SlideShare una empresa de Scribd logo
1 de 39
Instructor Materials
Chapter 10: Application Layer
CCNA Routing and Switching
Introduction to Networks v6.0
3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Chapter 10: Application
Layer
Introduction to Networks 6.0 Planning
Guide
Chapter 10: Application Layer
Curriculum Title
Introduction to Networks v6.0
13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 10.1 Application Layer Protocols
• Explain the operation of the application layer in providing support to end-user applications.
• Explain how the functions of the application layer, session layer, and presentation layer work together
to provide network services to end user applications
• Explain how common application layer protocols interact with end user applications.
 10.2 Well-Known Application Protocols and Services
• Explain how well-known TCP/IP application layer protocols operate.
• Explain how web and email protocols operate.
• Explain how DNS and DHCP operate.
• Explain how file transfer protocols operate.
Chapter 10 - Sections & Objectives
14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.1 Application Layer
Protocols
15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Sessio
Application Layer
 Application Layer:
• Closest to the end user.
• Used to exchange data between
programs running on the source
and destination hosts.
16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Session
Presentation and Session Layer
 Presentation Layer function:
• Formatting data at the source
device into a compatible form for
the receiving device.
• Compressing data.
• Encrypting data.
 Session Layer Function
• Create and maintain dialogs
between source and destination
applications.
17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application, Presentation, and Session
TCP/IP Application Layer Protocols
• Domain Name Server (DNS) TCP,UDP 53 - Translates
domain names, such as cisco.com, into IP addresses.
• (BOOTP) – Bootstrap Protocol - BOOTP is being
superseded by DHCP.
• Dynamic Host Configuration Protocol (DHCP) UDP client
68, server 67 – Dynamically assigns IP addresses to
client stations at start-up.
• Simple Mail Transport Protocol (SMTP) TCP 25 -
Enables clients to send email to a mail server.
• Post Office Protocol (POP) TCP 110 -
Enables clients to retrieve email from a mail
server.
• Internet Message Access Protocol (IMAP)
TCP 143 - Enables clients to retrieve email
from a mail server, maintains email on server.
• File Transfer Protocol (FTP) TCP 20 and 21 -
Reliable, connection-oriented, and
acknowledged file delivery protocol.
• Trivial File Transfer Protocol (TFTP) UDP 69 –
simple connectionless file transfer protocol.
• Hypertext Transfer Protocol (HTTP) TCP 80,
8080 - Set of rules for exchanging text, graphic
images, etc. on the World Wide Web.
• Hypertext Transfer Protocol Secure (HTTPS)
TCP, UDP 443 – Uses encryption and
authentication to secure communication.
18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Client-Server Model
 Client and server processes are
considered to be in the
application layer.
 Application layer protocols
describe the format of the
requests and responses between
clients and servers.
 Example of a client-server
network is using an ISP’s email
service to send, receive and
store email.
19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Peer-to-Peer Networks
 Data is accessed from a peer
device without the use of a
dedicated server.
 Each device (known as a peer)
can function as both a server and
a client.
20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Peer-to-Peer Applications
 A P2P application allows a
device to act as both a client and
a server within the same
communication.
 P2P applications require that
each end device provide a user
interface and run a background
service.
21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Common P2P Applications
 Common P2P networks include:
• G2
• Bitcoin
• BitTorrent
• eDonkey
 Some P2P applications are based on
the Gnutella protocol, where each
user shares whole files with other
users.
 Many P2P applications allow users to
share pieces of many files with each
other at the same time –this is
BitTorrent technology.
22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Application Protocols Interact with End-User Applications
Researching Peer-to-Peer File Sharing
23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.2 Well-Known Application
Layer Protocols and Services
24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Hypertext Transfer Protocol and Hypertext Markup Language
 When a web address or uniform
resource locator (URL) is typed into a
web browser, the web browser
establishes a connection to the web
service running on the server, using the
HTTP protocol.
25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
HTTP and HTTPS
 HTTP is a request/response protocol.
 Three common HTTP message types
are:
• GET - A client request for data.
• POST - Uploads data files to the web
server.
• PUT - Uploads resources or content to
the web server.
 HTTP Secure (HTTPS) protocol uses
encryption and authentication to
secure data.
26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Email Protocols
 Email clients communicate with mail
servers to send and receive email.
 Mail servers communicate with other
mail servers to transport messages
from one domain to another.
 Three protocols for email:
• Simple Mail Transfer Protocol (SMTP)
to send email.
• Post Office Protocol (POP) to retrieve
email.
• Internet Message Access Protocol
(IMAP) to retrieve email.
27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
SMTP Operation
 SMTP is used to send email
28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
POP Operation
 POP is used to retrieve
email from a mail server.
 Email is downloaded from
the server to the client and
then deleted on the server.
29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
IMAP Operation
 IMAP is used to retrieve
mail from a mail server.
 Copies of messages are
downloaded from the
server to the client and the
original messages are
stored on the server.
30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Web and Email Protocols
Packet Tracer – Web and Email
31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Domain Name Service
 Domain names convert the
numeric address into a
simple, recognizable name.
 The DNS protocol defines
an automated service that
matches resource names
with the required numeric
network address.
32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DNS Message Format
 When a client makes a query, the
server’s DNS process first looks at
its own records to resolve the name.
 If unable to resolve, it contacts other
servers to resolve the name.
 The server temporarily stores the
numbered address in the event that
the same name is requested again.
 The ipconfig /displaydns
command displays all of the cached
DNS entries on a Windows PC.
33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DNS Hierarchy
34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
The nslookup Command
 Nslookup - a utility that allows a
user to manually query the name
servers to resolve a given host.
• Can also be used to troubleshoot
name resolution issues and to verify
the current status of the name servers.
35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Dynamic Host Configuration Protocol
 The Dynamic Host Configuration
Protocol (DHCP) for IPv4 automates the
assignment of IPv4 addresses, subnet
masks, gateways, and other parameters.
 DHCP-distributed addresses are leased
for a set period of time, then returned to
pool for reuse.
 DHCP is usually employed for end user
devices. Static addressing is used for
network devices, such as gateways,
switches, servers, and printers.
 DHCPv6 (DHCP for IPv6) provides
similar services for IPv6 clients.
36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
DHCP Operation
37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Packet Tracer – DHCP and DNS Servers
38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IP Addressing Services
Lab – Observing DNS Resolution
39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
File Transfer Protocol
 FTP requires two connections between
the client and the server, one for
commands and replies, the other for the
actual file transfer:
• The client establishes the first connection to
the server for control traffic using TCP port
21.
• The client establishes the second
connection to the server for the actual data
transfer using TCP port 20.
40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Server Message Block
 The Server Message Block (SMB) is
a client/server file sharing protocol:
• SMB file-sharing and print services
have become the mainstay of
Microsoft networking.
• Clients establish a long-term
connection to servers and can access
the resources on the server as if the
resource is local to the client host.
41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Packet Tracer - FTP
42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
File Sharing Services
Lab – Exploring FTP
43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10.3 Summary
44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Explore a Network
45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer - Multiuser - Tutorial
46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Packet Tracer Multiuser - Implement Services
47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Conclusion
Chapter 10: Application Layer
 Explain the operation of the application layer in providing support to end-
user applications.
 Explain how well-known TCP/IP application layer protocols operate.
CCNA Routing and Switching Chapter 10 Application Layer

Más contenido relacionado

La actualidad más candente

CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04Irsandi Hasan
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLANnewbie2019
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksVuz Dở Hơi
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3Irsandi Hasan
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 

La actualidad más candente (20)

CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 04
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1CCNA Discovery 1 - Chapter 1
CCNA Discovery 1 - Chapter 1
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip NetworksCCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
IPv6 Addressing
IPv6 AddressingIPv6 Addressing
IPv6 Addressing
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 

Similar a CCNA Routing and Switching Chapter 10 Application Layer

Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4Irsandi Hasan
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerVuz Dở Hơi
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10newbie2019
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptxGeorgeThoreJr
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)Nitesh Singh
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9newbie2019
 

Similar a CCNA Routing and Switching Chapter 10 Application Layer (20)

Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4CCNA RS_NB - Chapter 4
CCNA RS_NB - Chapter 4
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
CCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application LayerCCNAv5 - S1: Chapter 10 Application Layer
CCNAv5 - S1: Chapter 10 Application Layer
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
 
Ch10
Ch10Ch10
Ch10
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptx
 
Chapter 6r
Chapter 6rChapter 6r
Chapter 6r
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9It nv51 instructor_ppt_ch9
It nv51 instructor_ppt_ch9
 

Más de Irsandi Hasan

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8Irsandi Hasan
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7Irsandi Hasan
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 

Más de Irsandi Hasan (18)

VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 8
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
 
CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7CCNA RS_ITN - Chapter 7
CCNA RS_ITN - Chapter 7
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 

Último

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 

Último (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 

CCNA Routing and Switching Chapter 10 Application Layer

  • 1. Instructor Materials Chapter 10: Application Layer CCNA Routing and Switching Introduction to Networks v6.0
  • 2. 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Chapter 10: Application Layer Introduction to Networks 6.0 Planning Guide
  • 3. Chapter 10: Application Layer Curriculum Title Introduction to Networks v6.0
  • 4. 13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  10.1 Application Layer Protocols • Explain the operation of the application layer in providing support to end-user applications. • Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications • Explain how common application layer protocols interact with end user applications.  10.2 Well-Known Application Protocols and Services • Explain how well-known TCP/IP application layer protocols operate. • Explain how web and email protocols operate. • Explain how DNS and DHCP operate. • Explain how file transfer protocols operate. Chapter 10 - Sections & Objectives
  • 5. 14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.1 Application Layer Protocols
  • 6. 15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Sessio Application Layer  Application Layer: • Closest to the end user. • Used to exchange data between programs running on the source and destination hosts.
  • 7. 16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Session Presentation and Session Layer  Presentation Layer function: • Formatting data at the source device into a compatible form for the receiving device. • Compressing data. • Encrypting data.  Session Layer Function • Create and maintain dialogs between source and destination applications.
  • 8. 17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application, Presentation, and Session TCP/IP Application Layer Protocols • Domain Name Server (DNS) TCP,UDP 53 - Translates domain names, such as cisco.com, into IP addresses. • (BOOTP) – Bootstrap Protocol - BOOTP is being superseded by DHCP. • Dynamic Host Configuration Protocol (DHCP) UDP client 68, server 67 – Dynamically assigns IP addresses to client stations at start-up. • Simple Mail Transport Protocol (SMTP) TCP 25 - Enables clients to send email to a mail server. • Post Office Protocol (POP) TCP 110 - Enables clients to retrieve email from a mail server. • Internet Message Access Protocol (IMAP) TCP 143 - Enables clients to retrieve email from a mail server, maintains email on server. • File Transfer Protocol (FTP) TCP 20 and 21 - Reliable, connection-oriented, and acknowledged file delivery protocol. • Trivial File Transfer Protocol (TFTP) UDP 69 – simple connectionless file transfer protocol. • Hypertext Transfer Protocol (HTTP) TCP 80, 8080 - Set of rules for exchanging text, graphic images, etc. on the World Wide Web. • Hypertext Transfer Protocol Secure (HTTPS) TCP, UDP 443 – Uses encryption and authentication to secure communication.
  • 9. 18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Client-Server Model  Client and server processes are considered to be in the application layer.  Application layer protocols describe the format of the requests and responses between clients and servers.  Example of a client-server network is using an ISP’s email service to send, receive and store email.
  • 10. 19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Peer-to-Peer Networks  Data is accessed from a peer device without the use of a dedicated server.  Each device (known as a peer) can function as both a server and a client.
  • 11. 20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Peer-to-Peer Applications  A P2P application allows a device to act as both a client and a server within the same communication.  P2P applications require that each end device provide a user interface and run a background service.
  • 12. 21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Common P2P Applications  Common P2P networks include: • G2 • Bitcoin • BitTorrent • eDonkey  Some P2P applications are based on the Gnutella protocol, where each user shares whole files with other users.  Many P2P applications allow users to share pieces of many files with each other at the same time –this is BitTorrent technology.
  • 13. 22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How Application Protocols Interact with End-User Applications Researching Peer-to-Peer File Sharing
  • 14. 23© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.2 Well-Known Application Layer Protocols and Services
  • 15. 24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Hypertext Transfer Protocol and Hypertext Markup Language  When a web address or uniform resource locator (URL) is typed into a web browser, the web browser establishes a connection to the web service running on the server, using the HTTP protocol.
  • 16. 25© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols HTTP and HTTPS  HTTP is a request/response protocol.  Three common HTTP message types are: • GET - A client request for data. • POST - Uploads data files to the web server. • PUT - Uploads resources or content to the web server.  HTTP Secure (HTTPS) protocol uses encryption and authentication to secure data.
  • 17. 26© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Email Protocols  Email clients communicate with mail servers to send and receive email.  Mail servers communicate with other mail servers to transport messages from one domain to another.  Three protocols for email: • Simple Mail Transfer Protocol (SMTP) to send email. • Post Office Protocol (POP) to retrieve email. • Internet Message Access Protocol (IMAP) to retrieve email.
  • 18. 27© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols SMTP Operation  SMTP is used to send email
  • 19. 28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols POP Operation  POP is used to retrieve email from a mail server.  Email is downloaded from the server to the client and then deleted on the server.
  • 20. 29© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols IMAP Operation  IMAP is used to retrieve mail from a mail server.  Copies of messages are downloaded from the server to the client and the original messages are stored on the server.
  • 21. 30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Web and Email Protocols Packet Tracer – Web and Email
  • 22. 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Domain Name Service  Domain names convert the numeric address into a simple, recognizable name.  The DNS protocol defines an automated service that matches resource names with the required numeric network address.
  • 23. 32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DNS Message Format  When a client makes a query, the server’s DNS process first looks at its own records to resolve the name.  If unable to resolve, it contacts other servers to resolve the name.  The server temporarily stores the numbered address in the event that the same name is requested again.  The ipconfig /displaydns command displays all of the cached DNS entries on a Windows PC.
  • 24. 33© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DNS Hierarchy
  • 25. 34© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services The nslookup Command  Nslookup - a utility that allows a user to manually query the name servers to resolve a given host. • Can also be used to troubleshoot name resolution issues and to verify the current status of the name servers.
  • 26. 35© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Dynamic Host Configuration Protocol  The Dynamic Host Configuration Protocol (DHCP) for IPv4 automates the assignment of IPv4 addresses, subnet masks, gateways, and other parameters.  DHCP-distributed addresses are leased for a set period of time, then returned to pool for reuse.  DHCP is usually employed for end user devices. Static addressing is used for network devices, such as gateways, switches, servers, and printers.  DHCPv6 (DHCP for IPv6) provides similar services for IPv6 clients.
  • 27. 36© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services DHCP Operation
  • 28. 37© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Packet Tracer – DHCP and DNS Servers
  • 29. 38© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IP Addressing Services Lab – Observing DNS Resolution
  • 30. 39© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services File Transfer Protocol  FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer: • The client establishes the first connection to the server for control traffic using TCP port 21. • The client establishes the second connection to the server for the actual data transfer using TCP port 20.
  • 31. 40© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Server Message Block  The Server Message Block (SMB) is a client/server file sharing protocol: • SMB file-sharing and print services have become the mainstay of Microsoft networking. • Clients establish a long-term connection to servers and can access the resources on the server as if the resource is local to the client host.
  • 32. 41© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Packet Tracer - FTP
  • 33. 42© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential File Sharing Services Lab – Exploring FTP
  • 34. 43© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10.3 Summary
  • 35. 44© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Explore a Network
  • 36. 45© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer - Multiuser - Tutorial
  • 37. 46© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Packet Tracer Multiuser - Implement Services
  • 38. 47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Conclusion Chapter 10: Application Layer  Explain the operation of the application layer in providing support to end- user applications.  Explain how well-known TCP/IP application layer protocols operate.