1. Trang chủ
  2. » Công Nghệ Thông Tin

Chương 3 - Lớp ứng dụng giao thức CCNA ppsx

54 267 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Chương 3 - Lớp ứng dụng giao thức CCNA ppsx
Trường học Học viện Mạng Bách Khoa
Chuyên ngành Networking / Computer Networks
Thể loại Giáo trình / Tài liệu học tập
Năm xuất bản N/A
Thành phố Unknown
Định dạng
Số trang 54
Dung lượng 2,7 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• Describe how the functions of the three upper OSI model layers provide network services to end user applications.. • Describe how the TCP/IP Application Layer protocols provide the s

Trang 1

Chapter 3 - Application Layer Functionalityand Protocols

CCNA Exploration 4.0

Trang 2

• Describe how the functions of the three upper OSI model layers

provide network services to end user applications.

• Describe how the TCP/IP Application Layer protocols provide the

services specified by the upper layers of the OSI model.

• Define how people use the Application Layer to communicate across the information network.

• Describe the function of well-known TCP/IP applications, such as the

• Describe the function of well-known TCP/IP applications, such as the World Wide Web and email, and their related services (HTTP, DNS, SMB, DHCP, STMP/POP, and Telnet).

• Describe file-sharing processes that use peer-to-peer applications and the Gnutella protocol.

• Explain how protocols ensure services running on one kind of device can send to and receive data from many different network devices.

Trang 4

OSI model

• To address the problem of network incompatibility, the International

• To address the problem of network incompatibility, the International

Organization for Standardization (ISO) researched networking models like Digital Equipment Corporation net (DECnet), Systems Network Architecture (SNA), and TCP/IP in order to find a generally applicable set of rules for all networks

• Using this research, the ISO created a network model that helps vendors create networks that are compatible with other networks

• The Open System Interconnection (OSI) reference model released in 1984

Trang 5

The OSI Model

• Initially the OSI model was designed by the International Organization for

Standardization (ISO) to provide a framework on which to build a suite of open systems protocols

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 6

The OSI Model

Trang 7

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 8

OSI model

Trang 9

OSI model

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 10

OSI and TCP/IP Model

• Functionality of the TCP/IP application layer protocols fit roughly into the framework of the top three layers of the OSI model: Application,

Trang 11

OSI and TCP/IP Model

The Presentation layer has three primary functions:

data from the source device can be interpreted by the appropriate application on the destination device.

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

by the destination device.

upon receipt by the destination.

Example : QuickTime, Motion Picture Experts Group (MPEG),

Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG)…

Trang 12

OSI and TCP/IP Model

The Session Layer

• Functions at this layer create and maintain dialogs between source and destination applications.

• The Session layer handles the exchange of information to initiate

dialogs, keep them active, and to restart sessions that are disrupted or dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time

Trang 13

Application Layer Protocols

• These protocols specify the format and control information necessary for many of the common Internet communication functions Among these TCP/IP protocols are:

Domain Name Service Protocol (DNS).

Hypertext Transfer Protocol (HTTP).

Simple Mail Transfer Protocol (SMTP)

Trang 14

Application Layer Software

• The functions associated with the Application layer protocols enable our human network to interface with the underlying data network.

• Within the Application layer, there are two forms of software programs

or processes that provide access to the network: applications and

services

Trang 15

User applications, Services, and Application Layer Protocols

• The Application layer uses protocols that are implemented within

applications and services.

• While applications provide people a way to create messages and

application layer services establish an interface to the network,

protocols provide the rules and formats that govern how data is treated.

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 16

Application Layer Protocol Functions

• Application layer protocols are used by both the source

and destination devices during a communication session

Trang 17

The Client-Server Model

• In the client/server model, the device requesting the information is called a client and the device responding to the request is called a

Application layer.

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 18

user account information

to verify if the user has

permission to access the

requested data or to use

a particular operation

Trang 19

Application Layer Services and Protocols

• A single application may employ many different supporting Application layer services.

• Additionally, servers typically have multiple clients requesting

information at the same time.

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 20

Peer-to-Peer Networking and Applications (p2p)

The Peer-to-Peer Model

• Peer-to-peer networking involves two distinct forms: peer-to-peer network

design and peer-to-peer applications (P2P) Both forms have similar features but in practice work very differently

Trang 21

Peer-to-Peer Networking and Applications (p2p)

Peer-to-Peer Applications

• A peer-to-peer application (P2P), unlike a peer-to-peer network, allows a

device to act as both a client and a server within the same communication

• In this model, every client is a server and every server a client Both can initiate

a communication and are considered equal in the communication process

• Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and across the Internet

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 22

Application Layer Protocols and Services Examples

• Now that we have a better understanding of how applications provide

an interface for the user and provide access to the network, we will take a look at some specific commonly used protocols.

• Some of these services are:

Domain Name System (DNS) - TCP/UDP Port 53

Hypertext Transfer Protocol (HTTP) - TCP Port 80

Simple Mail Transfer Protocol (SMTP) - TCP Port 25

Simple Mail Transfer Protocol (SMTP) - TCP Port 25

Post Office Protocol (POP) - UDP Port 110

Telnet - TCP Port 23

Dynamic Host Configuration Protocol - UDP Port 67

File Transfer Protocol (FTP) - TCP Ports 20 and 21

Trang 23

DNS Services and Protocol

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

• A domain naming system was developed in order to associate the

contents of the site with the address of that site The Domain Name System (DNS) is a system used on the Internet for translating names

of domains and their publicly advertised network nodes into IP

addresses

Trang 24

DNS Services and protocol

• The Domain Name System (DNS) was created for domain name to

address resolution for these networks DNS uses a distributed set of servers to resolve the names associated with these numbered

addresses

names with the required numeric network address.

• DNS protocol communications use a single format called a message.

• DNS protocol communications use a single format called a message.

• DNS is used for all types of client queries and server responses, error messages, and the transfer of resource record information between

servers.

Trang 25

DNS - Example

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 26

DNS - Example

Trang 27

DNS - Example

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 28

DNS - Example

Trang 29

DNS - Example

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 30

DNS - Example

Trang 31

DNS Services and Protocol

• The DNS server stores different types of resource records used to resolve names These records contain the name, address, and type of record.

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 32

DNS Services and protocol

• When configuring a network device, we generally provide one or more

DNS Server addresses that the DNS client can use for name

resolution

• Computer operating systems also have a utility called nslookup that allows the user to manually query the name servers to resolve a given host name This utility can also be used to troubleshoot name

resolution issues and to verify the current status of the name servers

Trang 33

WWW Service and HTTP

• When a web address (or URL) is typed into a web browser, the web browser establishes a connection to the web service running on the server using the HTTP protocol

• URLs (or Uniform Resource Locator) and URIs (Uniform Resource Identifier) are the names most people associate with web addresses

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 34

WWW Service and HTTP

• In order to access the content, web clients make connections to the server and request the desired resources The server replies with the resources and, upon receipt, the browser interprets the data and

presents it to the user.

Trang 35

WWW Service and HTTP

• Browsers can interpret and present many data types, such as plain text

or H yper t ext M arkup L anguage (HTML, the language in which web

pages are constructed) Other types of data, however, may require

another service or program, typically referred to as plug-ins or add-ons

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 36

WWW Service and HTTP

• HTTP specifies a request/response protocol When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and also the message types the server uses to respond The three common message types are GET, POST and PUT

Trang 37

E-mail Services and SMTP/POP Protocols

• E-mail, the most popular network service and run on a computer or other end device, e-mail requires several applications and services

• POP/SMTP define client/server processes

• Mail User Agent (MUA): allows messages to be sent and places received messages into the client's mailbox, both of which are distinct processes MUA include: POP and SMTP

• POP: used to receive e-mail messages from an e-mail server

• SMTP: used to send e-mail from either a client or a server uses message

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

• SMTP: used to send e-mail from either a client or a server uses message

formats and command strings

Trang 38

E-mail Services and SMTP/POP Protocols

E-mail Server Processes - MTA and MDA

• The e-mail server operates two separate processes:

– M ail T ransfer A gent (MTA).

– M ail D elivery A gent (MDA).

Trang 39

E-mail Services and SMTP/POP Protocols

• We see that the Mail Delivery Agent (MDA) accepts a piece of e-mail from a Mail Transfer Agent (MTA) and performs the actual delivery

• The MDA receives all the inbound mail from the MTA and places it into the appropriate users' mailboxes

• The MDA can also resolve final delivery issues, such as virus scanning, spam filtering, and return-receipt handling

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 40

E-mail Services and SMTP/POP Protocols

• POP and POP3 (Post Office Protocol, version 3) are inbound mail delivery

protocols and are typical client/server protocols They deliver e-mail from the mail server to the client (MUA)

e-• The MDA listens for when a client connects to a server Once a connection is established, the server can deliver the e-mail to the client

• Some of the commands specified in the SMTP protocol are: HELO, EHLO,

MAIL FROM, RCPT TO, DATA

Trang 41

• The client establishes the first connection to the server on TCP port 21 The client establishes the second connection to the server over TCP port 20

• The file transfer can happen in either direction

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

• The file transfer can happen in either direction

Trang 43

Why Use DHCP?

DHCP reduces the complexity and amount of administrative work by using automatic TCP/IP configuration

Manual TCP/IP Configuration

IP addresses are entered

manually on each client computer

Automatic TCP/IP Configuration

IP addresses are supplied automatically to client computers

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Possibility of entering incorrect or

invalid IP address

Incorrect configuration can lead

to communication and network

in network structure Eliminates a common source of network problems

Trang 44

What Are DHCP Scopes?

A scope is a range of IP addresses that are available to be leased

Trang 46

How the DHCP Operation

DHCP DHCP

DHCP Server2

DHCP client broadcasts a DHCPDISCOVER packet

11

DHCP servers broadcast a DHCPOFFER packet

22

DHCP Client DHCP

Server1

Trang 47

File Sharing Services and SMB Protocol

• The Server Message Block (SMB) is a client/server file sharing protocol

• Unlike the file sharing supported by FTP, clients establish a long term

connection to servers Once the connection is established, the user of the client can access the resources on the server as if the resource is local to the client host

• SMB file-sharing and print services have become the mainstay of Microsoft networking

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 48

File Sharing Services and SMB Protocol

• The SMB protocol describes file system access and how clients can make

requests for files All SMB messages share a common format This format uses

a fixed-sized header followed by a variable-sized parameter and data

component

• SMB messages can:

– Start, authenticate, and terminate sessions

– Control file and printer access

– Allow an application to send or receive messages to or from another device

– Allow an application to send or receive messages to or from another device

Trang 49

P2P Services and Gnutella Protocol

• Many P2P applications do not use a central database to record all the files available on the peers

• When a user is connected to a Gnutella service, the client applications will

search for other Gnutella nodes to connect to These nodes handle queries for resource locations and replies to those requests

• The Gnutella protocol defines five different packet types: ping, pong, query, query hit, push

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 50

Telnet Services and Protocol

• Telnet provides a standard method of emulating text-based terminal devices

over the data network Both the protocol itself and the client software that implements the protocol are commonly referred to as Telnet

Trang 51

Telnet Services and Protocol

• Telnet is a client/server protocol and it specifies how a VTY session is

established and terminated

• Each Telnet command consists of at least two bytes The first byte is a special character called the Interpret as Command (IAC) character

• If security is a concern, the Secure Shell (SSH) protocol offers an alternate and secure method for server access

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Trang 52

Labs

Trang 53

H ọ c vi ệ n m ạ ng Bách khoa - Website: www.bkacad.com

Ngày đăng: 29/07/2014, 01:20

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm

w