SlideShare uma empresa Scribd logo
1 de 134
Baixar para ler offline
Application Layer Protocol
Amitava Nag
Assistant Professor
amitavanag.09@gmail.com
April 6, 2012
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 1 / 37
Architecture of WWW
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37
Architecture of WWW
The WWW is a distributed client-server service, in which a client
using a browser can access a service using a server.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37
Architecture of WWW
The WWW is a distributed client-server service, in which a client
using a browser can access a service using a server.
The service provided is distributed over many locations called sites.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37
Architecture of WWW
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 3 / 37
Browser
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 4 / 37
Internet apps: application, transport protocols
Application Application layer Underlying
protocol transport protocol
email SMTP[RFC2821] TCP
remote terminal Telnet[RFC854] TCP
access
web HTTP[RFC2616] TCP
file transfer FTP[RFC959] TCP
Remote File Server NFS UDP/TCP
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 5 / 37
Web Page Identifier
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
- Domain name of server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
- Domain name of server
- Protocol port number (optional)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
- Domain name of server
- Protocol port number (optional)
- Path through servers file system (optional)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
- Domain name of server
- Protocol port number (optional)
- Path through servers file system (optional)
- Parameters (optional)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
- Domain name of server
- Protocol port number (optional)
- Path through servers file system (optional)
- Parameters (optional)
- Query (optional)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web Page Identifier
Known as Uniform Resource Locator (URL)
Encodes
- Access protocol to use
- Domain name of server
- Protocol port number (optional)
- Path through servers file system (optional)
- Parameters (optional)
- Query (optional)
Format
http: // hostname [: port] / path [; parameters] [? query]
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
Web and HTTP
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
Web and HTTP
Web page consists of objects
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
Web and HTTP
Web page consists of objects
Object can be HTML file, JPEG image, Java applet, audio file,
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
Web and HTTP
Web page consists of objects
Object can be HTML file, JPEG image, Java applet, audio file,
Web page consists of base HTML-file which includes several
referenced objects
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
Web and HTTP
Web page consists of objects
Object can be HTML file, JPEG image, Java applet, audio file,
Web page consists of base HTML-file which includes several
referenced objects
Each object is addressable by a URL
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
Web and HTTP
Web page consists of objects
Object can be HTML file, JPEG image, Java applet, audio file,
Web page consists of base HTML-file which includes several
referenced objects
Each object is addressable by a URL
Example URL:www.someschool.edu/someDept/pic.gif
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
HTTP Characteristics
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Request / response paradigm
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Request / response paradigm
Stateless
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Request / response paradigm
Stateless
Permits bi-directional transfer
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Request / response paradigm
Stateless
Permits bi-directional transfer
Offers capability negotiation
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Request / response paradigm
Stateless
Permits bi-directional transfer
Offers capability negotiation
Support for caching
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP Characteristics
Application level
Request / response paradigm
Stateless
Permits bi-directional transfer
Offers capability negotiation
Support for caching
Support for intermediaries
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
HTTP overview
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 9 / 37
HTTP overview ( continued )
Uses TCP :
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
HTTP overview ( continued )
Uses TCP :
HTTP client initiates TCP connection (creates socket) to (
www.someschool.edu/ ) server on port 80 (default port number for
HTTP).
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
HTTP overview ( continued )
Uses TCP :
HTTP client initiates TCP connection (creates socket) to (
www.someschool.edu/ ) server on port 80 (default port number for
HTTP).
HTTP server accepts TCP connection from client
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
HTTP overview ( continued )
Uses TCP :
HTTP client initiates TCP connection (creates socket) to (
www.someschool.edu/ ) server on port 80 (default port number for
HTTP).
HTTP server accepts TCP connection from client
HTTP messages (application-layer protocol messages) exchanged
between browser ( HTTP client ) and Web server ( HTTP server )
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
HTTP overview ( continued )
Uses TCP :
HTTP client initiates TCP connection (creates socket) to (
www.someschool.edu/ ) server on port 80 (default port number for
HTTP).
HTTP server accepts TCP connection from client
HTTP messages (application-layer protocol messages) exchanged
between browser ( HTTP client ) and Web server ( HTTP server )
TCP connection closed
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
HTTP connections
Nonpersistent HTTP Persistent HTTP
At most one object is sent over Multiple objects can be sent over
a TCP connection. single TCP connection between
client and server.
HTTP/1.0 uses nonpersistent HTTP HTTP/1.1 uses persistent
connections in default mode
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 11 / 37
FTP: the file transfer protocol
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP: the file transfer protocol
transfer file to/from remote host
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP: the file transfer protocol
transfer file to/from remote host
client/server model
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP: the file transfer protocol
transfer file to/from remote host
client/server model
client: side that initiates transfer (either to/from remote)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP: the file transfer protocol
transfer file to/from remote host
client/server model
client: side that initiates transfer (either to/from remote)
server: remote host
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP: the file transfer protocol
transfer file to/from remote host
client/server model
client: side that initiates transfer (either to/from remote)
server: remote host
ftp: RFC 959
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP: the file transfer protocol
transfer file to/from remote host
client/server model
client: side that initiates transfer (either to/from remote)
server: remote host
ftp: RFC 959
ftp server: port 21
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
FTP overview
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 13 / 37
FTP:connections
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 14 / 37
Opening the control connection
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 15 / 37
Creating the data connection
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 16 / 37
FTP: separate control, data connections
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Client browses remote directory by sending commands over control
connection.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Client browses remote directory by sending commands over control
connection.
When server receives a command for a file transfer, the server opens a
TCP data connection to client
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Client browses remote directory by sending commands over control
connection.
When server receives a command for a file transfer, the server opens a
TCP data connection to client
After transferring one file, server closes connection.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Client browses remote directory by sending commands over control
connection.
When server receives a command for a file transfer, the server opens a
TCP data connection to client
After transferring one file, server closes connection.
Server opens a second TCP data connection to transfer another file.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Client browses remote directory by sending commands over control
connection.
When server receives a command for a file transfer, the server opens a
TCP data connection to client
After transferring one file, server closes connection.
Server opens a second TCP data connection to transfer another file.
Control connection: out of band
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
FTP: separate control, data connections
FTP client contacts FTP server at port 21, specifying TCP as
transport protocol
Client obtains authorization over control connection
Client browses remote directory by sending commands over control
connection.
When server receives a command for a file transfer, the server opens a
TCP data connection to client
After transferring one file, server closes connection.
Server opens a second TCP data connection to transfer another file.
Control connection: out of band
FTP server maintains state: current directory, earlier authentication
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
Remote Login: Telnet
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37
Remote Login: Telnet
TELNET is a general-purpose client-server application program
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37
Remote Login: Telnet
TELNET is a general-purpose client-server application program
TELNET enables the establishment of a connection to a remote
system in such a way that the local terminal appears to be a terminal
at the remote system.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37
Figure:Local login
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 19 / 37
Figure:Remote login
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 20 / 37
Electronic Mail
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
Electronic Mail
Three major components:
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
Electronic Mail
Three major components:
1 user agents
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
Electronic Mail
Three major components:
1 user agents
2 mail servers
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
Electronic Mail
Three major components:
1 user agents
2 mail servers
3 simple mail transfer protocol: SMTP
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
Electronic Mail
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 22 / 37
Electronic Mail: mail servers
Mail Servers
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
Electronic Mail: mail servers
Mail Servers
mailbox contains incoming messages for user
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
Electronic Mail: mail servers
Mail Servers
mailbox contains incoming messages for user
message queue of outgoing (to be sent) mail messages
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
Electronic Mail: mail servers
Mail Servers
mailbox contains incoming messages for user
message queue of outgoing (to be sent) mail messages
SMTP protocol between mail servers to send email messages
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
Electronic Mail: mail servers
Mail Servers
mailbox contains incoming messages for user
message queue of outgoing (to be sent) mail messages
SMTP protocol between mail servers to send email messages
client: sending mail server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
Electronic Mail: mail servers
Mail Servers
mailbox contains incoming messages for user
message queue of outgoing (to be sent) mail messages
SMTP protocol between mail servers to send email messages
client: sending mail server
server: receiving mail server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
Electronic Mail: SMTP [RFC 2821]
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
transfer of messages
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
transfer of messages
closure
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
transfer of messages
closure
command/response interaction
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
transfer of messages
closure
command/response interaction
commands: ASCII text
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
transfer of messages
closure
command/response interaction
commands: ASCII text
response: status code and phrase
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Electronic Mail: SMTP [RFC 2821]
uses TCP to reliably transfer email message from client to server, port
25
direct transfer: sending server to receiving server
three phases of transfer
handshaking (greeting)
transfer of messages
closure
command/response interaction
commands: ASCII text
response: status code and phrase
messages must be in 7-bit ASCII
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
Scenario: Alice sends message to Bob
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Scenario: Alice sends message to Bob
1 Alice uses UA to compose message and to bob@someschool.edu
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Scenario: Alice sends message to Bob
1 Alice uses UA to compose message and to bob@someschool.edu
2 Alices UA sends message to her mail server; message placed in
message queue
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Scenario: Alice sends message to Bob
1 Alice uses UA to compose message and to bob@someschool.edu
2 Alices UA sends message to her mail server; message placed in
message queue
3 Client side of SMTP opens TCP connection with Bobs mail server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Scenario: Alice sends message to Bob
1 Alice uses UA to compose message and to bob@someschool.edu
2 Alices UA sends message to her mail server; message placed in
message queue
3 Client side of SMTP opens TCP connection with Bobs mail server
4 SMTP client sends Alices message over the TCP connection
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Scenario: Alice sends message to Bob
1 Alice uses UA to compose message and to bob@someschool.edu
2 Alices UA sends message to her mail server; message placed in
message queue
3 Client side of SMTP opens TCP connection with Bobs mail server
4 SMTP client sends Alices message over the TCP connection
5 Bobs mail server places the message in Bobs mailbox
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Scenario: Alice sends message to Bob
1 Alice uses UA to compose message and to bob@someschool.edu
2 Alices UA sends message to her mail server; message placed in
message queue
3 Client side of SMTP opens TCP connection with Bobs mail server
4 SMTP client sends Alices message over the TCP connection
5 Bobs mail server places the message in Bobs mailbox
6 Bob invokes his user agent to read message
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
Figure: Alice sends message to Bob
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 26 / 37
Mail access protocols
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]
authorization (agent < −− >server) and download
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]
authorization (agent < −− >server) and download
IMAP: Internet Mail Access Protocol [RFC 1730]
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]
authorization (agent < −− >server) and download
IMAP: Internet Mail Access Protocol [RFC 1730]
more features (more complex)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]
authorization (agent < −− >server) and download
IMAP: Internet Mail Access Protocol [RFC 1730]
more features (more complex)
manipulation of stored msgs on server
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Mail access protocols
SMTP: delivery/storage to receivers server
Mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]
authorization (agent < −− >server) and download
IMAP: Internet Mail Access Protocol [RFC 1730]
more features (more complex)
manipulation of stored msgs on server
HTTP: Hotmail , Yahoo! Mail, etc.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
Figure:Mail access protocols
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 28 / 37
Network Management
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management =
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management = Initialization,
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management = Initialization, Monitoring,
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management = Initialization, Monitoring, Control
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management = Initialization, Monitoring, Control
Today: automated, reliable diagnosis, and automatic control are still
in a primitive stage
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management = Initialization, Monitoring, Control
Today: automated, reliable diagnosis, and automatic control are still
in a primitive stage
Architecture: Manager, Agents and Management Information Base
(MIB)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Network Management
Management = Initialization, Monitoring, Control
Today: automated, reliable diagnosis, and automatic control are still
in a primitive stage
Architecture: Manager, Agents and Management Information Base
(MIB)
Observe that management-plane has a new interface to the network
distinct from data and control-plane
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
Simple Network Management Protocol (SNMP)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
Simple Network Management Protocol (SNMP)
SNMP is a framework for managing devices in an internet using the
TCP/IP protocol suit
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
Simple Network Management Protocol (SNMP)
SNMP is a framework for managing devices in an internet using the
TCP/IP protocol suit
A manager, usually a lost that, controls and monitor a set of
agents,usually routers
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
Simple Network Management Protocol (SNMP)
SNMP is a framework for managing devices in an internet using the
TCP/IP protocol suit
A manager, usually a lost that, controls and monitor a set of
agents,usually routers
The manager is a host that runs the SNMP client program.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
Simple Network Management Protocol (SNMP)
SNMP is a framework for managing devices in an internet using the
TCP/IP protocol suit
A manager, usually a lost that, controls and monitor a set of
agents,usually routers
The manager is a host that runs the SNMP client program.
The agent is a router or host that runs the SNMP server program
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
Figure:Mail access protocols
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 31 / 37
MANAGEMENT COMPONENTS
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols:
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols:
1 Structure of Management Information (SMI) and
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols:
1 Structure of Management Information (SMI) and
2 Management Information Base (MIB)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols:
1 Structure of Management Information (SMI) and
2 Management Information Base (MIB)
Network management on the Internet is done through the
cooperation of SNMP, SMI, and MIB.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
Management Information Base(MIB)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37
Management Information Base(MIB)
MIB is a second component used in network management
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37
Management Information Base(MIB)
MIB is a second component used in network management
Each agent has its own MIB, a collection of all the objects that the
manager can manage.
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37
Figure:Management Information Base, version 2 (MIB2)
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 34 / 37
SNMP
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
SNMP
SNMP is an application program that allows
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
SNMP
SNMP is an application program that allows
1 a manager to retrieve the value of an object defined in an agent;
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
SNMP
SNMP is an application program that allows
1 a manager to retrieve the value of an object defined in an agent;
2 a manager to store a value in an object defined in an agent; and
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
SNMP
SNMP is an application program that allows
1 a manager to retrieve the value of an object defined in an agent;
2 a manager to store a value in an object defined in an agent; and
3 an agent to send an alarm message about an abnormal situation to the
manager
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
Figure:SNMP
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 36 / 37
The End
Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 37 / 37

Mais conteúdo relacionado

Mais procurados

The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
Application layer
Application layerApplication layer
Application layerreshmadayma
 
Application layer
Application layerApplication layer
Application layerreshmadayma
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layerKritika Purohit
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
Application layer chapter-9
Application layer chapter-9Application layer chapter-9
Application layer chapter-9Student
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 

Mais procurados (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Chapter3
Chapter3Chapter3
Chapter3
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
TCP / IP Services and Standards
TCP / IP Services and StandardsTCP / IP Services and Standards
TCP / IP Services and Standards
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Application layer chapter-9
Application layer chapter-9Application layer chapter-9
Application layer chapter-9
 
Application layer
Application layerApplication layer
Application layer
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Chapter 2 v6.3
Chapter 2 v6.3Chapter 2 v6.3
Chapter 2 v6.3
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 

Semelhante a Application layer protocol

Open APIs - Risks and Rewards (Øredev 2013)
Open APIs - Risks and Rewards (Øredev 2013)Open APIs - Risks and Rewards (Øredev 2013)
Open APIs - Risks and Rewards (Øredev 2013)Nordic APIs
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...
Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...
Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...jaxLondonConference
 
Getting Started with WebSockets and Server-Sent Events
Getting Started with WebSockets and Server-Sent EventsGetting Started with WebSockets and Server-Sent Events
Getting Started with WebSockets and Server-Sent EventsArun Gupta
 
Unit 5 Application Layer
Unit 5 Application LayerUnit 5 Application Layer
Unit 5 Application LayerKalpanaC14
 
Concepts for Operating a Web Site
Concepts for Operating a Web SiteConcepts for Operating a Web Site
Concepts for Operating a Web SiteCan Burak Çilingir
 
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...ruyalarcon
 
Oracle REST Data Services
Oracle REST Data ServicesOracle REST Data Services
Oracle REST Data ServicesChris Muir
 
Web Architecture and Technologies
Web Architecture and TechnologiesWeb Architecture and Technologies
Web Architecture and TechnologiesFulvio Corno
 
DYI - Starting your own webrtc project
DYI - Starting your own webrtc projectDYI - Starting your own webrtc project
DYI - Starting your own webrtc projectAlexandre Gouaillard
 
Abhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techAbhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techabhishek srivastav
 
Servlet 4.0 at GeekOut 2015
Servlet 4.0 at GeekOut 2015Servlet 4.0 at GeekOut 2015
Servlet 4.0 at GeekOut 2015Edward Burns
 
Anintroductiontojavawebtechnology 090324184240-phpapp01
Anintroductiontojavawebtechnology 090324184240-phpapp01Anintroductiontojavawebtechnology 090324184240-phpapp01
Anintroductiontojavawebtechnology 090324184240-phpapp01raviIITRoorkee
 
Next gen tech from QuickXpert Infotech
Next gen tech   from QuickXpert InfotechNext gen tech   from QuickXpert Infotech
Next gen tech from QuickXpert InfotechNarendra Jakhotia
 
JavaOne2013 Leveraging Linked Data and OSLC
JavaOne2013 Leveraging Linked Data and OSLCJavaOne2013 Leveraging Linked Data and OSLC
JavaOne2013 Leveraging Linked Data and OSLCSteve Speicher
 
Plugin for other browsers - webRTC Conference and Expo June 2014 @ atlanta
Plugin for other browsers - webRTC Conference and Expo June 2014 @ atlantaPlugin for other browsers - webRTC Conference and Expo June 2014 @ atlanta
Plugin for other browsers - webRTC Conference and Expo June 2014 @ atlantaAlexandre Gouaillard
 

Semelhante a Application layer protocol (20)

Open APIs - Risks and Rewards (Øredev 2013)
Open APIs - Risks and Rewards (Øredev 2013)Open APIs - Risks and Rewards (Øredev 2013)
Open APIs - Risks and Rewards (Øredev 2013)
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...
Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...
Getting Started with WebSocket and Server-Sent Events using Java - Arun Gupta...
 
Getting Started with WebSockets and Server-Sent Events
Getting Started with WebSockets and Server-Sent EventsGetting Started with WebSockets and Server-Sent Events
Getting Started with WebSockets and Server-Sent Events
 
Applicaion layer
Applicaion layerApplicaion layer
Applicaion layer
 
Unit 5 Application Layer
Unit 5 Application LayerUnit 5 Application Layer
Unit 5 Application Layer
 
Session 1 tp1
Session 1 tp1Session 1 tp1
Session 1 tp1
 
Concepts for Operating a Web Site
Concepts for Operating a Web SiteConcepts for Operating a Web Site
Concepts for Operating a Web Site
 
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
Fulfilling the Hypermedia Constraint via HTTP OPTIONS, The HTTP Vocabulary In...
 
Oracle REST Data Services
Oracle REST Data ServicesOracle REST Data Services
Oracle REST Data Services
 
Web Architecture and Technologies
Web Architecture and TechnologiesWeb Architecture and Technologies
Web Architecture and Technologies
 
DYI - Starting your own webrtc project
DYI - Starting your own webrtc projectDYI - Starting your own webrtc project
DYI - Starting your own webrtc project
 
Abhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_techAbhishek srivastava ppt_web_tech
Abhishek srivastava ppt_web_tech
 
Servlet 4.0 at GeekOut 2015
Servlet 4.0 at GeekOut 2015Servlet 4.0 at GeekOut 2015
Servlet 4.0 at GeekOut 2015
 
Anintroductiontojavawebtechnology 090324184240-phpapp01
Anintroductiontojavawebtechnology 090324184240-phpapp01Anintroductiontojavawebtechnology 090324184240-phpapp01
Anintroductiontojavawebtechnology 090324184240-phpapp01
 
Next gen tech from QuickXpert Infotech
Next gen tech   from QuickXpert InfotechNext gen tech   from QuickXpert Infotech
Next gen tech from QuickXpert Infotech
 
JavaOne2013 Leveraging Linked Data and OSLC
JavaOne2013 Leveraging Linked Data and OSLCJavaOne2013 Leveraging Linked Data and OSLC
JavaOne2013 Leveraging Linked Data and OSLC
 
Plugin for other browsers - webRTC Conference and Expo June 2014 @ atlanta
Plugin for other browsers - webRTC Conference and Expo June 2014 @ atlantaPlugin for other browsers - webRTC Conference and Expo June 2014 @ atlanta
Plugin for other browsers - webRTC Conference and Expo June 2014 @ atlanta
 
ASP.NET WEB API Training
ASP.NET WEB API TrainingASP.NET WEB API Training
ASP.NET WEB API Training
 

Último

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Último (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Application layer protocol

  • 1. Application Layer Protocol Amitava Nag Assistant Professor amitavanag.09@gmail.com April 6, 2012 Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 1 / 37
  • 2. Architecture of WWW Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37
  • 3. Architecture of WWW The WWW is a distributed client-server service, in which a client using a browser can access a service using a server. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37
  • 4. Architecture of WWW The WWW is a distributed client-server service, in which a client using a browser can access a service using a server. The service provided is distributed over many locations called sites. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 2 / 37
  • 5. Architecture of WWW Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 3 / 37
  • 6. Browser Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 4 / 37
  • 7. Internet apps: application, transport protocols Application Application layer Underlying protocol transport protocol email SMTP[RFC2821] TCP remote terminal Telnet[RFC854] TCP access web HTTP[RFC2616] TCP file transfer FTP[RFC959] TCP Remote File Server NFS UDP/TCP Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 5 / 37
  • 8. Web Page Identifier Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 9. Web Page Identifier Known as Uniform Resource Locator (URL) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 10. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 11. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 12. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use - Domain name of server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 13. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use - Domain name of server - Protocol port number (optional) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 14. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use - Domain name of server - Protocol port number (optional) - Path through servers file system (optional) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 15. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use - Domain name of server - Protocol port number (optional) - Path through servers file system (optional) - Parameters (optional) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 16. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use - Domain name of server - Protocol port number (optional) - Path through servers file system (optional) - Parameters (optional) - Query (optional) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 17. Web Page Identifier Known as Uniform Resource Locator (URL) Encodes - Access protocol to use - Domain name of server - Protocol port number (optional) - Path through servers file system (optional) - Parameters (optional) - Query (optional) Format http: // hostname [: port] / path [; parameters] [? query] Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 6 / 37
  • 18. Web and HTTP Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
  • 19. Web and HTTP Web page consists of objects Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
  • 20. Web and HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
  • 21. Web and HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
  • 22. Web and HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each object is addressable by a URL Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
  • 23. Web and HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each object is addressable by a URL Example URL:www.someschool.edu/someDept/pic.gif Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 7 / 37
  • 24. HTTP Characteristics Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 25. HTTP Characteristics Application level Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 26. HTTP Characteristics Application level Request / response paradigm Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 27. HTTP Characteristics Application level Request / response paradigm Stateless Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 28. HTTP Characteristics Application level Request / response paradigm Stateless Permits bi-directional transfer Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 29. HTTP Characteristics Application level Request / response paradigm Stateless Permits bi-directional transfer Offers capability negotiation Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 30. HTTP Characteristics Application level Request / response paradigm Stateless Permits bi-directional transfer Offers capability negotiation Support for caching Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 31. HTTP Characteristics Application level Request / response paradigm Stateless Permits bi-directional transfer Offers capability negotiation Support for caching Support for intermediaries Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 8 / 37
  • 32. HTTP overview Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 9 / 37
  • 33. HTTP overview ( continued ) Uses TCP : Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
  • 34. HTTP overview ( continued ) Uses TCP : HTTP client initiates TCP connection (creates socket) to ( www.someschool.edu/ ) server on port 80 (default port number for HTTP). Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
  • 35. HTTP overview ( continued ) Uses TCP : HTTP client initiates TCP connection (creates socket) to ( www.someschool.edu/ ) server on port 80 (default port number for HTTP). HTTP server accepts TCP connection from client Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
  • 36. HTTP overview ( continued ) Uses TCP : HTTP client initiates TCP connection (creates socket) to ( www.someschool.edu/ ) server on port 80 (default port number for HTTP). HTTP server accepts TCP connection from client HTTP messages (application-layer protocol messages) exchanged between browser ( HTTP client ) and Web server ( HTTP server ) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
  • 37. HTTP overview ( continued ) Uses TCP : HTTP client initiates TCP connection (creates socket) to ( www.someschool.edu/ ) server on port 80 (default port number for HTTP). HTTP server accepts TCP connection from client HTTP messages (application-layer protocol messages) exchanged between browser ( HTTP client ) and Web server ( HTTP server ) TCP connection closed Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 10 / 37
  • 38. HTTP connections Nonpersistent HTTP Persistent HTTP At most one object is sent over Multiple objects can be sent over a TCP connection. single TCP connection between client and server. HTTP/1.0 uses nonpersistent HTTP HTTP/1.1 uses persistent connections in default mode Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 11 / 37
  • 39. FTP: the file transfer protocol Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 40. FTP: the file transfer protocol transfer file to/from remote host Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 41. FTP: the file transfer protocol transfer file to/from remote host client/server model Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 42. FTP: the file transfer protocol transfer file to/from remote host client/server model client: side that initiates transfer (either to/from remote) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 43. FTP: the file transfer protocol transfer file to/from remote host client/server model client: side that initiates transfer (either to/from remote) server: remote host Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 44. FTP: the file transfer protocol transfer file to/from remote host client/server model client: side that initiates transfer (either to/from remote) server: remote host ftp: RFC 959 Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 45. FTP: the file transfer protocol transfer file to/from remote host client/server model client: side that initiates transfer (either to/from remote) server: remote host ftp: RFC 959 ftp server: port 21 Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 12 / 37
  • 46. FTP overview Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 13 / 37
  • 47. FTP:connections Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 14 / 37
  • 48. Opening the control connection Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 15 / 37
  • 49. Creating the data connection Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 16 / 37
  • 50. FTP: separate control, data connections Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 51. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 52. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 53. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Client browses remote directory by sending commands over control connection. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 54. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Client browses remote directory by sending commands over control connection. When server receives a command for a file transfer, the server opens a TCP data connection to client Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 55. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Client browses remote directory by sending commands over control connection. When server receives a command for a file transfer, the server opens a TCP data connection to client After transferring one file, server closes connection. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 56. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Client browses remote directory by sending commands over control connection. When server receives a command for a file transfer, the server opens a TCP data connection to client After transferring one file, server closes connection. Server opens a second TCP data connection to transfer another file. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 57. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Client browses remote directory by sending commands over control connection. When server receives a command for a file transfer, the server opens a TCP data connection to client After transferring one file, server closes connection. Server opens a second TCP data connection to transfer another file. Control connection: out of band Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 58. FTP: separate control, data connections FTP client contacts FTP server at port 21, specifying TCP as transport protocol Client obtains authorization over control connection Client browses remote directory by sending commands over control connection. When server receives a command for a file transfer, the server opens a TCP data connection to client After transferring one file, server closes connection. Server opens a second TCP data connection to transfer another file. Control connection: out of band FTP server maintains state: current directory, earlier authentication Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 17 / 37
  • 59. Remote Login: Telnet Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37
  • 60. Remote Login: Telnet TELNET is a general-purpose client-server application program Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37
  • 61. Remote Login: Telnet TELNET is a general-purpose client-server application program TELNET enables the establishment of a connection to a remote system in such a way that the local terminal appears to be a terminal at the remote system. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 18 / 37
  • 62. Figure:Local login Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 19 / 37
  • 63. Figure:Remote login Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 20 / 37
  • 64. Electronic Mail Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
  • 65. Electronic Mail Three major components: Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
  • 66. Electronic Mail Three major components: 1 user agents Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
  • 67. Electronic Mail Three major components: 1 user agents 2 mail servers Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
  • 68. Electronic Mail Three major components: 1 user agents 2 mail servers 3 simple mail transfer protocol: SMTP Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 21 / 37
  • 69. Electronic Mail Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 22 / 37
  • 70. Electronic Mail: mail servers Mail Servers Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
  • 71. Electronic Mail: mail servers Mail Servers mailbox contains incoming messages for user Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
  • 72. Electronic Mail: mail servers Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail messages Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
  • 73. Electronic Mail: mail servers Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail messages SMTP protocol between mail servers to send email messages Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
  • 74. Electronic Mail: mail servers Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail messages SMTP protocol between mail servers to send email messages client: sending mail server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
  • 75. Electronic Mail: mail servers Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail messages SMTP protocol between mail servers to send email messages client: sending mail server server: receiving mail server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 23 / 37
  • 76. Electronic Mail: SMTP [RFC 2821] Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 77. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 78. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 79. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 80. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 81. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 82. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages closure Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 83. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages closure command/response interaction Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 84. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages closure command/response interaction commands: ASCII text Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 85. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages closure command/response interaction commands: ASCII text response: status code and phrase Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 86. Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message from client to server, port 25 direct transfer: sending server to receiving server three phases of transfer handshaking (greeting) transfer of messages closure command/response interaction commands: ASCII text response: status code and phrase messages must be in 7-bit ASCII Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 24 / 37
  • 87. Scenario: Alice sends message to Bob Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 88. Scenario: Alice sends message to Bob 1 Alice uses UA to compose message and to bob@someschool.edu Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 89. Scenario: Alice sends message to Bob 1 Alice uses UA to compose message and to bob@someschool.edu 2 Alices UA sends message to her mail server; message placed in message queue Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 90. Scenario: Alice sends message to Bob 1 Alice uses UA to compose message and to bob@someschool.edu 2 Alices UA sends message to her mail server; message placed in message queue 3 Client side of SMTP opens TCP connection with Bobs mail server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 91. Scenario: Alice sends message to Bob 1 Alice uses UA to compose message and to bob@someschool.edu 2 Alices UA sends message to her mail server; message placed in message queue 3 Client side of SMTP opens TCP connection with Bobs mail server 4 SMTP client sends Alices message over the TCP connection Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 92. Scenario: Alice sends message to Bob 1 Alice uses UA to compose message and to bob@someschool.edu 2 Alices UA sends message to her mail server; message placed in message queue 3 Client side of SMTP opens TCP connection with Bobs mail server 4 SMTP client sends Alices message over the TCP connection 5 Bobs mail server places the message in Bobs mailbox Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 93. Scenario: Alice sends message to Bob 1 Alice uses UA to compose message and to bob@someschool.edu 2 Alices UA sends message to her mail server; message placed in message queue 3 Client side of SMTP opens TCP connection with Bobs mail server 4 SMTP client sends Alices message over the TCP connection 5 Bobs mail server places the message in Bobs mailbox 6 Bob invokes his user agent to read message Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 25 / 37
  • 94. Figure: Alice sends message to Bob Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 26 / 37
  • 95. Mail access protocols Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 96. Mail access protocols SMTP: delivery/storage to receivers server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 97. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 98. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 99. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent < −− >server) and download Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 100. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent < −− >server) and download IMAP: Internet Mail Access Protocol [RFC 1730] Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 101. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent < −− >server) and download IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 102. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent < −− >server) and download IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) manipulation of stored msgs on server Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 103. Mail access protocols SMTP: delivery/storage to receivers server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent < −− >server) and download IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) manipulation of stored msgs on server HTTP: Hotmail , Yahoo! Mail, etc. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 27 / 37
  • 104. Figure:Mail access protocols Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 28 / 37
  • 105. Network Management Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 106. Network Management Management = Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 107. Network Management Management = Initialization, Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 108. Network Management Management = Initialization, Monitoring, Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 109. Network Management Management = Initialization, Monitoring, Control Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 110. Network Management Management = Initialization, Monitoring, Control Today: automated, reliable diagnosis, and automatic control are still in a primitive stage Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 111. Network Management Management = Initialization, Monitoring, Control Today: automated, reliable diagnosis, and automatic control are still in a primitive stage Architecture: Manager, Agents and Management Information Base (MIB) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 112. Network Management Management = Initialization, Monitoring, Control Today: automated, reliable diagnosis, and automatic control are still in a primitive stage Architecture: Manager, Agents and Management Information Base (MIB) Observe that management-plane has a new interface to the network distinct from data and control-plane Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 29 / 37
  • 113. Simple Network Management Protocol (SNMP) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
  • 114. Simple Network Management Protocol (SNMP) SNMP is a framework for managing devices in an internet using the TCP/IP protocol suit Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
  • 115. Simple Network Management Protocol (SNMP) SNMP is a framework for managing devices in an internet using the TCP/IP protocol suit A manager, usually a lost that, controls and monitor a set of agents,usually routers Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
  • 116. Simple Network Management Protocol (SNMP) SNMP is a framework for managing devices in an internet using the TCP/IP protocol suit A manager, usually a lost that, controls and monitor a set of agents,usually routers The manager is a host that runs the SNMP client program. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
  • 117. Simple Network Management Protocol (SNMP) SNMP is a framework for managing devices in an internet using the TCP/IP protocol suit A manager, usually a lost that, controls and monitor a set of agents,usually routers The manager is a host that runs the SNMP client program. The agent is a router or host that runs the SNMP server program Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 30 / 37
  • 118. Figure:Mail access protocols Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 31 / 37
  • 119. MANAGEMENT COMPONENTS Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
  • 120. MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
  • 121. MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: 1 Structure of Management Information (SMI) and Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
  • 122. MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: 1 Structure of Management Information (SMI) and 2 Management Information Base (MIB) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
  • 123. MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: 1 Structure of Management Information (SMI) and 2 Management Information Base (MIB) Network management on the Internet is done through the cooperation of SNMP, SMI, and MIB. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 32 / 37
  • 124. Management Information Base(MIB) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37
  • 125. Management Information Base(MIB) MIB is a second component used in network management Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37
  • 126. Management Information Base(MIB) MIB is a second component used in network management Each agent has its own MIB, a collection of all the objects that the manager can manage. Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 33 / 37
  • 127. Figure:Management Information Base, version 2 (MIB2) Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 34 / 37
  • 128. SNMP Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
  • 129. SNMP SNMP is an application program that allows Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
  • 130. SNMP SNMP is an application program that allows 1 a manager to retrieve the value of an object defined in an agent; Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
  • 131. SNMP SNMP is an application program that allows 1 a manager to retrieve the value of an object defined in an agent; 2 a manager to store a value in an object defined in an agent; and Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
  • 132. SNMP SNMP is an application program that allows 1 a manager to retrieve the value of an object defined in an agent; 2 a manager to store a value in an object defined in an agent; and 3 an agent to send an alarm message about an abnormal situation to the manager Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 35 / 37
  • 133. Figure:SNMP Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 36 / 37
  • 134. The End Amitava Nag (Academy of Technology) Application Layer Protocol April 6, 2012 37 / 37