Chapter - 10
Chapter - 10
MODULE – 1
1
10.0 Introduction
10.1 Application Layer Protocols
10.2 Well-Known Application Layer
Protocols and Services
10.3 Summary
Upon completion of this section, you should be able to:
•Explain how the functions of the application layer, session layer, and presentation layer
work together to provide network services to end user applications.
•Explain how common application layer protocols interact with end user applications.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Application Layer
• The application layer is closest to the end user.
• Network applications enable users to send and receive data with ease.
• The application layer acts as interface between the applications and the
underlying network.
• Application layer protocols help
exchange data between programs
running on the source and
destination hosts.
• The TCP/IP application layer
performs the functions of the upper
three layers of the OSI model.
• Common application layer protocols
include: HTTP, FTP, TFTP, DNS.
Presentation and Session Layer
• The presentation layer has three primary functions:
o Format data
o Compress data
o Encrypt data
• Common standards for video include QuickTime and Motion Picture Experts
Group (MPEG).
• Common graphic image formats are:
• Graphics Interchange Format (GIF)
• Joint Photographic Experts Group (JPEG)
• Portable Network Graphics (PNG) format
Presentation and Session Layer (cont.)
• The session layer creates and maintains dialogs between source and
destination applications.
• The session layer handles the exchange of information to initiate dialogs, keep
them active, and to restart sessions that are disrupted or idle for a long period
of time.
TCP/IP Application Layer Protocols
• TCP/IP application protocols specify the format and control information
necessary for common Internet functions.
• Application layer protocols must be implemented in both the source and
destination devices.
• Application layer protocols implemented on the source and destination host
must be compatible to allow communication.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Client-Server Model
• The device requesting the information is called a client.
• The device responding to the request is called a server.
• Client and server processes are considered to be in the application layer.
• The client initiates the exchange by requesting data from the server.
• The server responds by sending one
or more streams of data to the client.
• Application layer protocols describe
the format of the requests and
responses between clients and
servers.
• The contents of the data exchange
will depend of the application in use.
• Email is an example of a
Client-Server interaction.
Peer-to-Peer Networks
• In the peer-to-peer (P2P) networking model, the data is accessed without the
use of a dedicated server.
• Two or more computers can be connected to a P2P network to share
resources.
• Every connected end device (a peer) can function as both a server and a
client.
• The roles of client and
server are set on a per
request basis.
Peer-to-Peer Applications
• Some P2P applications use a hybrid system.
• In hybrid P2P, resource sharing is decentralized.
• Indexes that point to resource locations are stored in a centralized directory.
• In a hybrid system, each
peer accesses an index
server to get the location
of a resource stored on
another peer.
Common P2P Applications
• Common P2P networks include: eDonkey, G2, BitTorrent, Bitcoin.
• Many P2P applications allow users to share pieces of many files with each
other at the same time.
• A small torrent file contains information about the location of other users and
tracker computers.
• Trackers are computers keeping
track of the files hosted by users.
• This technology is called BitTorrent.
• There are many BitTorrent clients,
including BitTorrent, uTorrent,
Frostwire, and qBittorrent.
Upon completion of this section, you should be able to:
•Explain how web and email protocols operate.