SlideShare a Scribd company logo
Chapter 2
Application Layer
Computer Networking:
A Top Down Approach,
5th
edition.
Jim Kurose, Keith Ross
Addison-Wesley, April
2009.
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you can add, modify, and delete slides
(including this one) and slide content to suit your needs. They obviously
represent a lot of work on our part. In return for use, we only ask the
following:
 If you use these slides (e.g., in a class) in substantially unaltered form,
that you mention their source (after all, we’d like people to use our book!)
 If you post any slides in substantially unaltered form on a www site, that
you note that they are adapted from (or perhaps identical to) our slides, and
note our copyright of this material.
Thanks and enjoy! JFK/KWR
All material copyright 1996-2010
J.F Kurose and K.W. Ross, All Rights Reserved
Application 2-1
Chapter 2: Application Layer
Our goals:
 conceptual,
implementation
aspects of network
application protocols
 transport-layer
service models
 client-server
paradigm
 peer-to-peer
paradigm
 learn about protocols
by examining popular
application-level
protocols
 HTTP
 FTP
 SMTP / POP3 / IMAP
 DNS
 programming network
applications
 socket API
Application 2-3
Some network apps
 e-mail
 web
 instant messaging
 remote login
 P2P file sharing
 multi-user network
games
 streaming stored video
(YouTube)
 voice over IP
 real-time video
conferencing
 cloud computing
 …
 …

Application 2-4
Creating a network app
write programs that
 run on (different) end
systems
 communicate over network
 e.g., web server software
communicates with
browser software
No need to write software
for network-core devices
 network-core devices do
not run user applications
 applications on end systems
allows for rapid app
development, propagation
application
transport
network
data link
physical
application
transport
network
data link
physical
application
transport
network
data link
physical
Application 2-5
Chapter 2: Application layer
2.1 Principles of network
applications
2.2 Web and HTTP
2.3 FTP
2.4 Electronic Mail
SMTP, POP3, IMAP
2.5 DNS
2.6 P2P applications
2.7 Socket programming
with TCP
2.8 Socket programming
with UDP
Application 2-6
Application architectures
 client-server
 peer-to-peer (P2P)
 hybrid of client-server and P2P
Application 2-7
Client-server architecture
server:
 always-on host
 permanent IP address
 server farms for scaling
clients:
 communicate with server
 may be intermittently
connected
 may have dynamic IP
addresses
 do not communicate directly
with each other
client/server
Application 2-8
Pure P2P architecture
 no always-on server
 arbitrary end systems
directly communicate
 peers are intermittently
connected and change IP
addresses
highly scalable but
difficult to manage
peer-peer
Application 2-9
Hybrid of client-server and P2P
Skype
 voice-over-IP P2P application
 centralized server: finding address of remote
party:
 client-client connection: direct (not through
server)
Instant messaging
 chatting between two users is P2P
 centralized service: client presence
detection/location
• user registers its IP address with central
server when it comes online
• user contacts central server to find IP
addresses of buddies
Application 2-10
Processes communicating
process: program running
within a host.
 within same host, two
processes communicate
using inter-process
communication (defined
by OS).
 processes in different
hosts communicate by
exchanging messages
client process: process
that initiates
communication
server process: process
that waits to be
contacted
 aside: applications with
P2P architectures have
client processes &
server processes
Application 2-11
Sockets
 process sends/receives
messages to/from its
socket
 socket analogous to door
 sending process shoves
message out door
 sending process relies on
transport infrastructure
on other side of door which
brings message to socket
at receiving process
process
TCP with
buffers,
variables
socket
host or
server
process
TCP with
buffers,
variables
socket
host or
server
Internet
controlled
by OS
controlled by
app developer
 API: (1) choice of transport protocol; (2) ability to fix
a few parameters (lots more on this later)
Application 2-12
Addressing processes
 to receive messages,
process must have
identifier
 host device has unique
32-bit IP address
 Q: does IP address of
host on which process
runs suffice for
identifying the process?
Application 2-13
Addressing processes
 to receive messages,
process must have
identifier
 host device has unique
32-bit IP address
 Q: does IP address of
host on which process
runs suffice for
identifying the process?
 A: No, many
processes can be
running on same host
 identifier includes both
IP address and port
numbers associated with
process on host.
 example port numbers:
 HTTP server: 80
 Mail server: 25
 to send HTTP message
to gaia.cs.umass.edu web
server:
 IP address: 128.119.245.12
 Port number: 80
 more shortly…
Application 2-14
App-layer protocol defines
 types of messages
exchanged,
 e.g., request, response
 message syntax:
 what fields in messages &
how fields are delineated
 message semantics
 meaning of information in
fields
 rules for when and how
processes send &
respond to messages
public-domain protocols:
 defined in RFCs
 allows for
interoperability
 e.g., HTTP, SMTP
proprietary protocols:
 e.g., Skype
Application 2-15
What transport service does an app need?
Data loss
 some apps (e.g., audio) can
tolerate some loss
 other apps (e.g., file
transfer, telnet) require
100% reliable data
transfer
Timing
 some apps (e.g.,
Internet telephony,
interactive games)
require low delay to be
“effective”
Throughput
 some apps (e.g.,
multimedia) require
minimum amount of
throughput to be
“effective”
 other apps (“elastic apps”)
make use of whatever
throughput they get
Security
 encryption, data integrity,
…
Application 2-16
Transport service requirements of common apps
Application
file transfer
e-mail
Web documents
real-time audio/video
stored audio/video
interactive games
instant messaging
Data loss
no loss
no loss
no loss
loss-tolerant
loss-tolerant
loss-tolerant
no loss
Throughput
elastic
elastic
elastic
audio: 5kbps-1Mbps
video:10kbps-5Mbps
same as above
few kbps up
elastic
Time Sensitive
no
no
no
yes, 100’s msec
yes, few secs
yes, 100’s msec
yes and no
Application 2-17
Internet transport protocols services
TCP service:
 connection-oriented: setup
required between client and
server processes
 reliable transport between
sending and receiving process
 flow control: sender won’t
overwhelm receiver
 congestion control: throttle
sender when network
overloaded
 does not provide: timing,
minimum throughput
guarantees, security
UDP service:
 unreliable data transfer
between sending and
receiving process
 does not provide:
connection setup,
reliability, flow control,
congestion control, timing,
throughput guarantee, or
security
Q: why bother? Why is
there a UDP?
Application 2-18
Internet apps: application, transport protocols
Application
e-mail
remote terminal access
Web
file transfer
streaming multimedia
Internet telephony
Application
layer protocol
SMTP [RFC 2821]
Telnet [RFC 854]
HTTP [RFC 2616]
FTP [RFC 959]
HTTP (e.g., YouTube),
RTP [RFC 1889]
SIP, RTP, proprietary
(e.g., Skype)
Underlying
transport protocol
TCP
TCP
TCP
TCP
TCP or UDP
typically UDP
Application 2-19

More Related Content

PPT
Lecture-2012-2-Application Layer-Introduction.ppt
PPT
Chapter 2 v6.3
PPT
Chapter_2_V6.1._C__hapter_2_V6.1____.ppt
PPT
applicationapplicationapplicationapplication.ppt
PPT
principles of network applications 2.2 Web and HTTP 2.3 electronic mail SMTP,...
PPT
Chapter 2 Application Layer Computer Networks
PPTX
Chapter_2_v8.1.pptx
PPTX
Chapter_2 Computer Networks Basics....pptx
Lecture-2012-2-Application Layer-Introduction.ppt
Chapter 2 v6.3
Chapter_2_V6.1._C__hapter_2_V6.1____.ppt
applicationapplicationapplicationapplication.ppt
principles of network applications 2.2 Web and HTTP 2.3 electronic mail SMTP,...
Chapter 2 Application Layer Computer Networks
Chapter_2_v8.1.pptx
Chapter_2 Computer Networks Basics....pptx

Similar to Application Layer-Introduction - detail Things are included (20)

PPT
Chapter_2 computer netwprks mod 2 enclosed
PPTX
Chapter_2_v8.3.pptx
PPT
Chapter 2 - Computer Networking a top-down Approach 7th
PPTX
Computer network network edge and network
PPT
Chapter2_L2.ppt
PPT
Hasanain_Application Layer_Chapter_2_Version 7.1.ppt
PDF
20CS2008 Computer Networks
PPT
Chapter_2_V7.01.ppt The client sends one request message for the HTML file, a...
PPTX
Ci hy Jo is type ki videos edit krei Inbox kro mujhe with similar portfolio ...
PDF
Application Layer Application Layer Application Layer
PPTX
CS3001_Computer_Networks_Chapter_2_v8.1(1).pptx
PPTX
kkkkkkkkkkkkkkkkkkkmkm,kll;kl;l;l;l;lll;l;l;;;
PPTX
02_Chapter_2_V6_LV.pptx
PPTX
6. Chapter_2_1_newversion1.pptxasasasdasdasda
PPTX
CS3001_Computer_Networks_Chapter_2_v8.1.pptx
PPT
Chapter2 l2 modified_um
PPTX
Computer Network presentation chapter two
PPT
Application Layer.pptand documents of co
PPT
Chapter2 Application
PPTX
Chapter_2 jaringan komputer informatika.pptx
Chapter_2 computer netwprks mod 2 enclosed
Chapter_2_v8.3.pptx
Chapter 2 - Computer Networking a top-down Approach 7th
Computer network network edge and network
Chapter2_L2.ppt
Hasanain_Application Layer_Chapter_2_Version 7.1.ppt
20CS2008 Computer Networks
Chapter_2_V7.01.ppt The client sends one request message for the HTML file, a...
Ci hy Jo is type ki videos edit krei Inbox kro mujhe with similar portfolio ...
Application Layer Application Layer Application Layer
CS3001_Computer_Networks_Chapter_2_v8.1(1).pptx
kkkkkkkkkkkkkkkkkkkmkm,kll;kl;l;l;l;lll;l;l;;;
02_Chapter_2_V6_LV.pptx
6. Chapter_2_1_newversion1.pptxasasasdasdasda
CS3001_Computer_Networks_Chapter_2_v8.1.pptx
Chapter2 l2 modified_um
Computer Network presentation chapter two
Application Layer.pptand documents of co
Chapter2 Application
Chapter_2 jaringan komputer informatika.pptx
Ad

More from ssuserd24233 (16)

PPT
Computer Networks Quqlity of Service ppt
PPTX
Transport layer in OSI Layers in detail.pptx
PPT
wireless communication - Voice over IP used for ALL
PPTX
AI Unit-5 Image Processing for all ML problems
PPTX
final review ppt of engineering hypothetic arm
PPTX
privacy and security in online social media useful for NPTEL
PPT
Distributed Systems useful entire network related things
PPT
Distributed systems - Introduction to all .ppt
PPT
Cloud Computing - Introduction all concepts.ppt
PPT
osi laopen system interconnect power point presentation
PPT
introduction to networking powerpoint presenytation
PPTX
sajid educational acutatation ppt useful for all
PPT
Test Design Techniques - skill oriented course.ppt
PPT
software Testing - Skill Oriented Course .ppt
PPT
KBA, Wumpus world.ppt
PPTX
Network security model.pptx
Computer Networks Quqlity of Service ppt
Transport layer in OSI Layers in detail.pptx
wireless communication - Voice over IP used for ALL
AI Unit-5 Image Processing for all ML problems
final review ppt of engineering hypothetic arm
privacy and security in online social media useful for NPTEL
Distributed Systems useful entire network related things
Distributed systems - Introduction to all .ppt
Cloud Computing - Introduction all concepts.ppt
osi laopen system interconnect power point presentation
introduction to networking powerpoint presenytation
sajid educational acutatation ppt useful for all
Test Design Techniques - skill oriented course.ppt
software Testing - Skill Oriented Course .ppt
KBA, Wumpus world.ppt
Network security model.pptx
Ad

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Institutional Correction lecture only . . .
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharma ospi slides which help in ospi learning
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Insiders guide to clinical Medicine.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
Module 4: Burden of Disease Tutorial Slides S2 2025
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
STATICS OF THE RIGID BODIES Hibbelers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
PPH.pptx obstetrics and gynecology in nursing
human mycosis Human fungal infections are called human mycosis..pptx
Cell Structure & Organelles in detailed.
Final Presentation General Medicine 03-08-2024.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
GDM (1) (1).pptx small presentation for students
Institutional Correction lecture only . . .
Basic Mud Logging Guide for educational purpose
Pharma ospi slides which help in ospi learning
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Insiders guide to clinical Medicine.pdf

Application Layer-Introduction - detail Things are included

  • 1. Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) in substantially unaltered form, that you mention their source (after all, we’d like people to use our book!)  If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2010 J.F Kurose and K.W. Ross, All Rights Reserved Application 2-1
  • 2. Chapter 2: Application Layer Our goals:  conceptual, implementation aspects of network application protocols  transport-layer service models  client-server paradigm  peer-to-peer paradigm  learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  DNS  programming network applications  socket API Application 2-3
  • 3. Some network apps  e-mail  web  instant messaging  remote login  P2P file sharing  multi-user network games  streaming stored video (YouTube)  voice over IP  real-time video conferencing  cloud computing  …  …  Application 2-4
  • 4. Creating a network app write programs that  run on (different) end systems  communicate over network  e.g., web server software communicates with browser software No need to write software for network-core devices  network-core devices do not run user applications  applications on end systems allows for rapid app development, propagation application transport network data link physical application transport network data link physical application transport network data link physical Application 2-5
  • 5. Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket programming with UDP Application 2-6
  • 6. Application architectures  client-server  peer-to-peer (P2P)  hybrid of client-server and P2P Application 2-7
  • 7. Client-server architecture server:  always-on host  permanent IP address  server farms for scaling clients:  communicate with server  may be intermittently connected  may have dynamic IP addresses  do not communicate directly with each other client/server Application 2-8
  • 8. Pure P2P architecture  no always-on server  arbitrary end systems directly communicate  peers are intermittently connected and change IP addresses highly scalable but difficult to manage peer-peer Application 2-9
  • 9. Hybrid of client-server and P2P Skype  voice-over-IP P2P application  centralized server: finding address of remote party:  client-client connection: direct (not through server) Instant messaging  chatting between two users is P2P  centralized service: client presence detection/location • user registers its IP address with central server when it comes online • user contacts central server to find IP addresses of buddies Application 2-10
  • 10. Processes communicating process: program running within a host.  within same host, two processes communicate using inter-process communication (defined by OS).  processes in different hosts communicate by exchanging messages client process: process that initiates communication server process: process that waits to be contacted  aside: applications with P2P architectures have client processes & server processes Application 2-11
  • 11. Sockets  process sends/receives messages to/from its socket  socket analogous to door  sending process shoves message out door  sending process relies on transport infrastructure on other side of door which brings message to socket at receiving process process TCP with buffers, variables socket host or server process TCP with buffers, variables socket host or server Internet controlled by OS controlled by app developer  API: (1) choice of transport protocol; (2) ability to fix a few parameters (lots more on this later) Application 2-12
  • 12. Addressing processes  to receive messages, process must have identifier  host device has unique 32-bit IP address  Q: does IP address of host on which process runs suffice for identifying the process? Application 2-13
  • 13. Addressing processes  to receive messages, process must have identifier  host device has unique 32-bit IP address  Q: does IP address of host on which process runs suffice for identifying the process?  A: No, many processes can be running on same host  identifier includes both IP address and port numbers associated with process on host.  example port numbers:  HTTP server: 80  Mail server: 25  to send HTTP message to gaia.cs.umass.edu web server:  IP address: 128.119.245.12  Port number: 80  more shortly… Application 2-14
  • 14. App-layer protocol defines  types of messages exchanged,  e.g., request, response  message syntax:  what fields in messages & how fields are delineated  message semantics  meaning of information in fields  rules for when and how processes send & respond to messages public-domain protocols:  defined in RFCs  allows for interoperability  e.g., HTTP, SMTP proprietary protocols:  e.g., Skype Application 2-15
  • 15. What transport service does an app need? Data loss  some apps (e.g., audio) can tolerate some loss  other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing  some apps (e.g., Internet telephony, interactive games) require low delay to be “effective” Throughput  some apps (e.g., multimedia) require minimum amount of throughput to be “effective”  other apps (“elastic apps”) make use of whatever throughput they get Security  encryption, data integrity, … Application 2-16
  • 16. Transport service requirements of common apps Application file transfer e-mail Web documents real-time audio/video stored audio/video interactive games instant messaging Data loss no loss no loss no loss loss-tolerant loss-tolerant loss-tolerant no loss Throughput elastic elastic elastic audio: 5kbps-1Mbps video:10kbps-5Mbps same as above few kbps up elastic Time Sensitive no no no yes, 100’s msec yes, few secs yes, 100’s msec yes and no Application 2-17
  • 17. Internet transport protocols services TCP service:  connection-oriented: setup required between client and server processes  reliable transport between sending and receiving process  flow control: sender won’t overwhelm receiver  congestion control: throttle sender when network overloaded  does not provide: timing, minimum throughput guarantees, security UDP service:  unreliable data transfer between sending and receiving process  does not provide: connection setup, reliability, flow control, congestion control, timing, throughput guarantee, or security Q: why bother? Why is there a UDP? Application 2-18
  • 18. Internet apps: application, transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony Application layer protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] HTTP (e.g., YouTube), RTP [RFC 1889] SIP, RTP, proprietary (e.g., Skype) Underlying transport protocol TCP TCP TCP TCP TCP or UDP typically UDP Application 2-19

Editor's Notes

  • #11: Inter-process communication (IPC) is a set of methods for the exchange of data among multiple threads in one or more processes