and Session layers
 The Presentation layer has three primary functions:
 Coding and conversion of Application layer data to ensure that data from the source
device can be interpreted by the appropriate application on the destination device.
 Compression of the data in a manner that can be decompressed by the destination
device.
 Encryption of the data for transmission and the decryption of data upon receipt by
the destination.
 The Session Layer
 Creates and maintain dialogs between source and destination applications.
 Handles the exchange of information to initiate dialogs, keeps them active.
 Restarts sessions that are disrupted or idle for a long period of time.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Networking Applications
•DNS is used to resolve
Internet names to IP
addresses.
•HTTP is used to transfer files
that make up the Web pages of
the World Wide Web
•SMTP is used for the transfer
of mail messages and
attachments.
•Telnet, a terminal emulation
protocol, is used to provide
remote access to servers and
networking devices.
•FTP is used for interactive file
transfer between systems.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
The Role of Protocols in Supporting
Communication Client - Server
 The client and server processes support data retrieval

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Peer 2 Peer network model
 Peer-to-peer networking and peer-to-peer applications
 Act as both a client and a server within the same
communication

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
DNS Application Layer Service
 Domain Name Services DNS protocol and its Support of Name
resolution
 DNS provides a conversion of domain names to IP addresses.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
HTTP in the delivery of web pages
 Client requests a page.
 In response to the request, the HTTP returns the code for a web
page.
 The browser interprets the HTML code and displays a web page.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
E-mail, one of the most popular network
services
 Features of the Post Office Protocol (POP) and Simple Mail
Transfer Protocol (SMTP) protocols; Support e-mail services

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Telnet supports Communication and
management
 Telnet Common Client – Server Application Layer
services and protocols

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Telnet Application Layer Service
 Telnet protocol used in examining and managing networks

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Features, Operation, and Use of TCP/IP
Application Layer Services
 Server Message Block (SMB) protocol used in supporting file,
printer and directories sharing in Microsoft-based networks
 SAMBA does the same for UNIX, LINUS OS’s

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
P2P Application Layer Service
 Gnutella protocol supports P2P services files sharing over the
internet. Clients include: BearShare, LimeWire, XoloX

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Labs
 4.5.2 TCP/IP Transport layer protocols TCP,UDP
 3.4.3 Email services and protocols
(SMTP,MUA,MDA,MTA, POP and Internet Message
Access Protocol; IMAP & Telnet)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17

More Related Content

What's hot (20)

Unit 3
Unit 3Unit 3
Unit 3
gopal10scs185
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
Deskala
 
Distributed Query Processing
Distributed Query ProcessingDistributed Query Processing
Distributed Query Processing
Mythili Kannan
 
Temporal database
Temporal databaseTemporal database
Temporal database
District Administration
 
Data warehouse physical design
Data warehouse physical designData warehouse physical design
Data warehouse physical design
Er. Nawaraj Bhandari
 
Ch09
Ch09Ch09
Ch09
S&P Capital IQ
 
Software maintenance
Software maintenance Software maintenance
Software maintenance
Rajeev Sharan
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
koolkampus
 
IRS-Cataloging and Indexing-2.1.pptx
IRS-Cataloging and Indexing-2.1.pptxIRS-Cataloging and Indexing-2.1.pptx
IRS-Cataloging and Indexing-2.1.pptx
ShivaVemula2
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
United International University
 
interaction norman model in Human Computer Interaction(HCI)
interaction  norman model in Human Computer Interaction(HCI)interaction  norman model in Human Computer Interaction(HCI)
interaction norman model in Human Computer Interaction(HCI)
Daroko blog(www.professionalbloggertricks.com)
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
university of education,Lahore
 
Different data models
Different data modelsDifferent data models
Different data models
madhusha udayangani
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
Shashank Rustagi
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
vanamali_vanu
 
Challenges of Conventional Systems.pptx
Challenges of Conventional Systems.pptxChallenges of Conventional Systems.pptx
Challenges of Conventional Systems.pptx
GovardhanV7
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
National Institute of Technology Durgapur
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
ishapadhy
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
Ali Usman
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
Deskala
 
Distributed Query Processing
Distributed Query ProcessingDistributed Query Processing
Distributed Query Processing
Mythili Kannan
 
Software maintenance
Software maintenance Software maintenance
Software maintenance
Rajeev Sharan
 
User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15User Interface Design in Software Engineering SE15
User Interface Design in Software Engineering SE15
koolkampus
 
IRS-Cataloging and Indexing-2.1.pptx
IRS-Cataloging and Indexing-2.1.pptxIRS-Cataloging and Indexing-2.1.pptx
IRS-Cataloging and Indexing-2.1.pptx
ShivaVemula2
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
Shashank Rustagi
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
vanamali_vanu
 
Challenges of Conventional Systems.pptx
Challenges of Conventional Systems.pptxChallenges of Conventional Systems.pptx
Challenges of Conventional Systems.pptx
GovardhanV7
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
ishapadhy
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
Ali Usman
 

Similar to Application Layer Functionality and Protocols (20)

CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
Vuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
teknetir
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
9. Application Layer9. Application Layer.pptx
9. Application Layer9. Application Layer.pptx9. Application Layer9. Application Layer.pptx
9. Application Layer9. Application Layer.pptx
FutureTechnologies3
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
Đô GiẢn
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
Đô GiẢn
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
Jake Weaver
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
r82093403
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
Irsandi Hasan
 
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
FawadKhanFacultyEEDB
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
Sachii Dosti
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
Monique Jones
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
Vuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
teknetir
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
9. Application Layer9. Application Layer.pptx
9. Application Layer9. Application Layer.pptx9. Application Layer9. Application Layer.pptx
9. Application Layer9. Application Layer.pptx
FutureTechnologies3
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
Irsandi Hasan
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
Đô GiẢn
 
Ex 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chenEx 1 chapter03-appliation-layer-tony_chen
Ex 1 chapter03-appliation-layer-tony_chen
Đô GiẢn
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
Jake Weaver
 
Exploration network chapter3
Exploration network chapter3Exploration network chapter3
Exploration network chapter3
r82093403
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
Irsandi Hasan
 
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
The Application Layer is the topmost layer of the OSI (Open Systems Interconn...
FawadKhanFacultyEEDB
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
teknetir
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
Vuz Dở Hơi
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
Sachii Dosti
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
Monique Jones
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
Ad

More from Sachii Dosti (15)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
Sachii Dosti
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paper
Sachii Dosti
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
Sachii Dosti
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
Static Routing
Static RoutingStatic Routing
Static Routing
Sachii Dosti
 
ip v6
ip v6ip v6
ip v6
Sachii Dosti
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
Sachii Dosti
 
Ethernet
EthernetEthernet
Ethernet
Sachii Dosti
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
Sachii Dosti
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
Sachii Dosti
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
Sachii Dosti
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
Sachii Dosti
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
Sachii Dosti
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
Sachii Dosti
 
Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
Sachii Dosti
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paper
Sachii Dosti
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
Sachii Dosti
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
Sachii Dosti
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
Sachii Dosti
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
Sachii Dosti
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
Sachii Dosti
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
Sachii Dosti
 
Ad

Recently uploaded (20)

Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
Introduction to Typescript - GDG On Campus EUE
Introduction to Typescript - GDG On Campus EUEIntroduction to Typescript - GDG On Campus EUE
Introduction to Typescript - GDG On Campus EUE
Google Developer Group On Campus European Universities in Egypt
 
DevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical PodcastDevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical Podcast
Chris Wahl
 
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
vertical-cnc-processing-centers-drillteq-v-200-en.pdfvertical-cnc-processing-centers-drillteq-v-200-en.pdf
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
AmirStern2
 
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI ProfessionalOracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
 
Your startup on AWS - How to architect and maintain a Lean and Mean account
Your startup on AWS - How to architect and maintain a Lean and Mean accountYour startup on AWS - How to architect and maintain a Lean and Mean account
Your startup on AWS - How to architect and maintain a Lean and Mean account
angelo60207
 
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Shashikant Jagtap
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
Safe Software
 
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdfcnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
AmirStern2
 
If You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FMEIf You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FME
Safe Software
 
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Impelsys Inc.
 
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfHow Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
 
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptxHow to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025
Safe Software
 
LSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection FunctionLSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection Function
Takahiro Harada
 
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
 
FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0
RodrigoMori7
 
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...
Anish Kumar
 
Domino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use CasesDomino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use Cases
panagenda
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
DevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical PodcastDevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical Podcast
Chris Wahl
 
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
vertical-cnc-processing-centers-drillteq-v-200-en.pdfvertical-cnc-processing-centers-drillteq-v-200-en.pdf
vertical-cnc-processing-centers-drillteq-v-200-en.pdf
AmirStern2
 
Oracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI ProfessionalOracle Cloud Infrastructure Generative AI Professional
Oracle Cloud Infrastructure Generative AI Professional
VICTOR MAESTRE RAMIREZ
 
Your startup on AWS - How to architect and maintain a Lean and Mean account
Your startup on AWS - How to architect and maintain a Lean and Mean accountYour startup on AWS - How to architect and maintain a Lean and Mean account
Your startup on AWS - How to architect and maintain a Lean and Mean account
angelo60207
 
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2Agentic AI: Beyond the Buzz- LangGraph Studio V2
Agentic AI: Beyond the Buzz- LangGraph Studio V2
Shashikant Jagtap
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
Safe Software
 
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdfcnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
AmirStern2
 
If You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FMEIf You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FME
Safe Software
 
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Impelsys Inc.
 
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfHow Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdf
Rejig Digital
 
How to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptxHow to Detect Outliers in IBM SPSS Statistics.pptx
How to Detect Outliers in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025
Safe Software
 
LSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection FunctionLSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection Function
Takahiro Harada
 
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | BluebashMCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
MCP vs A2A vs ACP: Choosing the Right Protocol | Bluebash
Bluebash
 
FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0
RodrigoMori7
 
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...
Scaling GenAI Inference From Prototype to Production: Real-World Lessons in S...
Anish Kumar
 
Domino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use CasesDomino IQ – What to Expect, First Steps and Use Cases
Domino IQ – What to Expect, First Steps and Use Cases
panagenda
 

Application Layer Functionality and Protocols

  • 1. Application Layer Functionality and Protocols Network Fundamentals – Chapter 3 ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify the Application layer as the source and destination of data for communication across networks.  Role of protocols in supporting communication between server and client processes.  Features, operation, and use of well-known TCP/IP application layer services (HTTP, DNS, SMTP). ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Applications – generate data at the top of the OSI model  Applications provide the means for generating and receiving data that can be transported on the network ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Applications – The Interface Between Human and Data Networks  Application layer provides an interface between the user and the network via network applications ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. OSI layers and TCP/IP Application layer  OSI top layers map to TCP/IP Application layer ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Presentation and Session layers  The Presentation layer has three primary functions:  Coding and conversion of Application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device.  Compression of the data in a manner that can be decompressed by the destination device.  Encryption of the data for transmission and the decryption of data upon receipt by the destination.  The Session Layer  Creates and maintain dialogs between source and destination applications.  Handles the exchange of information to initiate dialogs, keeps them active.  Restarts sessions that are disrupted or idle for a long period of time. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Networking Applications •DNS is used to resolve Internet names to IP addresses. •HTTP is used to transfer files that make up the Web pages of the World Wide Web •SMTP is used for the transfer of mail messages and attachments. •Telnet, a terminal emulation protocol, is used to provide remote access to servers and networking devices. •FTP is used for interactive file transfer between systems. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. The Role of Protocols in Supporting Communication Client - Server  The client and server processes support data retrieval ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Peer 2 Peer network model  Peer-to-peer networking and peer-to-peer applications  Act as both a client and a server within the same communication ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. DNS Application Layer Service  Domain Name Services DNS protocol and its Support of Name resolution  DNS provides a conversion of domain names to IP addresses. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. HTTP in the delivery of web pages  Client requests a page.  In response to the request, the HTTP returns the code for a web page.  The browser interprets the HTML code and displays a web page. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. E-mail, one of the most popular network services  Features of the Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP) protocols; Support e-mail services ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Telnet supports Communication and management  Telnet Common Client – Server Application Layer services and protocols ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Telnet Application Layer Service  Telnet protocol used in examining and managing networks ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Features, Operation, and Use of TCP/IP Application Layer Services  Server Message Block (SMB) protocol used in supporting file, printer and directories sharing in Microsoft-based networks  SAMBA does the same for UNIX, LINUS OS’s ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. P2P Application Layer Service  Gnutella protocol supports P2P services files sharing over the internet. Clients include: BearShare, LimeWire, XoloX ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Labs  4.5.2 TCP/IP Transport layer protocols TCP,UDP  3.4.3 Email services and protocols (SMTP,MUA,MDA,MTA, POP and Internet Message Access Protocol; IMAP & Telnet) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Editor's Notes

  • #4: For a network professional, it is important to know how an application is able to format, transmit and interpret messages that are sent and received across the network. In this chapter, you will learn to: Describe how the functions of the three upper OSI model layers provide network services to end user applications. Describe how the TCP/IP Application Layer protocols provide the services specified by the upper layers of the OSI model. Define how people use the Application Layer to communicate across the information network. Describe the function of well-known TCP/IP applications, such as the World Wide Web and email, and their related services (HTTP, DNS, SMB, DHCP, STMP/POP, and Telnet).
  • #5: In this model, information is passed from one layer to the next, starting at the Application layer on the transmitting host, proceeding down the hierarchy to the Physical layer, then passing over the communications channel to the destination host, where the information proceeds back up the hierarchy, ending at the Application layer. The Application layer provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. Application layer protocols are used to exchange data between programs running on the source and destination hosts. There are many Application layer protocols and new protocols are always being developed.
  • #6: Although the TCP/IP protocol suite was developed prior to the definition of the OSI model, the functionality of the TCP/IP application layer protocols fit roughly into the framework of the top three layers of the OSI model: Application, Presentation and Session layers. The Presentation Layer The Presentation layer has three primary functions: Coding and conversion of Application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device. Compression of the data in a manner that can be decompressed by the destination device. Encryption of the data for transmission and the decryption of data upon receipt by the destination. The Session Layer As the name of the Session layer implies, functions at this layer create and maintain dialogs between source and destination applications. The Session layer handles the exchange of information to initiate dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time.
  • #8: The most widely-known TCP/IP Application layer protocols are those that provide for the exchange of user information. These protocols specify the format and control information necessary for many of the common Internet communication functions. Among these TCP/IP protocols are: Domain Name Service Protocol (DNS) is used to resolve Internet names to IP addresses. Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the Web pages of the World Wide Web. Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments. Telnet, a terminal emulation protocol, is used to provide remote access to servers and networking devices. File Transfer Protocol (FTP) is used for interactive file transfer between systems.
  • #9: When people attempt to access information on their device, whether it is a PC, laptop, PDA, cell phone, or some other device connected to a network, the data may not be physically stored on their device. If that is the case, a request to access that information must be made to the device where the data resides. The Client/Server model In the client/server model, the device requesting the information is called a client and the device responding to the request is called a server. Client and server processes are considered to be in the Application layer. The client begins the exchange by requesting data from the server, which responds by sending one or more streams of data to the client. Application layer protocols describe the format of the requests and responses between clients and servers. In addition to the actual data transfer, this exchange may also require control information, such as user authentication and the identification of a data file to be transferred.
  • #10: Peer-to-Peer Applications A peer-to-peer application (P2P), unlike a peer-to-peer network, allows a device to act as both a client and a server within the same communication. In this model, every client is a server and every server a client. Both can initiate a communication and are considered equal in the communication process. However, peer-to-peer applications require that each end device provide a user interface and run a background service. When you launch a specific peer-to-peer application it invokes the required user interface and background services. After that the devices can communicate directly.
  • #11: DNS provides a conversion of domain names to IP addresses.
  • #12: When a web address (or URL) is typed into a web browser, the web browser establishes a connection to the web service running on the server using the HTTP protocol. Client requests a page. In response to the request, the HTTP returns the code for a web page. The browser interprets the HTML code and displays a web page.
  • #13: E-mail, the most popular network service, has revolutionized how people communicate through its simplicity and speed. Yet to run on a computer or other end device, e-mail requires several applications and services. Two example Application layer protocols are Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP), shown in the figure. As with HTTP, these protocols define client/server processes. As mentioned earlier, e-mail can use the protocols, POP and SMTP (see the figure for an explanation of how they each work). POP and POP3 (Post Office Protocol, version 3) are inbound mail delivery protocols and are typical client/server protocols. They deliver e-mail from the e-mail server to the client (MUA). The MDA listens for when a client connects to a server. Once a connection is established, the server can deliver the e-mail to the client. The Simple Mail Transfer Protocol (SMTP), on the other hand, governs the transfer of outbound e-mail from the sending client to the e-mail server (MDA), as well as the transport of e-mail between e-mail servers (MTA). SMTP enables e-mail to be transported across data networks between different types of server and client software and makes e-mail exchange over the Internet possible.
  • #14: A single application may employ many different supporting Application layer services; thus what appears to the user as one request for a web page may, in fact, amount to dozens of individual requests. And for each request, multiple processes may be executed. For example, a client may require several individual processes to formulate just one request to a server. Additionally, servers typically have multiple clients requesting information at the same time. For example, a Telnet server may have many clients requesting connections to it. These individual client requests must be handled simultaneously and separately for the network to succeed. The Application layer processes and services rely on support from lower layer functions to successfully manage the multiple conversations.
  • #16: The Server Message Block (SMB) is a client/server file sharing protocol. IBM developed Server Message Block (SMB) in the late 1980s to describe the structure of shared network resources, such as directories, files, printers, and serial ports. It is a request-response protocol . Unlike the file sharing supported by FTP, clients establish a long term connection to servers. Once the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host. SMB messages can: Start, authenticate, and terminate sessions Control file and printer access Allow an application to send or receive messages to or from another device
  • #17: Many P2P applications do not use a central database to record all the files available on the peers. Instead, the devices on the network each tell the other what files are available when queried and use the Gnutella protocol and services to support locating resources. See the figure. When a user is connected to a Gnutella service, the client applications will search for other Gnutella nodes to connect to. These nodes handle queries for resource locations and replies to those requests. They also govern control messages, which help the service discover other nodes. The actual file transfers usually rely on HTTP services. The Gnutella protocol defines five different packet types: ping - for device discovery pong - as a reply to a ping query - for file location query hit - as a reply to a query push - as a download request