Time
3 hours 38 minutes
Difficulty
Beginner
CEU/CPE
2

Video Description

Application Layer- Web Services

  • HTTP

    • Hyper Text Transfer Protocol
    • Supports web services
    • Uses port number 80
    • The secure version is HTTPS
    • HTTPS uses port number 443
    • Transfers text, images, and hyper links
  • HTTPS
  • File Sharing Services/File transfer

    • FTP

      • File Transfer Protocol
      • Uses port number 21
      • Built=in in MS Windows Operating Systems
      • Many 3rd party programs
      • Web browser works as FTP client
    • TFTP
    • Network File System
  • Mail Services

    • SMTP

      • Common language used by the majority of mail servers
      • Send messages back and forth to other mail servers or email clients
    • POP3 "Post Office Protocol version 3"

      • Collects email messages from the mail server
      • Download messages on the machine
      • User can work offline
      • Saves quota on the server
    • IMAP4 "Internet Message Access Protocol version 4"

      • Retrieves the message header only
  • DNS Services

    • Domain Name System DNS resolves Domain Name into IP Address

Video Transcription

00:00
Now let's talk about the application protocols. The protocols that work in the
00:07
session presentation and application layers off the eyes OS I model and in the application layer off the TCP I p Protocol.
00:17
These protocols are such as the http or http s that offers the Web service is
00:27
the https is the secure version off Http this US is for security
00:34
or like the file sharing service is FTP or T ftp file transfer protocol or trivial file transfer protocol or the mail service is seem pale Male transfer protocol smtp
00:48
pop three or I met Post office protocol version three or Internet message access protocol or the D. N s service is the domain name system. Service is these are the protocols or example protocols that work in the application layer off the TCP I p each of them.
01:04
It has a dedicated port number. Each of them offers a certain service
01:10
between the source and the destination between the client and the server over the Internet toe. Offer a certain service to the user off such protocols.
01:21
Let's start by the http http stands for hypertext transfer protocol. It supports the Web service. Is it supports the transmission off
01:30
images, texts and hyper lings between the Web server and the weapon through the Web browser. It supports the
01:40
older www patriots that can be transferred between the server and the client. It uses sport number 80. The secure version off http is actually TP as us here is for security and Https uses the port number for four
02:00
3 440
02:00
three.
02:01
Actually, T p is one off the application layer protocols in T c, p, I, p
02:07
FTP or the file transfer protocol. Use a sport number 21.
02:13
It has a built in application in the M S Windows operating systems. Microsoft Windows Operating systems. Many third party programs can act as FTP server and client as well to transfer files between the FTP server. Tow the FTP client.
02:30
The Web browser animal browser can work as an FTP Klein. If you replace the http saw fix at the start off the U. R. L with the word FTP, then it will work as FTP client and can be able to transfer files
02:47
The email protocols we can see in the diagram that the email client is contacting the email server
02:54
through two protocols. One of them is for sending, which is the SMTP, and the other is for receiving e mails or downloading email messages from the email server to the email plant, which is the top three.
03:07
The communication between mail server X and mail server. Why is done via C. The SMTP Protocol Simple male transfer protocol. The SMTP is the common language between the majority of the mail servers around the Internet. Once more at the client. Why
03:24
the SMTP is used for sending e mails from the climb Tow the server plant y two server Why
03:30
and the pop three is used to download messages off client Why from the server Why the pop free or the I met? It depends whether you want to download the message through pop free or toe just excess. The message through the I met
03:46
the SMTP is the common language used by the majority off the main servers. As we have said, it sends messages
03:54
back and forth to other mail servers and it is used to sending
03:59
message between the male client and to the mail server.
04:04
The Post Office protocol is for receiving and collecting email messages from the mail server to the client. It downloads the messages on the machine so the user can work off line can now load the message at the beginning of the session and then if the Internet cuts, it can work off line.
04:21
This saves quota on the server, since the messages are downloaded from the server to the client, so the coat off the user can be emptied for other messages to arrive.
04:32
Internet. No such excess protocol is another message toe
04:38
access the messages by the client on the server. It is just for accessing. The message is reading them. It does not download the message. It does not save the court. Eight. Retrieves only the message header allows the user to read the message about the body of the message. The message itself. It's at the server side. So this is more
04:57
commonly used if you are accessing your email from a machine that is not yours from a machine, that you do not want to download your messages on
05:09
the D. N s Protocol one off the application protocols working in the TCP i. P. The understands for domain name system or domain name servers in some
05:19
written texts, the Deanna's resolves the domain name in tow i P address. For example, www dot cisco dot com is a domain name.
05:29
This is
05:30
a name that can be understood by the human, but the machine needs numbers, needs addresses to work with. So this resolution between names that are understood by human into address is that understood by machines is done via the D. N s, the domain name system.
05:48
The D. N. A server here matches the human address with the numeric address.
05:54
The device used numbers understands only ones and zeroes and numbers. So www dot cisco dot com is mapped into the address 1 98.1 33.219 dot 215
06:08
Humans can easily understand names. Machines can easily understand addresses and the N s acts as the resolution machine for
06:20
resolving names in tow addresses.
06:24
This is the D. N s tree around the world. We can see that we have
06:28
websites or domain names ending in dot or dot com dot d that I s that UK and dot
06:34
Any thing
06:36
we have each country in the world have two letters suffix like that UK United Kingdom bodies for Germany.
06:45
And
06:46
we have dot org's for organizations come commercial video for educational mill for military and not for networking organizations. And we also we have some organization names that are governing the Internet, like the I E T F Internet Injurying Task Force
07:05
and the
07:08
other organizations that can
07:12
work and manage the Internet as examples off them domain names that can exist over the Internet we have here the www estimate she named that can be connected toe i e t f as that
07:27
parent domain name, then not order. This forms there
07:31
fully qualified domain name off www dot i e t f dot org's as a website.
07:40
If we can see the on us in action here we have a the N s climbed that contacts. It's local d n A server
07:46
asking for what is the i p off cisco dot com. This local Deanna server does not have the answers but can ask, apparently in us about things that
07:58
ends in dot com.
08:00
What is the i p off cisco dot com and the parent can
08:05
answer it with the I P address off. Sisko will come then the answer is transferred so the D. N s climb.
08:11
Sometimes this local Deanna server cashes the the answer
08:16
for the sake of not asking once more for that
08:22
previously Oscar domain names and can answer about www dot cisco that come from it's cash
08:28
in the second time it is asking about from any other client than the first line.
08:35
We have also a very well known and famous protocol working in the application layer that is called the the Recipe Dynamic Host Configuration Protocol. It's an important protocol in the configuration of the P C P I. P parameters Inside any machine. If a client on a certain network
08:56
boots and
08:58
moves to be up on the network, it sounds a d S c p clan broad cost Discover message that is read by several servers over the network that he is connected toe several D F. C P servers one off the server sends the DFC
09:16
server broadcast off her message,
09:20
which means that he offers the client some off the TCP I p parameters that he can take toe start and work over the Internet. What are these parameters? These parameters are the I P address, the subject mosque that if we'll get way and the N s mainly the una server that he can contact oh,
09:39
communicate over the Internet,
09:41
Then the client responds with the request message
09:46
for
09:46
leasing and asking for these parameters.
09:50
The offer message says that I'm server a media recipe server. I can offer you these parameters. Then the D. A s a P server finalizes the exchange with acknowledgement. Message
10:03
finalizes that this client has reserved this i p address this
10:09
sub net mosque this default gateway in this Deanna so that he cannot repeat leasing the same i p address to other machines. Otherwise, there will be a conflict of I P addresses between two machines and this is forbidden.
10:22
No two machines can have the same i p address over the same network. So what is the main benefit off this? The Hosp? It saves the offers. The efforts off the network administrator
10:35
that is used in configuring several machines with I p addresses Sub net mosque, the fold. Get way. Deanna servers. It saves this effort and makes a machine. Does this task off course? The machine does not make the mistake off the I P conflict does not make the mistake off
10:54
assigning the same i p address to two machines.
10:58
The D A s a. P,
11:01
as a protocol is very commonly Weide widely used over the networks
11:07
toe
11:07
lease I P address to distribute I P addresses over
11:11
several machines on the same network and to save the effort and received the mistakes that humans can do by conflicting i p addresses by this we have
11:26
suit should some off the
11:28
application protocols working on the application layer off the TCP I p protocol suit. Thank you.

Up Next

Network Fundamentals

In this basic Network Fundamentals course, you will get an introduction to basic networking concepts to expand your knowledge about network security. You will get a complete overview of networks including wired and wireless computer networks, devices, and protocols.

Instructed By

Instructor Profile Image
Mohammad Adly
EC3 Manager at Information Technology Institute
Instructor