1 / 62

Chapter 2

Chapter 2. Application Layer. O BJECTIVES. Electronic mail. File transfer. Remote login. The World Wide Web. Other applications such as videoconferencing and chatting. The client-server paradigm. After reading this chapter, the reader should be able to understand:. 2.1. INTRODUCTION.

sdeleo
Télécharger la présentation

Chapter 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 2 ApplicationLayer

  2. OBJECTIVES Electronic mail. File transfer. Remote login. The World Wide Web. Other applications such as videoconferencing and chatting. The client-server paradigm. After reading this chapter, the reader should be able to understand:

  3. 2.1 INTRODUCTION

  4. Figure 2-1 Position of the application layer in the Internet model

  5. For the typical end user, this is the only layer of internet. This user only needs to know how to use the application Programs available in this layer. • E-mail • Browser • FTP ( File Transfer Programs ) A business manager, however, needs to be aware of the technologies available in each layer and how they can best be used.

  6. 2.2 CLIENT-SERVER PARADIGM

  7. Note: Application-layer programs in the Internet model communicate using the client-server paradigm.

  8. They come in pairs, client and server, both having the same name. The purpose of a network, and in particular, the global Internet, is to provide a service to a user. An application program is either a requester ( a client ) or a provide ( a server ). The tasks of requesting a service and providing a service are separate from each other.

  9. Client-server model Figure 2-2

  10. Figure 2-3 Client-server relationship The is a server provideing a service for any client, not just one particular client.

  11. The server program, which provides a service, run all of the time because it does not know when its service will be needed. A client program, which requests a servce, runs only when it is needed. Multiple requests and responses are allowed in one session. A service needed frequently and by many users has a specific client-server application program.

  12. Note: In the client-server paradigm, many clients can be served by one server, either one at a time or concurrently.

  13. Note: In the client-server paradigm, a client runs for a specific period of time; the server runs continuously.

  14. Note: In the client-server paradigm, there are specific servers and normally one general-purpose server.

  15. 2.3 ADDRESSING

  16. A client and a server communicate with each other throuth address. • Each application has its own address format. • E-mail : srtong@mail.npust.edu.tw • Web page : http://www.pchome.com.tw The Internet uses an address to identify an entity. Each computer connected to the Internet needs to be uniquely identified. To prevent duplication, a hierarchical or tree name space was propose in which each name has several part.

  17. Technical Focus:Domain Name System (DNS) The following are traditional and new domain names: Traditional: com edu gov int net org New: aero biz coop info museum name pro

  18. 2.4 ELECTRONIC MAIL

  19. This means a message can be sent to someone not currently connected to the Internet. The message can remain in the system until the recipient retrieves it. Note: Email is a store-and-forward application on the Internet.

  20. E-mail has several advantages over snail mail : • It is faster. • It is easier to distribute to a group of recipients. • It is less expensive. • It can be less time-consuming. • Disadvantages • An email cannot be certified. • The privacy of email is still an open question. • E-mail messaging is subject to abuse. • The sending of electronic mail in the Internet require • there compoents : • User agents (UAs) • Mail transfer agents (MTAs) • Simple Mail Transfer Protocol (SMTP)

  21. Note: A user agent controls the composing, reading, forwarding, replying, and saving of email messages. The user agent is not responsible for sending or receiving email.

  22. Note: The task of sending and receiving email is done by a mail transfer agent (MTA).

  23. Note: Theformal protocol for electronic mail in the Internet is Simple Mail Transfer Protocol or SMTP.

  24. The delivery of email from the sender to the receiver takes • place in three stages (see Figure 2.4) : • First Stage : • The email goes from the user agent to the local server. • Second Stage : • The email is relayed by the local server, which now acts • as the SMTP client, to the remote server, which is now • the SMTP server. The email is received by this mail • server and stored in the mailbox of the user for later • retrieval. • Third Stage : • The remote user agent uses a mail access protocol such as • POP3 or IMAP4 to access the mailbox and retrieve the • mail.

  25. Figure 2-4 Email delivery

  26. POP is simple but limited in functionality. The user can then list and retrieve the mail message, one by one. Mail Access Protocols Currently two mail access protocols are available : Post Office Protocol ( POP ) :

  27. A user can check the email header prior to downloading. A user can search the contents of the email prior to downloading. A user can partially download email. A user can create, delete, or rename mailboxes on the mail server. A user can create a hierarchy of mailbox in a folder for email storage. Internet Mail Access Protocol ( IMAP ) :

  28. Figure 2-5 POP

  29. Figure 2-6 A mail handling system must have a unique addressing system to deliver mail. The addressing system used by SMTP consists of two part : Email address

  30. Technical Focus:Inside an Email Message An email is made of an envelope and a letter:

  31. SMTP can send messages only in NVT 7-bit ASCII format. SMTP cannot be used to send binary files or video or audio data. MIME is a supplementary protocol that allows non-ASCII Data to be sent through SMTP. MIME is not a mail protocol and cannot replace SMTP; it is only an extension to SMTP. Multipurpose Internet Mail Extension (MIME)

  32. Figure 2-7 MIME

  33. Technical Focus:How MIME works MIME has five header types that can be added to the original SMTP header: MIME-Version Content-Type Content-Transfer-Encoding Content-ID Content-Description

  34. 2.5 FILE TRANSFER

  35. Two applications are currently available for transferring • files over the Internet : • File Transfer Protocol (FTP) • Trivial File Transfer Protocol (TFTP) FTP is the standard mechanism for one of the most common task on the Internet, copying a file from one computer to another. FTP differs from other client-server applications in that it establishes two connections between the hosts. One connection is used for data transfer, the other for control information (command and responses).

  36. Figure 2-8 FTP

  37. When we are need to simply copy a file without the need for all of the functionalities of FTP. However, this application is not universally available. TFTP

  38. 2.6 GENERAL-PURPOSE APPLICATION: TELNET

  39. Note: TELNET is a general-purpose client-server application program.

  40. TELNET enable the establishment of a connection to a remote systemin such a way that the local terminal appears to be a terminal at the remote system. Local Login : When a user logs onto a local time-sharing system, it is called local login. Remote Login : When a user wants to access an application program or utility located on a remote machine, he or she performs remote login.

  41. Figure 2-9 Local login

  42. Figure 2-10 Remote login

  43. 2.7 WORLD WIDE WEB(WWW)

  44. The World Wide Web (WWW), or the Web, is a repository of information spread all over the world and linked together. The service provided is distributed over many locations called websites. The WWW today is a distributed client-server service.

  45. Figure 2-11 Distributed services

  46. Figure 2-12 The information is stored in a set of document that are linked together using the concept of pointers. Hypertext

  47. To use WWW, we need three components : • a browser • a web server • a protocol called the Hypertext Transfer Protocol (HTTP) Browser : A variety of vendors offer commercial browsers that interpret and display a web document. Server : The server stores all page belonging to the site. HTTP : The HTTP is a protocol used mainly to access data on the WWW. Components of WWW

  48. Figure 2-13 Browser architecture

  49. Figure 2-14 HTTP transaction

  50. Message categories Figure 2-15 There are two general type of HTTP messages. Both message types follow almost the same format.

More Related