Please enable JavaScript.
Coggle requires JavaScript to display documents.
REDES - Coggle Diagram
REDES
Application Layer
it is the layer that provides the interface between the applications used to communicate and the underlying network over which messages are transmitted.
Application layer protocols are used to exchange data between programs running on the source and destination hosts.
The upper three layers of the OSI model (application, presentation, and session) define functions of the single TCP/IP application layer.
Some of the most widely known application layer protocols include Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), Internet Message Access Protocol (IMAP), and Domain Name System (DNS) protocol.
-
-
Client-Server Model
In the client-server model, the device requesting the information is called a client and the device responding to the request is called a server.
Application layer protocols describe the format of the requests and responses between clients and servers.
n addition to the actual data transfer, this exchange may also require user authentication and the identification of a data file to be transferred.
One example of a client-server network is using an ISP’s email service to send, receive and store email.
-
Peer-to-Peer Networks
In the peer-to-peer (P2P) networking model, the data is accessed from a peer device without the use of a dedicated server.
-
-
Common P2P Applications
With P2P applications, each computer in the network running the application can act as a client or a server for the other computers in the network running the application.
Some P2P applications are based on the Gnutella protocol, where each user shares whole files with other users.
-
-
-
-
Many P2P applications allow users to share pieces of many files with each other at the same time. Clients use a small file called a torrent file to locate other users who have pieces that they need so that they can connect directly to them
This technology is called BitTorrent. There are many BitTorrent clients including BitTorrent, uTorrent, Frostwire, and qBittorrent.
This file also contains information about tracker computers that keep track of which users have what files. Clients ask for pieces from multiple users at the same time, known as a swarm.
-
HTTP and HTTPS
HTTP is a request/response protocol. When a client, typically a web browser, sends a request to a web server, HTTP specifies the message types used for that communication.
GET - A client request for data. A client (web browser) sends the GET message to the web server to request HTML pages.
-
-
-
Email Protocols
One of the primary services offered by an ISP is email hosting. To run on a computer or other end device, email requires several applications and services,
Email is a store-and-forward method of sending, storing, and retrieving electronic messages across a network.
-
-
SMTP Operation
While the message body can contain any amount of text, the message header must have a properly formatted recipient email address and a sender address.
When a client sends email, the client SMTP process connects with a server SMTP process on well-known port 25.
After the connection is made, the client attempts to send the email to the server across the connection.
When the server receives the message, it either places the message in a local account, if the recipient is local, or forwards the message to another mail server for delivery,
-
POP Operation
With POP, mail is downloaded from the server to the client and then deleted on the server. This is how POP operates, by default.
When a client wants to make use of the service, it sends a request to establish a TCP connection with the server.
When the connection is established, the POP server sends a greeting.
The client and POP server then exchange commands and responses until the connection is closed or aborted.
With POP, email messages are downloaded to the client and removed from the server, so there is no centralized location where email messages are kept.
Because POP does not store messages, it is undesirable for a small business that needs a centralized backup solution
-
-
DNS Hierarchy
The hierarchy looks like an inverted tree with the root at the top and branches below (see the figure). DNS uses domain names to form the hierarchy.
The naming structure is broken down into small, manageable zones.
-
Each DNS server maintains a specific database file and is only responsible for managing name-to-IP mappings for that small portion of the entire DNS structure.
When a DNS server receives a request for a name translation that is not within its DNS zone, the DNS server forwards the request to another DNS server within the proper zone for translation.
The nslookup Command
When configuring a network device, one or more DNS Server addresses are provided that the DNS client can use for name resolution
-
When a user’s application requests to connect to a remote device by name, the requesting DNS client queries the name server to resolve the name to a numeric address.
The nslookup utility has many options available for extensive testing and verification of the DNS process.
Computer operating systems also have a utility called nslookup that allows the user to manually query the name servers to resolve a given host name.
This utility can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.