1 / 19

Application Layer Protocols

Application Layer Protocols. Application Layer Protocols. Those protocols run on top of/over TCP/IP: Telnet File Transfer Protocol (FTP) Hyper Text Transfer Protocol (HTTP) * Simple Mail Transfer Protocol (SMTP), POP3, IMAP Network News Transfer Protocol (NNTP) Domain Name System (DNS) *

nelson
Télécharger la présentation

Application Layer Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Application Layer Protocols

  2. Application Layer Protocols • Those protocols run on top of/over TCP/IP: • Telnet • File Transfer Protocol (FTP) • Hyper Text Transfer Protocol (HTTP)* • Simple Mail Transfer Protocol (SMTP), POP3, IMAP • Network News Transfer Protocol (NNTP) • Domain Name System (DNS)* • Dynamic Host Configuration Protocol (DHCP) * Covered in previous lectures

  3. Telnet • Provides terminal emulation • Comes with nearly all vendor implementations of TCP/IP • Open standard • Supported by wide range of workstations • Not a secure protocol

  4. Telnet Communications Options • 7- or 8-bit compatibility • Use of different terminal nodes • Character echoing at sending and receiving ends • Synchronized communications • Transmission of character streams or single characters • Flow control

  5. FTP • FTP – File transfer protocol. Commonly used over the Internet. • Numerous FTP servers over the world allow people anywhere on the Internet to log in and download whatever files they have placed on the FTP server, or upload other files. • Uses two TCP ports (20 data channel and 21 control channel) – this is in active mode. In passive FTP mode, it uses 21 for the control channel, and an ephemeral port for the data channel. • Commonly used on the Internet • Not a secure protocol

  6. Sample FTP Commands

  7. SMTP • Designed for exchange of email between networked systems • Within the Internet, email is delivered by having the source machine establish a TCP connection to port 25 of the destination machine / server. Listening on this port would be an SMTP (Simple Mail Transfer Protocol) daemon / service that speaks SMTP. • This daemon accepts incoming connections and copies messages from them into the appropriate mailboxes. If a message cannot be delivered, an error report of the undeliverable message is returned to the sender, which contains the first part of the message.

  8. SMTP • SMTP is a simple ASCII protocol. • After establishing the TCP connection to port 25, the sending machine, operating as the client, waits for the receiving machine, operating as the server, to talk first. • The server starts by sending a line of text giving its identity and telling whether or not it is prepared to receive mail. • If it is not, the client releases the connection and tries again later.

  9. SMTP • If the server is willing to accept email, the client announces whom the email is coming from and whom it is going to. • If such recipient exists at the destination, the server gives the client the go-ahead to send the message. Then the client sends the message, and the server acknowledges it. • No checksums needed because TCP provides a reliable byte stream. • If there is more e-mail it is now sent. When all e-mail has been exchanged in both directions, the connection is released.

  10. SMTP

  11. POP3 • Until now, we assumed that all users work on machines that are capable of sending and receiving email. Sometimes this is not the case. • For example, at many companies, users work at desktop PCs that ar enot on the Internet and are not capable of sending or receiving email from outside the company. Instead, the company has one or more email servers that can send and receive email. • To send or receive messages, a PC must talk to an email server using some kind of delivery protocol.

  12. POP3 • A simple protocol used for fetching email from a remote mailbox is POP3 (Post Office Protocol). • It has commands for the user to log in, log out, fetch messages, and delete messages. • The protocol itself consists of ASCII text and has something of the flavor of SMTP. The point of POP3 is to fetch email from the remote mailbox and store it on the user’s local machine to read later.

  13. IMAP • A more sophisticated delivery protocol is IMAP (Interactive Mail Access Protocol). • It was designed to help the user who uses multiple computers, perhaps a workstation in the office, a PC at home, and a laptop on the road. • The basic idea behind IMAP is for the email server to maintain a central repository that can be accessed from any machine. • Thus unlike POP3, IMAP does not copy email to the user’s personal machine because the user may have several.\

  14. EMail • Independent of whether email is delivered directly to the user’s workstation or to a remote server, many systems provide hooks for additional processing of incoming email. • An especially valuable tool for many email users is the ability to set up filters. These are rules that are checked when email comes in or when the user agent is started. • Each rule specifies a condition and an action. For example, a rule could say that any message from Angelina Tzacheva should be displayed in a 24-point flashing red boldface font (or alternatively, be discarded automatically without comment).

  15. NNTP • NNTP (Network News Transfer Protocol) is similar to SMTP in a sense that a client issues commands in ASCII and a server issues responses as decimal numbers coded in ASCII. • NNTP was designed for two purposes: • To allow news articles to propagate from one machine to another over reliable connection (e.g. TCP) • To allow users whose desktop computers cannot receive news to read news remotely.

  16. NNTP • To acquire recent articles, a client must first establish a TCP connection with port 119 on the newsfeed server. • Behind this port is the NNTP daemon/service, which is either there all the time waiting for clients or is created on the fly as needed. • After the connection has been established, the client and server communicate using a sequence of commands and responses.

  17. DHCP • With the growth of the Internet, TCP/ IP has now become a must-have protocol for most computer networks. It provides a single network protocol that is supported by almost every type of computer system, a plethora of applications that use it, and it is well suited to both large and small networks. It’s also essential if one wishes to set up an intranet. • However, TCP/ IP needs addresses and configuration settings to be defined on each computer or peripheral on the network. This can entail an immense amount of system administration work.

  18. DHCP • DHCP stands for Dynamic Host Configuration Protocol, and is used to centrally allocate and manage TCP/ IP configurations of client nodes. If one has more than a handful of computers to manage, then DHCP can help to save a great deal of time in setting up and administering a TCP/ IP network. DHCP offers the following features: • It allows to define “pools” of TCP/ IP addresses, which are then allocated to client PCs by the DHCP server. These pools are called scopes in DHCP terminology. • Not only are the TCP/ IP addresses handed out, so are all the related configuration settings like the subnet mask, default gateway, DNS server, that are needed for TCP/ IP to work properly.

  19. DHCP • DHCP works across most TCP/ IP routers and allocates IPs according to the subnet the request came from. This means one won’t need to reconfigure a PC that is moved from one subnet to another. • Addresses can be leased for periods of time - so an IP address that is not used for the duration of the lease is put back into the unallocated pool. This helps recover TCP/ IP addresses that are no longer used. • Internet Service Providers are often using DHCP to provide clients with IP address as well.

More Related