0% found this document useful (0 votes)
19 views32 pages

Lecture 3

Network devices use addressing information at each layer to determine the path to deliver packets to their destination. Routers examine the network layer address to determine the next hop. The client/server model describes application layer interactions where a client requests data from a server, which responds by sending data streams back to the client. Peer-to-peer networks allow devices to directly share resources without a central server. DNS services translate human-readable domain names to numeric IP addresses, caching responses to improve performance and reduce query traffic loads on name servers. The HTTP protocol governs web client requests for files and resources from a web server.

Uploaded by

jasmhmyd205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views32 pages

Lecture 3

Network devices use addressing information at each layer to determine the path to deliver packets to their destination. Routers examine the network layer address to determine the next hop. The client/server model describes application layer interactions where a client requests data from a server, which responds by sending data streams back to the client. Peer-to-peer networks allow devices to directly share resources without a central server. DNS services translate human-readable domain names to numeric IP addresses, caching responses to improve performance and reduce query traffic loads on name servers. The HTTP protocol governs web client requests for files and resources from a web server.

Uploaded by

jasmhmyd205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Lecture_3

NETWORK STANDARDS
Addressing in the Network
• The PDU at each layer adds address information for use by
the peer layer at the destination
• intermediary network device, usually a (Router),
decapsulates the frame to read the destination host
address contained in the header of the packet, the
Layer 3 PDU. Routers use the network identifier
portion of this address to determine which path to use
to reach the destination host.
Client/Server Model
In the client/server model, the device requesting the information
is called a client and the device responding to the request is
called a server.
Client and server processes are considered to be in the
application layer.
The client begins the exchange by requesting data from the
server, which responds by sending one or more streams of data
to the client. Application layer protocols describe the design of
the requests and responses between clients and servers.
Client/Server Model
Servers
• Any device that responds to requests from client applications is
functioning as a server.
• A server is usually a computer that contains information to be
shared with many client systems.
• For example, web pages, documents, databases, pictures, video,
and audio files can all be stored on a server and delivered to
requesting clients.
Servers
Peer-to-Peer (P2P) model
• P2P networking involves two distinct forms:
peer-to-peer network design and peer-to-peer
applications.
• Both forms have similar features but in
practice work very differently.
P2P Networks
• In a peer-to-peer network, two or more
computers are connected through a network
and can share resources such as printers and
files without having a dedicated server.
• Every connected end device, known as a peer,
can function as either a server or a client.
• One computer might assume the role of server
for one transaction while simultaneously serve
as a client for another.
P2P Networks
DNS Services and Protocol
• On the Internet, these domain names, such as
http://www.cisco.com, are much easier for people to
remember than 198.132.219.25, which, at the time
of this writing, is the numeric address for this server.
• Also, if Cisco decides to change the numeric address,
it is transparent to the user, because the domain
name will remain http://www.cisco.com. The new
address will simply be linked to the existing domain
name and connectivity is maintained, as shown in
Figure
DNS Services and Protocol
DNS Services and Protocol
• When a match is found and returned to the
original requesting server, the server
temporarily stores the numbered address that
matches the name in the cache.
• If that same name is requested again, the first
server can return the address by using the value
stored in its name cache.
• Caching reduces both the DNS query data
network traffic and the workloads of servers
higher up the hierarchy.
DNS Hierarchy
WWW Service and HTTP
• To access the content, web clients make connections
to the server and request the desired resources.
• The server replies with the resources and, upon
receipt, the browser interpret the data and present it
to the user.
• To better understand how the web browser and web
client interact, you can examine how a web page is
opened in a browser. For this example, consider the
URL
• http://www.cisco.com/web-server.htm.
WWW Service and HTTP
First, the browser interprets the three parts of the
URL:
■ http: The protocol or scheme
■ www.cisco.com: The server name
■ web-server.htm: The specific filename requested
• For secure communication across the Internet,
the Secure HTTP (HTTPS) protocol is used for
accessing and posting web server information.
E-Mail Services and SMTP/POP
Protocols

 POP and POP3 (Post Office Protocol, version 3) are


inbound mail delivery protocols and are typical
client/server protocols.
 They deliver e-mail from the e-mail server to the client
(MUA)
 SMTP, on the other hand, governs the transfer of
outbound e-mail from the sending client to the e-mail
server (MDA), as well as the transport of e-mail between
e-mail servers (MTA).
E-Mail Services and SMTP/POP
Protocols
File Transfer Protocol (FTP)
• FTP was developed to allow file transfers between a
client and a server.
• FTP requires two connections between the client and
the server: one for commands and replies, and the
other for the actual file transfer.
• The client establishes the first connection to the
server on TCP port 21.
• The client establishes the second connection to the
server over TCP port 20. This connection is for the
actual file transfer and is created every time a file is
transferred.
File Transfer Protocol (FTP)
Purpose of the Transport Layer
• The following are the primary responsibilities of the transport
layer:
■ Tracking the individual communications between
applications on the source and destination hosts
■ Segmenting data and managing each piece
■ Reassembling the segments into streams of application
data
■ Identifying the different applications
■ Performing flow control between end users
■ Enabling error recovery
■ Initiating a session
Purpose of the Transport Layer
Transport layer Protocols
TCP and UDP
• The two most common transport layer
protocols of the TCP/IP protocol suite are
Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP).
• Both protocols manage the communication of
multiple applications.
• The differences between the two are the
specific functions that each protocol
implements.
User Datagram Protocol (UDP)
• UDP is a simple, connectionless protocol, described in
RFC 768.
• It has the advantage of providing low-overhead data
delivery.
• The segments of communication in UDP are called
datagrams. UDP sends datagrams as “best effort.”

• Applications that use UDP include:


• ■ Domain Name System (DNS)
• ■ Video streaming
• ■ Voice over IP (VoIP)
UDP Datagram
Transmission Control Protocol (TCP)
• TCP is a connection-oriented protocol, described
in RFC 793.
• TCP incurs additional overhead to gain functions.
Additional functions specified by TCP are same-
order delivery, reliable delivery, and flow control.
• Each TCP segment has 20 bytes of overhead in
the header encapsulating the application layer
data, whereas each UDP segment has only 8
bytes of overhead
TCP Datagram
TCP Applications
• The following applications use TCP:
• ■ Web browsers
• ■ E-mail
• ■ File transfers
TCP Congestion Control
• TCP provides congestion control through the use of
flow control and dynamic window sizes.
• Flow Control
TCP Congestion Control
• Dynamic Window Sizes

You might also like