computer networking
DESCRIPTION
this is my class presentation on networksTRANSCRIPT
![Page 1: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/1.jpg)
Application Layer 2-1
Chapter 2: Application Layerour goals: conceptual,
implementation aspects of network application protocols transport-layer
service models client-server
paradigm peer-to-peer
paradigm
learn about protocols by examining popular application-level protocols HTTP SMTP / POP3 / IMAP
creating network applications socket API
![Page 2: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/2.jpg)
Application Layer 2-2
Chapter 2: outline
2.1 principles of network applications
2.2 Web and HTTP2.3 FTP 2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
2.6 P2P applications2.7 socket
programming with UDP and TCP
![Page 3: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/3.jpg)
Application Layer 2-3
Creating a network appwrite programs that: run on (different) end
systems communicate over
network e.g., web server software
communicates with browser software
no need to write software for network-core devices
network-core devices do not run user applications
applications on end systems allows for rapid app development, propagation
applicationtransportnetworkdata linkphysical
applicationtransportnetworkdata linkphysical
applicationtransportnetworkdata linkphysical
![Page 4: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/4.jpg)
Application Layer 2-4
Application architectures
possible structure of applications: client-server peer-to-peer (P2P)
![Page 5: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/5.jpg)
Application Layer 2-5
Client-server architecture
server: always-on host permanent IP address data centers for scaling
clients: communicate with server may be intermittently
connected may have dynamic IP
addresses do not communicate
directly with each other
client/server
![Page 6: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/6.jpg)
Application Layer 2-6
P2P architecture no always-on server arbitrary end systems
directly communicate peers request service
from other peers, provide service in return to other peers self scalability – new
peers bring new service capacity, as well as new service demands
peers are intermittently connected and change IP addresses complex
management
peer-peer
![Page 7: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/7.jpg)
Application Layer 2-7
Processes communicating
process: program running within a host
within same host, two processes communicate using inter-process communication (defined by OS)
processes in different hosts communicate by exchanging messages
client process: process that initiates communication
server process: process that waits to be contacted
aside: applications with P2P architectures have client processes & server processes
clients, servers
![Page 8: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/8.jpg)
Application Layer 2-8
Sockets process sends/receives messages to/from its socket socket analogous to door
sending process shoves message out door sending process relies on transport infrastructure
on other side of door to deliver message to socket at receiving process
Internet
controlledby OS
controlled byapp developer
transport
application
physical
link
network
process
transport
application
physical
link
network
processsocket
![Page 9: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/9.jpg)
Application Layer 2-9
Addressing processes
to receive messages, process must have identifier
host device has unique 32-bit IP address
Q: does IP address of host on which process runs suffice for identifying the process?
identifier includes both IP address and port numbers associated with process on host.
example port numbers: HTTP server: 80 mail server: 25
to send HTTP message to gaia.cs.umass.edu web server: IP address:
128.119.245.12 port number: 80
more shortly…
A: no, many processes can be running on same host
![Page 10: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/10.jpg)
Application Layer 2-10
App-layer protocol defines types of messages
exchanged, e.g., request,
response message syntax:
what fields in messages & how fields are delineated
message semantics meaning of
information in fields rules for when and how
processes send & respond to messages
open protocols: defined in RFCs allows for
interoperability e.g., HTTP, SMTPproprietary protocols: e.g., Skype
![Page 11: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/11.jpg)
Application Layer 2-11
What transport service does an app need?data integrity some apps (e.g., file
transfer, web transactions) require 100% reliable data transfer
other apps (e.g., audio) can tolerate some losstiming
some apps (e.g., Internet telephony, interactive games) require low delay to be “effective”
throughput some apps (e.g.,
multimedia) require minimum amount of throughput to be “effective”
other apps (“elastic apps”) make use of whatever throughput they get
security encryption, data
integrity, …
![Page 12: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/12.jpg)
Application Layer 2-12
Transport service requirements: common apps
application
file transfere-mail
Web documentsreal-time audio/video
stored audio/videointeractive games
text messaging
data loss
no lossno lossno lossloss-tolerant
loss-tolerantloss-tolerantno loss
throughput
elasticelasticelasticaudio: 5kbps-1Mbpsvideo:10kbps-5Mbpssame as above few kbps upelastic
time sensitive
nononoyes, 100’s msec
yes, few secsyes, 100’s msecyes and no
![Page 13: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/13.jpg)
Application Layer 2-13
Internet transport protocols servicesTCP service: reliable transport
between sending and receiving process
flow control: sender won’t overwhelm receiver
congestion control: throttle sender when network overloaded
does not provide: timing, minimum throughput guarantee, security
connection-oriented: setup required between client and server processes
UDP service: unreliable data
transfer between sending and receiving process
does not provide: reliability, flow control, congestion control, timing, throughput guarantee, security, or connection setup,
Q: why bother? Why is there a UDP?
![Page 14: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/14.jpg)
Application Layer 2-14
Chapter 2: outline
2.1 principles of network applications app architectures app
requirements2.2 Web and HTTP2.3 FTP 2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
2.6 P2P applications2.7 socket
programming with UDP and TCP
![Page 15: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/15.jpg)
Application Layer 2-15
Socket programming
Socket API introduced in BSD4.1
UNIX, 1981 explicitly created,
used, released by apps client/server paradigm two types of transport
service via socket API: UDP TCP
A application-created,
OS-controlled interface (a “door”)
into whichapplication process can both send and receive messages to/from another
application process
socket
Goal: learn how to build client/server application that communicate using sockets
![Page 16: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/16.jpg)
Socket programming basics Server must be
running before client can send anything to it.
Server must have a socket (door) through which it receives and sends segments
Similarly client needs a socket
Socket is locally identified with a port number Analogous to the apt
# in a building Client needs to know
server IP address and socket port number.
Application Layer 2-16
![Page 17: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/17.jpg)
Application Layer 2-17
Socket programming with UDPUDP: no “connection” between client &
server no handshaking before sending data sender explicitly attaches IP destination
address and port # to each packet rcvr extracts sender IP address and port# from
received packet
UDP: transmitted data may be lost or received out-of-order
Application viewpoint: UDP provides unreliable transfer of groups of
bytes (“datagrams”) between client and server
![Page 18: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/18.jpg)
Running example
Client: User types line of text Client program sends line to server
Server: Server receives line of text Capitalizes all the letters Sends modified line to client
Client: Receives line of text Displays
Application Layer 2-18
![Page 19: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/19.jpg)
Application Layer 2-19
Client/server socket interaction: UDP
Server (running on hostid)
closeclientSocket
read datagram fromclientSocket
create socket,clientSocket = DatagramSocket()
Client
Create datagram with server IP andport=x; send datagram via clientSocket
create socket,port= x.serverSocket = DatagramSocket()
read datagram fromserverSocket
write reply toserverSocketspecifying client address,port number
![Page 20: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/20.jpg)
Application Layer 2-20
Example: Java client (UDP)
import java.io.*; import java.net.*; class UDPClient { public static void main(String args[]) throws Exception { BufferedReader inFromUser = new BufferedReader(new InputStreamReader(System.in)); DatagramSocket clientSocket = new DatagramSocket(); InetAddress IPAddress = InetAddress.getByName("hostname"); byte[] sendData = new byte[1024]; byte[] receiveData = new byte[1024]; String sentence = inFromUser.readLine();
sendData = sentence.getBytes();
Createinput stream
Create client socket
Translate hostname to IP
address using DNS
![Page 21: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/21.jpg)
Application Layer 2-21
Example: Java client (UDP), cont.
DatagramPacket sendPacket = new DatagramPacket(sendData, sendData.length, IPAddress, 9876); clientSocket.send(sendPacket); DatagramPacket receivePacket = new DatagramPacket(receiveData, receiveData.length); clientSocket.receive(receivePacket); String modifiedSentence = new String(receivePacket.getData()); System.out.println("FROM SERVER:" + modifiedSentence); clientSocket.close(); }
}
Create datagram with data-to-send,
length, IP addr, port
Send datagramto server
Read datagramfrom server
![Page 22: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/22.jpg)
Application Layer 2-22
Example: Java server (UDP)
import java.io.*; import java.net.*; class UDPServer { public static void main(String args[]) throws Exception { DatagramSocket serverSocket = new DatagramSocket(9876); byte[] receiveData = new byte[1024]; byte[] sendData = new byte[1024]; while(true) { DatagramPacket receivePacket = new DatagramPacket(receiveData, receiveData.length);
serverSocket.receive(receivePacket);
Createdatagram socket
at port 9876
Create space forreceived datagram
Receivedatagram
![Page 23: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/23.jpg)
Application Layer 2-23
Example: Java server (UDP), cont
String sentence = new String(receivePacket.getData()); InetAddress IPAddress = receivePacket.getAddress(); int port = receivePacket.getPort(); String capitalizedSentence = sentence.toUpperCase();
sendData = capitalizedSentence.getBytes(); DatagramPacket sendPacket = new DatagramPacket(sendData, sendData.length, IPAddress, port); serverSocket.send(sendPacket); } }
}
Get IP addrport #, of
sender
Write out datagramto socket
End of while loop,loop back and wait foranother datagram
Create datagramto send to client
![Page 24: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/24.jpg)
UDP observations & questions Both client server use DatagramSocket Dest IP and port are explicitly attached to
segment. What would happen if change both
clientSocket and serverSocket to “mySocket”?
Can the client send a segment to server without knowing the server’s IP address and/or port number?
Can multiple clients use the server?
Application Layer 2-24
![Page 25: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/25.jpg)
Application Layer 2-25
Socket-programming using TCP
TCP service: reliable transfer of bytes from one process to another
process
TCP withbuffers,
variables
socket
controlled byapplicationdeveloper
controlled byoperating
system
host orserver
process
TCP withbuffers,
variables
socket
controlled byapplicationdeveloper
controlled byoperatingsystem
host orserver
internet
![Page 26: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/26.jpg)
Application Layer 2-26
Socket programming with TCPclient must contact server server process must first
be running server must have created
socket (door) that welcomes client’s contact
client contacts server by: Creating TCP socket,
specifying IP address, port number of server process
when client creates socket: client TCP establishes connection to server TCP
when contacted by client, server TCP creates new socket for server process to communicate with that particular client allows server to talk
with multiple clients source port numbers
used to distinguish clients (more in Chap 3)
TCP provides reliable, in-orderbyte-stream transfer (“pipe”) between client and server
application viewpoint:
![Page 27: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/27.jpg)
Application Layer 2-27
Client/server socket interaction: TCP
wait for incomingconnection requestconnectionSocket =welcomeSocket.accept()
create socket,port=x, forincoming request:welcomeSocket =
ServerSocket()
create socket,connect to hostid, port=xclientSocket =
Socket()
closeconnectionSocket
read reply fromclientSocket
closeclientSocket
Server (running on hostid) Client
send request usingclientSocketread request from
connectionSocket
write reply toconnectionSocket
TCP connection setup
![Page 28: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/28.jpg)
Client
process
Application Layer 2-28ou
tToS
erve
r
to network from network
inFr
omS
erve
r
inFr
omU
ser
keyboard monitor
Process
clientSocket
inputstream
inputstream
outputstream
TCPsocket
client TCP socket
Stream jargon
A stream is a sequence of characters that flow into or out of a process.
An input stream is attached to some input source for the process, e.g., keyboard or socket.
An output stream is attached to an output source, e.g., monitor or socket.
![Page 29: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/29.jpg)
Application Layer 2-29
Socket programming with TCP
Example client-server app:1) client reads line from
standard input (inFromUser stream) , sends to server via socket (outToServer stream)
2) server reads line from socket
3) server converts line to uppercase, sends back to client
4) client reads, prints modified line from socket (inFromServer stream)
![Page 30: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/30.jpg)
Application Layer 2-30
Example: Java client (TCP)
import java.io.*; import java.net.*; class TCPClient {
public static void main(String argv[]) throws Exception { String sentence; String modifiedSentence;
BufferedReader inFromUser = new BufferedReader(new InputStreamReader(System.in));
Socket clientSocket = new Socket("hostname", 6789);
DataOutputStream outToServer = new DataOutputStream(clientSocket.getOutputStream());
Createinput stream
Create client socket,
connect to server
Createoutput stream
attached to socket
![Page 31: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/31.jpg)
Application Layer 2-31
Example: Java client (TCP), cont.
BufferedReader inFromServer = new BufferedReader(new InputStreamReader(clientSocket.getInputStream()));
sentence = inFromUser.readLine();
outToServer.writeBytes(sentence + '\n');
modifiedSentence = inFromServer.readLine();
System.out.println("FROM SERVER: " + modifiedSentence);
clientSocket.close(); } }
Createinput stream
attached to socket
Send lineto server
Read linefrom server
![Page 32: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/32.jpg)
Application Layer 2-32
Example: Java server (TCP)import java.io.*; import java.net.*;
class TCPServer {
public static void main(String argv[]) throws Exception { String clientSentence; String capitalizedSentence;
ServerSocket welcomeSocket = new ServerSocket(6789); while(true) { Socket connectionSocket = welcomeSocket.accept();
BufferedReader inFromClient = new BufferedReader(new InputStreamReader(connectionSocket.getInputStream()));
Createwelcoming socket
at port 6789
Wait, on welcomingsocket for contact
by client
Create inputstream, attached
to socket
![Page 33: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/33.jpg)
Application Layer 2-33
Example: Java server (TCP), cont
DataOutputStream outToClient = new DataOutputStream(connectionSocket.getOutputStream());
clientSentence = inFromClient.readLine();
capitalizedSentence = clientSentence.toUpperCase() + '\n';
outToClient.writeBytes(capitalizedSentence); } } }
Read in linefrom socket
Create outputstream, attached
to socket
Write out lineto socket
End of while loop,loop back and wait foranother client connection
![Page 34: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/34.jpg)
TCP observations & questions Server has two types of sockets:
ServerSocket and Socket When client knocks on serverSocket’s
“door,” server creates connectionSocket and completes TCP conx.
Dest IP and port are not explicitly attached to segment.
Can multiple clients use the server?
Application Layer 2-34
![Page 35: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/35.jpg)
Application Layer 2-35
The InetAddress Class
Occasionally, you would like to know who is connecting to the server. You can use the InetAddress class to find the client's host name and IP address. The InetAddress class models an IP address. You can use the statement shown below to create an instance of InetAddress for the client on a socket.
InetAddress inetAddress = socket.getInetAddress();
Next, you can display the client's host name and IP address, as follows:
System.out.println("Client's host name is " + inetAddress.getHostName());System.out.println("Client's IP Address is " + inetAddress.getHostAddress());
![Page 36: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/36.jpg)
Application Layer 2-36
Serving Multiple Clients
Multiple clients are quite often connected to a single server at the same time. Typically, a server runs constantly on a server computer, and clients from all over the Internet may want to connect to it. You can use threads to handle the server's multiple clients simultaneously. Simply create a thread for each connection. Here is how the server handles the establishment of a connection:
while (true) { Socket socket = serverSocket.accept(); Thread thread = new ThreadClass(socket); thread.start();}
The server socket can have many connections. Each iteration of the while loop creates a new connection. Whenever a connection is established, a new thread is created to handle communication between the server and the new client; and this allows multiple connections to run at the same time.
![Page 37: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/37.jpg)
Application Layer 2-37
Chapter 2: outline
2.1 principles of network applications app architectures app
requirements2.2 Web and HTTP2.3 FTP 2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
2.6 P2P applications2.7 socket
programming with UDP and TCP
![Page 38: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/38.jpg)
Application Layer 2-38
Web and HTTP
First, a review… web page consists of objects object can be HTML file, JPEG image,
Java applet, audio file,… web page consists of base HTML-file
which includes several referenced objects
each object is addressable by a URL, e.g.,www.someschool.edu/someDept/pic.gif
host name path name
![Page 39: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/39.jpg)
Application Layer 2-39
HTTP overview
HTTP: hypertext transfer protocol
Web’s application layer protocol
client/server model client: browser that
requests, receives, (using HTTP protocol) and “displays” Web objects
server: Web server sends (using HTTP protocol) objects in response to requests
PC runningFirefox browser
server running
Apache Webserver
iphone runningSafari browser
HTTP requestHTTP response
HTTP request
HTTP response
![Page 40: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/40.jpg)
Application Layer 2-40
HTTP overview (continued)
uses TCP: client initiates TCP
connection (creates socket) to server, port 80
server accepts TCP connection from client
HTTP messages (application-layer protocol messages) exchanged between browser (HTTP client) and Web server (HTTP server)
TCP connection closed
HTTP is “stateless” server maintains no
information about past client requests
protocols that maintain “state” are complex!
past history (state) must be maintained
if server/client crashes, their views of “state” may be inconsistent, must be reconciled
aside
![Page 41: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/41.jpg)
Application Layer 2-41
HTTP connections
non-persistent HTTP at most one
object sent over TCP connection connection then
closed downloading
multiple objects required multiple connections
persistent HTTP multiple objects
can be sent over single TCP connection between client, server
![Page 42: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/42.jpg)
Application Layer 2-42
Non-persistent HTTPsuppose user enters URL:
1a. HTTP client initiates TCP connection to HTTP server (process) at www.someSchool.edu on port 80
2. HTTP client sends HTTP request message (containing URL) into TCP connection socket. Message indicates that client wants object someDepartment/home.index
1b. HTTP server at host www.someSchool.edu waiting for TCP connection at port 80. “accepts” connection, notifying client
3. HTTP server receives request message, forms response message containing requested object, and sends message into its sockettime
(contains text, references to 10
jpeg images)www.someSchool.edu/someDepartment/home.index
![Page 43: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/43.jpg)
Application Layer 2-43
Non-persistent HTTP (cont.)
5. HTTP client receives response message containing html file, displays html. Parsing html file, finds 10 referenced jpeg objects
6. Steps 1-5 repeated for each of 10 jpeg objects
4. HTTP server closes TCP connection.
time
![Page 44: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/44.jpg)
Application Layer 2-44
Non-persistent HTTP: response time
RTT (definition): time for a small packet to travel from client to server and back
HTTP response time: one RTT to initiate TCP
connection one RTT for HTTP request
and first few bytes of HTTP response to return
file transmission time non-persistent HTTP
response time = 2RTT+ file transmission
time
time to transmit file
initiate TCPconnection
RTT
requestfile
RTT
filereceived
time time
![Page 45: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/45.jpg)
Application Layer 2-45
Persistent HTTP
non-persistent HTTP issues:
requires 2 RTTs per object
OS overhead for each TCP connection
browsers often open parallel TCP connections to fetch referenced objects
persistent HTTP: server leaves
connection open after sending response
subsequent HTTP messages between same client/server sent over open connection
client sends requests as soon as it encounters a referenced object
as little as one RTT for all the referenced objects
![Page 46: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/46.jpg)
Application Layer 2-46
HTTP request message
two types of HTTP messages: request, response
HTTP request message: ASCII (human-readable format)
request line(GET, POST, HEAD commands)
header lines
carriage return, line feed at startof line indicatesend of header lines
GET /index.html HTTP/1.1\r\nHost: www-net.cs.umass.edu\r\nUser-Agent: Firefox/3.6.10\r\nAccept: text/html,application/xhtml+xml\r\nAccept-Language: en-us,en;q=0.5\r\nAccept-Encoding: gzip,deflate\r\nAccept-Charset: ISO-8859-1,utf-8;q=0.7\r\nKeep-Alive: 115\r\nConnection: keep-alive\r\n\r\n
carriage return character
line-feed character
![Page 47: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/47.jpg)
Application Layer 2-47
HTTP request message: general format
requestline
headerlines
body
method sp sp cr lfversionURL
cr lfvalueheader field name
cr lfvalueheader field name
~~ ~~
cr lf
entity body~~ ~~
![Page 48: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/48.jpg)
Application Layer 2-48
Uploading form input
POST method: web page often
includes form input input is uploaded to
server in entity body
URL method: uses GET method input is uploaded in
URL field of request line:
www.somesite.com/animalsearch?monkeys&banana
![Page 49: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/49.jpg)
Application Layer 2-49
Method typesHTTP/1.0: GET POST HEAD
asks server to leave requested object out of response
HTTP/1.1: GET, POST, HEAD PUT
uploads file in entity body to path specified in URL field
DELETE deletes file
specified in the URL field
![Page 50: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/50.jpg)
Application Layer 2-50
HTTP response message
status line(protocolstatus codestatus phrase)
header lines
data, e.g., requestedHTML file
HTTP/1.1 200 OK\r\nDate: Sun, 26 Sep 2010 20:09:20 GMT\r\nServer: Apache/2.0.52 (CentOS)\r\nLast-Modified: Tue, 30 Oct 2007 17:00:02
GMT\r\nETag: "17dc6-a5c-bf716880"\r\nAccept-Ranges: bytes\r\nContent-Length: 2652\r\nKeep-Alive: timeout=10, max=100\r\nConnection: Keep-Alive\r\nContent-Type: text/html; charset=ISO-8859-1\
r\n\r\ndata data data data data ...
![Page 51: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/51.jpg)
Application Layer 2-51
HTTP response status codes
200 OK request succeeded, requested object later in this msg
301 Moved Permanently requested object moved, new location specified later in
this msg (Location:)
400 Bad Request request msg not understood by server
404 Not Found requested document not found on this server
505 HTTP Version Not Supported
status code appears in 1st line in server-to-client response message. some sample codes:
![Page 52: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/52.jpg)
Application Layer 2-52
User-server state: cookies
many Web sites use cookies
four components:1) cookie header line
of HTTP response message
2) cookie header line in next HTTP request message
3) cookie file kept on user’s host, managed by user’s browser
4) back-end database at Web site
example: Susan always access
Internet from PC visits specific e-
commerce site for first time
when initial HTTP requests arrives at site, site creates: unique ID entry in backend
database for ID
![Page 53: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/53.jpg)
Application Layer 2-53
Cookies: keeping “state” (cont.)
client server
usual http response msg
usual http response msg
cookie file
one week later:
usual http request msgcookie: 1678 cookie-
specificaction
access
ebay 8734usual http request msg Amazon server
creates ID1678 for user create
entry
usual http response set-cookie: 1678
ebay 8734amazon 1678
usual http request msgcookie: 1678 cookie-
specificaction
access
ebay 8734amazon 1678
backenddatabase
![Page 54: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/54.jpg)
Application Layer 2-54
Cookies (continued)what cookies can
be used for: authorization shopping carts recommendations user session state
(Web e-mail)
cookies and privacy: cookies permit sites to
learn a lot about you you may supply name
and e-mail to sites
aside
how to keep “state”: protocol endpoints: maintain
state at sender/receiver over multiple transactions
cookies: http messages carry state
![Page 55: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/55.jpg)
Application Layer 2-55
Web caches (proxy server)
user sets browser: Web accesses via cache
browser sends all HTTP requests to cache object in cache:
cache returns object else cache requests
object from origin server, then returns object to client
goal: satisfy client request without involving origin server
client
proxyserver
client
HTTP request
HTTP response
HTTP request HTTP request
origin server
origin server
HTTP response HTTP response
![Page 56: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/56.jpg)
Application Layer 2-56
More about Web caching
cache acts as both client and server server for original
requesting client client to origin server
typically cache is installed by ISP (university, company, residential ISP)
why Web caching? reduce response time
for client request reduce traffic on an
institution’s access link
Internet dense with caches: enables “poor” content providers to effectively deliver content (so too does P2P file sharing)
![Page 57: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/57.jpg)
Application Layer 2-57
Caching example:
originservers
public Internet
institutionalnetwork
1 Gbps LAN
1.54 Mbps access link
assumptions: avg object size: 100K bits avg request rate from
browsers to origin servers:15/sec
avg data rate to browsers: 1.50 Mbps
RTT from institutional router to any origin server: 2 sec
access link rate: 1.54 Mbps
consequences: LAN utilization: 0.15% access link utilization = 99% total delay = Internet delay
+ access delay + LAN delay = 2 sec + minutes + msecs
problem!
![Page 58: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/58.jpg)
Application Layer 2-58
assumptions: avg object size: 100K bits avg request rate from
browsers to origin servers:15/sec
avg data rate to browsers: 1.50 Mbps
RTT from institutional router to any origin server: 2 sec
access link rate: 1.54 Mbps
consequences: LAN utilization: 0.15% access link utilization = 99% total delay = Internet delay +
access delay + LAN delay = 2 sec + minutes + msecs
Caching example: fatter access link
originservers
1.54 Mbps access link
154 Mbps
154 Mbps
msecs
Cost: increased access link speed (not cheap!)
0.99%
public Internet
institutionalnetwork
1 Gbps LAN
![Page 59: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/59.jpg)
institutionalnetwork
1 Gbps LAN
Application Layer 2-59
Caching example: install local cache
originservers
1.54 Mbps access link
local web cache
assumptions: avg object size: 100K bits avg request rate from
browsers to origin servers:15/sec
avg data rate to browsers: 1.50 Mbps
RTT from institutional router to any origin server: 2 sec
access link rate: 1.54 Mbps
consequences: LAN utilization: 0.15% access link utilization = 100% total delay = Internet delay +
access delay + LAN delay = 2 sec + minutes + usecs
??
How to compute link utilization, delay?
Cost: web cache (cheap!)
public Internet
![Page 60: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/60.jpg)
Application Layer 2-60
Caching example: install local cache Calculating access link
utilization, delay with cache: suppose cache hit rate is 0.4
40% requests satisfied at cache, 60% requests satisfied at origin
originservers
1.54 Mbps access link
access link utilization: 60% of requests use access link
data rate to browsers over access link = 0.6*1.50 Mbps = .9 Mbps utilization = 0.9/1.54 = .58
total delay = 0.6 * (delay from origin servers) +0.4 * (delay
when satisfied at cache) = 0.6 (2.01) + 0.4 (~msecs) = ~ 1.2 secs less than with 154 Mbps link (and cheaper too!)
public Internet
institutionalnetwork
1 Gbps LAN
local web cache
![Page 61: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/61.jpg)
Application Layer 2-61
Conditional GET
Goal: don’t send object if cache has up-to-date cached version no object transmission
delay lower link utilization
cache: specify date of cached copy in HTTP requestIf-modified-since: <date>
server: response contains no object if cached copy is up-to-date: HTTP/1.0 304 Not Modified
HTTP request msgIf-modified-since: <date>
HTTP responseHTTP/1.0
304 Not Modified
object not
modifiedsince
<date>
HTTP request msgIf-modified-since: <date>
HTTP responseHTTP/1.0 200 OK
<data>
object modified
after <date>
client server
![Page 62: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/62.jpg)
Application Layer 2-62
Chapter 2: outline
2.1 principles of network applications app architectures app
requirements2.2 Web and HTTP2.3 FTP 2.4 electronic mail
SMTP, POP3, IMAP
2.5 DNS
2.6 P2P applications2.7 socket
programming with UDP and TCP
![Page 63: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/63.jpg)
Application Layer 2-63
Electronic mailThree major
components: user agents mail servers simple mail transfer
protocol: SMTP
User Agent a.k.a. “mail reader” composing, editing,
reading mail messages e.g., Outlook, Thunderbird,
iPhone mail client outgoing, incoming
messages stored on server
user mailbox
outgoing message queue
mailserver
mailserver
mailserver
SMTP
SMTP
SMTP
useragent
useragent
useragent
useragent
useragent
useragent
![Page 64: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/64.jpg)
Application Layer 2-64
Electronic mail: mail servers
mail servers: mailbox contains
incoming messages for user
message queue of outgoing (to be sent) mail messages
SMTP protocol between mail servers to send email messages client: sending mail
server “server”: receiving
mail server
mailserver
mailserver
mailserver
SMTP
SMTP
SMTP
useragent
useragent
useragent
useragent
useragent
useragent
![Page 65: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/65.jpg)
Application Layer 2-65
Electronic Mail: SMTP [RFC 2821] uses TCP to reliably transfer email message
from client to server, port 25 direct transfer: sending server to receiving
server three phases of transfer
handshaking (greeting) transfer of messages closure
command/response interaction (like HTTP, FTP) commands: ASCII text response: status code and phrase
messages must be in 7-bit ASCI
![Page 66: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/66.jpg)
Application Layer 2-66
useragent
Scenario: Alice sends message to Bob1) Alice uses UA to
compose message “to” [email protected]
2) Alice’s UA sends message to her mail server; message placed in message queue
3) client side of SMTP opens TCP connection with Bob’s mail server
4) SMTP client sends Alice’s message over the TCP connection
5) Bob’s mail server places the message in Bob’s mailbox
6) Bob invokes his user agent to read message
mailserver
mailserver
1
2 3 4
5
6
Alice’s mail server Bob’s mail server
useragent
![Page 67: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/67.jpg)
Application Layer 2-67
Sample SMTP interaction S: 220 hamburger.edu C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: <[email protected]> S: 250 [email protected]... Sender ok C: RCPT TO: <[email protected]> S: 250 [email protected] ... Recipient ok C: DATA S: 354 Enter mail, end with "." on a line by itself C: Do you like ketchup? C: How about pickles? C: . S: 250 Message accepted for delivery C: QUIT S: 221 hamburger.edu closing connection
![Page 68: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/68.jpg)
Application Layer 2-68
SMTP: final words
SMTP uses persistent connections
SMTP requires message (header & body) to be in 7-bit ASCII
SMTP server uses CRLF.CRLF to determine end of message
comparison with HTTP:
HTTP: pull SMTP: push
both have ASCII command/response interaction, status codes
HTTP: each object encapsulated in its own response msg
SMTP: multiple objects sent in multipart msg
![Page 69: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/69.jpg)
Application Layer 2-69
Mail message format
SMTP: protocol for exchanging email msgs
RFC 822: standard for text message format:
header lines, e.g., To: From: Subject:
different from SMTP MAIL FROM, RCPT TO: commands!
Body: the “message” ASCII characters only
header
body
blankline
![Page 70: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/70.jpg)
Application Layer 2-70
Mail access protocols
SMTP: delivery/storage to receiver’s server mail access protocol: retrieval from server
POP: Post Office Protocol [RFC 1939]: authorization, download
IMAP: Internet Mail Access Protocol [RFC 1730]: more features, including manipulation of stored msgs on server
HTTP: gmail, Hotmail, Yahoo! Mail, etc.
sender’s mail server
SMTP SMTPmail
accessprotocol
receiver’s mail server
(e.g., POP, IMAP)
useragent
useragent
![Page 71: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/71.jpg)
Application Layer 2-71
POP3 protocol
authorization phase client commands:
user: declare username pass: password
server responses +OK -ERR
transaction phase, client:
list: list message numbers
retr: retrieve message by number
dele: delete quit
C: list S: 1 498 S: 2 912 S: . C: retr 1 S: <message 1 contents> S: . C: dele 1 C: retr 2 S: <message 1 contents> S: . C: dele 2 C: quit S: +OK POP3 server signing off
S: +OK POP3 server ready C: user bob S: +OK C: pass hungry S: +OK user successfully logged on
![Page 72: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/72.jpg)
Application Layer 2-72
POP3 (more) and IMAPmore about POP3 previous example
uses POP3 “download and delete” mode Bob cannot re-
read e-mail if he changes client
POP3 “download-and-keep”: copies of messages on different clients
POP3 is stateless across sessions
IMAP keeps all messages
in one place: at server
allows user to organize messages in folders
keeps user state across sessions: names of folders
and mappings between message IDs and folder name
![Page 73: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/73.jpg)
Application Layer 2-73
Chapter 2: summary
application architectures client-server P2P
application service requirements: reliability, bandwidth,
delay Internet transport service
model connection-oriented,
reliable: TCP unreliable, datagrams: UDP
our study of network apps now complete!
specific protocols: HTTP SMTP, POP, IMAP
socket programming: TCP, UDP sockets
![Page 74: computer networking](https://reader036.vdocuments.us/reader036/viewer/2022062409/55cf8ea9550346703b945cfc/html5/thumbnails/74.jpg)
Application Layer 2-74
typical request/reply message exchange: client requests info
or service server responds with
data, status code message formats:
headers: fields giving info about data
data: info being communicated
important themes: control vs. data msgs
in-band, out-of-band centralized vs.
decentralized stateless vs. stateful reliable vs. unreliable msg
transfer “complexity at network
edge”
Chapter 2: summarymost importantly: learned about protocols!