• Sonuç bulunamadı

(PART 1) Chapter 2: Application Layer 55490005

N/A
N/A
Protected

Academic year: 2021

Share "(PART 1) Chapter 2: Application Layer 55490005"

Copied!
15
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

1

Computer Networking: A Top Down Approach 6th Edition

Jim Kurose, Keith Ross

(2)
(3)

application protocols

Transport layer service models

Client-server paradigm

Peer-to-peer paradigm

(4)

E-mail

Web

Text messaging

Remote login

P2P file sharing

Network games

Streaming stored video

Voice over IP

Social networking

Search

(5)

Network apps run on end systems

They communicate over the network

Web server software communicates with browser software

When you create a network apps you do not need to write software for network core

devices

Applications are not run on network core devices

Rapid application development

(6)

Client-Server

Peer-to-Peer (P2P)

(7)

Server

Servers have permanent IP addresses

They are always-on host.

Clients

They communicate with server.

They may have dynamic IP addresses

They do not communicate directly with each

other.

(8)

No always on server

End systems directly communicate with each other

Peers requset service from other peers.

Peers provide service in return to other peers

Peers may change IP addresses

Complex management

Self scalability: New peers bring new

service capacity and new service requests.

(9)

The programs that is running within a host is called as process.

Inter-process communication: The

communicaiton between two processes within the same host.

Processes in different hosts communicate

by exchanging messages

(10)

Client process: Process that initiates communication

Server process: Process that waits to be contacted.

Sockets

Process sends/receives messages to/from its

socket.

(11)

To receive messages process must have identifier

Identifier includes both IP address and port numbers

Example port numbers:

HTTP Server: 80

Mail Server: 25

(12)

Type of messages

Message syntax

Message semantics

Rules

Open protocols:

Defined in RFCs, HTTP, SMTP

Proprietary protocols:

Skype

(13)

needs

Data integrity

Timing

Throughput

Security

(14)

TCP Service

Reliable transport

Flow control

Congestion control

Does not provide timing, minimum throughput, security

Connection-oriented

(15)

UDP Service

Unreliable data transfer

Does not provide reliability, flow control, congestion control, timing,

throughputguarantee, security or connection

setup

Referanslar

Benzer Belgeler

network core, each packet is forwarded from one router to the next one based on the path (packet switching).  The full link capacity is used for individual

 If there are no free buffers, packets dropped (loss) and need to be resend using reliable data transfer protocols.... Cars propagates at

 Multiple objects can be sent over single TCP connection between client server.. Web

 Reliable data transfer is important in applicaiton, transport and link layers.  The complexity of reliable data transfer protocol is related to the characteristics of

 If sender receives 3 ACKs for same data, resend unacked segment with smallest sequence number..  TCP flow control.  Receiver controls sender so sender will not

 Datagram networks provides network- layer connectionless service.  Virtual-circuit network provides network- layer

 Replace (source IP address port #) of every outgoing datagram to (NAT IP address, new port #).  Remember every (source IP address port #) to (NAT IP address, new port

 Collision if one of the nodes gets two or more signals at the same time.  Multiple