Chapter 2 Application Layer computer A TOR-DOWN APPROACH FEATURING THE INTERNET networking third edition James F.Kurose Keith W.Ross A note on the use of these ppt slides: We're making these slides freely available to all(faculty,students,readers). They're in PowerPoint form so you can add,modify,and delete slides Computer Networking: (including this one)and slide content to suit your needs.They obviously A Top Down Approach represent a lot of work on our part.In return for use,we only ask the following: Featuring the Internet, If you use these slides(e.g.,in a class)in substantially unaltered form, 3rd edition. that you mention their source (after all,we'd like people to use our book!) If you post any slides in substantially unaltered form on a ww site,that Jim Kurose,Keith Ross you note that they are adapted from(or perhaps identical to)our slides,and Addison-Wesley,July note our copyright of this material. 2004. Thanks and enjoy!JFK/KWR All material copyright 1996-2006 J.F Kurose and K.W.Ross,All Rights Reserved 2:Application Layer 1
2: Application Layer 1 Chapter 2 Application Layer Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: q If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!) q If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2006 J.F Kurose and K.W. Ross, All Rights Reserved
Chapter 2:Application layer r 2.1 Principles of r 2.6 P2P file sharing network applications r 2.7 Socket programming r 2.2 Web and HTTP with TCP r 2.3 FTP r 2.8 Socket programming r 2.4 Electronic Mail with UDP SMTP,POP3,IMAP r 2.9 Building a Web r 2.5 DNS server 2:Application Layer 2
2: Application Layer 2 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail v SMTP, POP3, IMAP r 2.5 DNS r 2.6 P2P file sharing r 2.7 Socket programming with TCP r 2.8 Socket programming with UDP r 2.9 Building a Web server
Chapter 2:Application Layer Our goals: r learn about protocols r conceptual, by examining popular implementation application-level aspects of network protocols application protocols 冬HTTP transport-layer *FTP service models SMTP POP3 IMAP *client-server DNS paradigm r programming network peer-to-peer applications paradigm socket API 2:Application Layer 3
2: Application Layer 3 Chapter 2: Application Layer Our goals: r conceptual, implementation aspects of network application protocols v transport-layer service models v client-server paradigm v peer-to-peer paradigm r learn about protocols by examining popular application-level protocols v HTTP v FTP v SMTP / POP3 / IMAP v DNS r programming network applications v socket API
Some network apps r E-mail r Internet telephone r Web r Real-time video r Instant messaging conference r Remote login r Massive parallel r P2P file sharing computing r Multi-user network r games r r Streaming stored r video clips 2:Application Layer 4
2: Application Layer 4 Some network apps r E-mail r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored video clips r Internet telephone r Real-time video conference r Massive parallel computing r r r
Creating a network app Write programs that application transport run on different end network data link systems and physical *communicate over a network. e.g.,Web:Web server soffware communicates with browser software little software written for devices in network core application application transport network core devices do fransport network network data link not run user application data link physical physical code application on end systems allows for rapid app development,propagation 2:Application Layer 5
2: Application Layer 5 Creating a network app Write programs that v run on different end systems and v communicate over a network. v e.g., Web: Web server software communicates with browser software little software written for devices in network core v network core devices do not run user application code v application on end systems allows for rapid app development, propagation application transport network data link physical application transport network data link physical application transport network data link physical
Chapter 2:Application layer r 2.1 Principles of r 2.6 P2P file sharing network applications r 2.7 Socket programming r 2.2 Web and HTTP with TCP r 2.3 FTP r 2.8 Socket programming r 2.4 Electronic Mail with UDP SMTP,POP3,IMAP r 2.9 Building a Web r 2.5 DNS server 2:Application Layer 6
2: Application Layer 6 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail v SMTP, POP3, IMAP r 2.5 DNS r 2.6 P2P file sharing r 2.7 Socket programming with TCP r 2.8 Socket programming with UDP r 2.9 Building a Web server
Application architectures r Client-server r Peer-to-peer (P2P) r Hybrid of client-server and P2P 2:Application Layer 7
2: Application Layer 7 Application architectures r Client-server r Peer-to-peer (P2P) r Hybrid of client-server and P2P
Client-server architecture server: ÷always-on host permanent IP address server farms for scaling clients: communicate with server may be intermittently connected may have dynamic IP addresses do not communicate directly with each other 2:Application Layer 8
2: Application Layer 8 Client-server architecture server: v always-on host v permanent IP address v server farms for scaling clients: v communicate with server v may be intermittently connected v may have dynamic IP addresses v do not communicate directly with each other
Pure P2P architecture r no always-on server r arbitrary end systems directly communicate r I peers are intermittently connected and change IP addresses r example:Gnutella Highly scalable but difficult to manage 2:Application Layer 9
2: Application Layer 9 Pure P2P architecture r no always-on server r arbitrary end systems directly communicate r peers are intermittently connected and change IP addresses r example: Gnutella Highly scalable but difficult to manage
Hybrid of client-server and P2P Skype Internet telephony app Finding address of remote party:centralized server(s) Client-client connection is direct(not through server) Instant messaging Chatting between two users is P2P Presence detection/location centralized: User registers its IP address with central server when it comes online User contacts central server to find IP addresses of buddies 2:Application Layer 10
2: Application Layer 10 Hybrid of client-server and P2P Skype v Internet telephony app v Finding address of remote party: centralized server(s) v Client-client connection is direct (not through server) Instant messaging v Chatting between two users is P2P v Presence detection/location centralized: • User registers its IP address with central server when it comes online • User contacts central server to find IP addresses of buddies