0% found this document useful (0 votes)
85 views14 pages

10a Network Applications

This document discusses network applications and provides an overview of common Internet application protocols. It begins by listing some popular web applications like Facebook, Google Docs, and YouTube. It then explains the client-server model that is generally used by Internet applications, with servers providing services and clients accessing those services. The document outlines the application layer in the Internet protocol stack and describes how applications communicate directly with the transport layer. It provides examples of common application layer protocols for email, file transfer, DNS, web, remote access, graphics, and network management. The client-server operation and typical protocol format of request-response exchanges in ASCII text are also summarized.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views14 pages

10a Network Applications

This document discusses network applications and provides an overview of common Internet application protocols. It begins by listing some popular web applications like Facebook, Google Docs, and YouTube. It then explains the client-server model that is generally used by Internet applications, with servers providing services and clients accessing those services. The document outlines the application layer in the Internet protocol stack and describes how applications communicate directly with the transport layer. It provides examples of common application layer protocols for email, file transfer, DNS, web, remote access, graphics, and network management. The client-server operation and typical protocol format of request-response exchanges in ASCII text are also summarized.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Network Applications

Gihan Dias
CS2032

2010S3 - 2011/12

Network Applications

World-Wide Web
Facebook Googledocs YouTube Games

Skype, videoconferencing BitTorrent Remote Files Remote Desktop

Why Internet Applications?

Without applications, Internet (or any other network) would be useless

App. Layer in Internet Stack


Internet Application 7 4 3 Application Transport

Network
Data Link

2
1

Physical

Internet Applications Layer Model

Application talks directly to the transport layer (TCP or UDP) Application Layer defined as a protocol
both sides must implement the protocol

APIs usually not defined by IETF Third-party APIs available


C, Java, VB, XML, etc. Generally use the client-server model

Client-Server Model

Some Internet hosts provide a service (servers)


web server POP server SIP server
Im listening... Someone connect to me

Other hosts (clients) use these services Typically, servers listen on a given port
waiting for some client to connect

Client-server operation (cont.)

Servers should be always on


generally sit in a data centre or on the cloud

Clients are often user machines


PCs, phones, mobile devices, sometimes other servers

Common Internet App. Protocols

E-mail
Simple Mail Transfer Protocol SMTP Post Office Protocol (V3) POP Interactive Mail Access Protocol IMAP

File Transfer
File Transfer Protocol BitTorrent FTP

Domain Name Service

DNS

Common Protocols (cont.)

Web
HyperText Transfer Protocol HTTP

Remote Login
Telnet rlogin Secure Shell

SSH

Common Protocols (Cont.)

Remote graphics
X Window System Microsoft Remote Desktop VNC

Remote File Systems


Sun Network File System SMB / CIFS NFS

Network Management
Simple Network Management Protocol

Common Protocols (cont.)

Voice and Teleconferencing


Session Initiation Protocol H.323 SIP

many others...

Protocol Format
Many protocols have a similar format Client - Server Command / Response
text commands numeric responses

Half duplex data exchange


why?

Protocol Format (cont.)

ASCII text commands and responses

>> MAIL From:<gihan@mail.mrt.ac.lk> SIZE=54 << 250 2.1.0 <gihan@mail.mrt.ac.lk>... Sender ok >> RCPT To:<gihan@cse.mrt.ac.lk> << 250 2.1.5 <gihan@cse.mrt.ac.lk>... Recipient ok

why?

End

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy