SlideShare una empresa de Scribd logo
1 de 39
Instructor Materials
Chapter 10: Application Layer
CCNA Routing and Switching
Introduction to Networks v6.0
3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 10: Application
Layer
Introduction to Networks 6.0 Planning
Guide
Chapter 10: Application Layer
Curriculum Title
Introduction to Networks v6.0
13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 10.1 Application Layer Protocols
• Explain the operation of the application layer in providing support to end-user applications.
• Explain how the functions of the application layer, session layer, and presentation layer work together
to provide network services to end user applications
• Explain how common application layer protocols interact with end user applications.
 10.2 Well-Known Application Protocols and Services
• Explain how well-known TCP/IP application layer protocols operate.
• Explain how web and email protocols operate.
• Explain how DNS and DHCP operate.
• Explain how file transfer protocols operate.
Chapter 10 - Sections & Objectives
14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.1 Application Layer
Protocols
15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Sessio
Application Layer
 Application Layer:
• Closest to the end user.
• Used to exchange data between
programs running on the source
and destination hosts.
16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Session
Presentation and Session Layer
 Presentation Layer function:
• Formatting data at the source
device into a compatible form for
the receiving device.
• Compressing data.
• Encrypting data.
 Session Layer Function
• Create and maintain dialogs
between source and destination
applications.
17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Session
TCP/IP Application Layer Protocols
• Domain Name Server (DNS) TCP,UDP 53 - Translates
domain names, such as cisco.com, into IP addresses.
• (BOOTP) – Bootstrap Protocol - BOOTP is being
superseded by DHCP.
• Dynamic Host Configuration Protocol (DHCP) UDP client
68, server 67 – Dynamically assigns IP addresses to
client stations at start-up.
• Simple Mail Transport Protocol (SMTP) TCP 25 -
Enables clients to send email to a mail server.
• Post Office Protocol (POP) TCP 110 -
Enables clients to retrieve email from a mail
server.
• Internet Message Access Protocol (IMAP)
TCP 143 - Enables clients to retrieve email
from a mail server, maintains email on server.
• File Transfer Protocol (FTP) TCP 20 and 21 -
Reliable, connection-oriented, and
acknowledged file delivery protocol.
• Trivial File Transfer Protocol (TFTP) UDP 69 –
simple connectionless file transfer protocol.
• Hypertext Transfer Protocol (HTTP) TCP 80,
8080 - Set of rules for exchanging text, graphic
images, etc. on the World Wide Web.
• Hypertext Transfer Protocol Secure (HTTPS)
TCP, UDP 443 – Uses encryption and
authentication to secure communication.
18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Client-Server Model
 Client and server processes are
considered to be in the
application layer.
 Application layer protocols
describe the format of the
requests and responses between
clients and servers.
 Example of a client-server
network is using an ISP’s email
service to send, receive and
store email.
19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Peer-to-Peer Networks
 Data is accessed from a peer
device without the use of a
dedicated server.
 Each device (known as a peer)
can function as both a server and
a client.
20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Peer-to-Peer Applications
 A P2P application allows a
device to act as both a client and
a server within the same
communication.
 P2P applications require that
each end device provide a user
interface and run a background
service.
21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Common P2P Applications
 Common P2P networks include:
• G2
• Bitcoin
• BitTorrent
• eDonkey
 Some P2P applications are based on
the Gnutella protocol, where each
user shares whole files with other
users.
 Many P2P applications allow users to
share pieces of many files with each
other at the same time –this is
BitTorrent technology.
22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Researching Peer-to-Peer File Sharing
23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.2 Well-Known Application
Layer Protocols and Services
24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Hypertext Transfer Protocol and Hypertext Markup Language
 When a web address or uniform
resource locator (URL) is typed into a
web browser, the web browser
establishes a connection to the web
service running on the server, using the
HTTP protocol.
25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
HTTP and HTTPS
 HTTP is a request/response protocol.
 Three common HTTP message types
are:
• GET - A client request for data.
• POST - Uploads data files to the web
server.
• PUT - Uploads resources or content to
the web server.
 HTTP Secure (HTTPS) protocol uses
encryption and authentication to
secure data.
26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Email Protocols
 Email clients communicate with mail
servers to send and receive email.
 Mail servers communicate with other
mail servers to transport messages
from one domain to another.
 Three protocols for email:
• Simple Mail Transfer Protocol (SMTP)
to send email.
• Post Office Protocol (POP) to retrieve
email.
• Internet Message Access Protocol
(IMAP) to retrieve email.
27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
SMTP Operation
 SMTP is used to send email
28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
POP Operation
 POP is used to retrieve
email from a mail server.
 Email is downloaded from
the server to the client and
then deleted on the server.
29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
IMAP Operation
 IMAP is used to retrieve
mail from a mail server.
 Copies of messages are
downloaded from the
server to the client and the
original messages are
stored on the server.
30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Packet Tracer – Web and Email
31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Domain Name Service
 Domain names convert the
numeric address into a
simple, recognizable name.
 The DNS protocol defines
an automated service that
matches resource names
with the required numeric
network address.
32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DNS Message Format
 When a client makes a query, the
server’s DNS process first looks at
its own records to resolve the name.
 If unable to resolve, it contacts other
servers to resolve the name.
 The server temporarily stores the
numbered address in the event that
the same name is requested again.
 The ipconfig /displaydns
command displays all of the cached
DNS entries on a Windows PC.
33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DNS Hierarchy
34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
The nslookup Command
 Nslookup - a utility that allows a
user to manually query the name
servers to resolve a given host.
• Can also be used to troubleshoot
name resolution issues and to verify
the current status of the name servers.
35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Dynamic Host Configuration Protocol
 The Dynamic Host Configuration
Protocol (DHCP) for IPv4 automates the
assignment of IPv4 addresses, subnet
masks, gateways, and other parameters.
 DHCP-distributed addresses are leased
for a set period of time, then returned to
pool for reuse.
 DHCP is usually employed for end user
devices. Static addressing is used for
network devices, such as gateways,
switches, servers, and printers.
 DHCPv6 (DHCP for IPv6) provides
similar services for IPv6 clients.
36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DHCP Operation
37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Packet Tracer – DHCP and DNS Servers
38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Lab – Observing DNS Resolution
39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
File Transfer Protocol
 FTP requires two connections between
the client and the server, one for
commands and replies, the other for the
actual file transfer:
• The client establishes the first connection to
the server for control traffic using TCP port
21.
• The client establishes the second
connection to the server for the actual data
transfer using TCP port 20.
40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Server Message Block
 The Server Message Block (SMB) is
a client/server file sharing protocol:
• SMB file-sharing and print services
have become the mainstay of
Microsoft networking.
• Clients establish a long-term
connection to servers and can access
the resources on the server as if the
resource is local to the client host.
41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Packet Tracer - FTP
42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Lab – Exploring FTP
43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.3 Summary
44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Explore a Network
45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Multiuser - Tutorial
46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer Multiuser - Implement Services
47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Chapter 10: Application Layer
 Explain the operation of the application layer in providing support to end-
user applications.
 Explain how well-known TCP/IP application layer protocols operate.
CCNA Routing and Switching Chapter 10 Application Layer

Más contenido relacionado

La actualidad más candente

CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfGomzAriez
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassSagarR24
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptxKISHOYIANKISH
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bullsSwapnil Kapate
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructurePrince Gautam
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Mukesh Chinta
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 

La actualidad más candente (20)

CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdfITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
VTP
VTPVTP
VTP
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
CCNA Product Overview.pptx
CCNA Product Overview.pptxCCNA Product Overview.pptx
CCNA Product Overview.pptx
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 

Similar a CCNA Routing and Switching Chapter 10 Application Layer

Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10newbie2019
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptxGeorgeThoreJr
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)Nitesh Singh
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 

Similar a CCNA Routing and Switching Chapter 10 Application Layer (20)

Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
 
Ch10
Ch10Ch10
Ch10
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptx
 
Chapter 6r
Chapter 6rChapter 6r
Chapter 6r
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 

Más de Irsandi Hasan

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 

Más de Irsandi Hasan (17)

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 

Último

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Último (20)

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

CCNA Routing and Switching Chapter 10 Application Layer

  • 1. Instructor Materials Chapter 10: Application Layer CCNA Routing and Switching Introduction to Networks v6.0
  • 2. 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 10: Application Layer Introduction to Networks 6.0 Planning Guide
  • 3. Chapter 10: Application Layer Curriculum Title Introduction to Networks v6.0
  • 4. 13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  10.1 Application Layer Protocols • Explain the operation of the application layer in providing support to end-user applications. • Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications • Explain how common application layer protocols interact with end user applications.  10.2 Well-Known Application Protocols and Services • Explain how well-known TCP/IP application layer protocols operate. • Explain how web and email protocols operate. • Explain how DNS and DHCP operate. • Explain how file transfer protocols operate. Chapter 10 - Sections & Objectives
  • 5. 14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.1 Application Layer Protocols
  • 6. 15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Sessio Application Layer  Application Layer: • Closest to the end user. • Used to exchange data between programs running on the source and destination hosts.
  • 7. 16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Session Presentation and Session Layer  Presentation Layer function: • Formatting data at the source device into a compatible form for the receiving device. • Compressing data. • Encrypting data.  Session Layer Function • Create and maintain dialogs between source and destination applications.
  • 8. 17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Session TCP/IP Application Layer Protocols • Domain Name Server (DNS) TCP,UDP 53 - Translates domain names, such as cisco.com, into IP addresses. • (BOOTP) – Bootstrap Protocol - BOOTP is being superseded by DHCP. • Dynamic Host Configuration Protocol (DHCP) UDP client 68, server 67 – Dynamically assigns IP addresses to client stations at start-up. • Simple Mail Transport Protocol (SMTP) TCP 25 - Enables clients to send email to a mail server. • Post Office Protocol (POP) TCP 110 - Enables clients to retrieve email from a mail server. • Internet Message Access Protocol (IMAP) TCP 143 - Enables clients to retrieve email from a mail server, maintains email on server. • File Transfer Protocol (FTP) TCP 20 and 21 - Reliable, connection-oriented, and acknowledged file delivery protocol. • Trivial File Transfer Protocol (TFTP) UDP 69 – simple connectionless file transfer protocol. • Hypertext Transfer Protocol (HTTP) TCP 80, 8080 - Set of rules for exchanging text, graphic images, etc. on the World Wide Web. • Hypertext Transfer Protocol Secure (HTTPS) TCP, UDP 443 – Uses encryption and authentication to secure communication.
  • 9. 18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Client-Server Model  Client and server processes are considered to be in the application layer.  Application layer protocols describe the format of the requests and responses between clients and servers.  Example of a client-server network is using an ISP’s email service to send, receive and store email.
  • 10. 19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Peer-to-Peer Networks  Data is accessed from a peer device without the use of a dedicated server.  Each device (known as a peer) can function as both a server and a client.
  • 11. 20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Peer-to-Peer Applications  A P2P application allows a device to act as both a client and a server within the same communication.  P2P applications require that each end device provide a user interface and run a background service.
  • 12. 21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Common P2P Applications  Common P2P networks include: • G2 • Bitcoin • BitTorrent • eDonkey  Some P2P applications are based on the Gnutella protocol, where each user shares whole files with other users.  Many P2P applications allow users to share pieces of many files with each other at the same time –this is BitTorrent technology.
  • 13. 22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Researching Peer-to-Peer File Sharing
  • 14. 23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.2 Well-Known Application Layer Protocols and Services
  • 15. 24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Hypertext Transfer Protocol and Hypertext Markup Language  When a web address or uniform resource locator (URL) is typed into a web browser, the web browser establishes a connection to the web service running on the server, using the HTTP protocol.
  • 16. 25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols HTTP and HTTPS  HTTP is a request/response protocol.  Three common HTTP message types are: • GET - A client request for data. • POST - Uploads data files to the web server. • PUT - Uploads resources or content to the web server.  HTTP Secure (HTTPS) protocol uses encryption and authentication to secure data.
  • 17. 26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Email Protocols  Email clients communicate with mail servers to send and receive email.  Mail servers communicate with other mail servers to transport messages from one domain to another.  Three protocols for email: • Simple Mail Transfer Protocol (SMTP) to send email. • Post Office Protocol (POP) to retrieve email. • Internet Message Access Protocol (IMAP) to retrieve email.
  • 18. 27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols SMTP Operation  SMTP is used to send email
  • 19. 28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols POP Operation  POP is used to retrieve email from a mail server.  Email is downloaded from the server to the client and then deleted on the server.
  • 20. 29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols IMAP Operation  IMAP is used to retrieve mail from a mail server.  Copies of messages are downloaded from the server to the client and the original messages are stored on the server.
  • 21. 30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Packet Tracer – Web and Email
  • 22. 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Domain Name Service  Domain names convert the numeric address into a simple, recognizable name.  The DNS protocol defines an automated service that matches resource names with the required numeric network address.
  • 23. 32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DNS Message Format  When a client makes a query, the server’s DNS process first looks at its own records to resolve the name.  If unable to resolve, it contacts other servers to resolve the name.  The server temporarily stores the numbered address in the event that the same name is requested again.  The ipconfig /displaydns command displays all of the cached DNS entries on a Windows PC.
  • 24. 33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DNS Hierarchy
  • 25. 34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services The nslookup Command  Nslookup - a utility that allows a user to manually query the name servers to resolve a given host. • Can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.
  • 26. 35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Dynamic Host Configuration Protocol  The Dynamic Host Configuration Protocol (DHCP) for IPv4 automates the assignment of IPv4 addresses, subnet masks, gateways, and other parameters.  DHCP-distributed addresses are leased for a set period of time, then returned to pool for reuse.  DHCP is usually employed for end user devices. Static addressing is used for network devices, such as gateways, switches, servers, and printers.  DHCPv6 (DHCP for IPv6) provides similar services for IPv6 clients.
  • 27. 36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DHCP Operation
  • 28. 37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Packet Tracer – DHCP and DNS Servers
  • 29. 38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Lab – Observing DNS Resolution
  • 30. 39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services File Transfer Protocol  FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer: • The client establishes the first connection to the server for control traffic using TCP port 21. • The client establishes the second connection to the server for the actual data transfer using TCP port 20.
  • 31. 40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Server Message Block  The Server Message Block (SMB) is a client/server file sharing protocol: • SMB file-sharing and print services have become the mainstay of Microsoft networking. • Clients establish a long-term connection to servers and can access the resources on the server as if the resource is local to the client host.
  • 32. 41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Packet Tracer - FTP
  • 33. 42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Lab – Exploring FTP
  • 34. 43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.3 Summary
  • 35. 44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Explore a Network
  • 36. 45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Multiuser - Tutorial
  • 37. 46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer Multiuser - Implement Services
  • 38. 47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Chapter 10: Application Layer  Explain the operation of the application layer in providing support to end- user applications.  Explain how well-known TCP/IP application layer protocols operate.