[Network]Application Layer

來源:互聯網
上載者:User

標籤:page   data-   rds   bsp   sso   ems   back   folder   mat   

1 Principles of Network Applications
1.1 Application Architectures
Client-Server
Peer-to-Peer
Hybird of C/S and P2P
--Skype
client-server: find the address of the remote client
client-client: direct communication
--Instant messaging

Similar with Skype


1.2 Application Requirements(From Transport Layer Services)
1. About Data Loss
2. Timing
3. Throughput
4. Security


2 Application-Layer Protocols
2.1 Web and HTTP

1. Properties of HTTP 

Uses TCP

Nonpersistent HTTP: One TCP connection for One object transmission

RTT: time for a small packet from client to server and back.

Response time: RTT(TCP connection) + RTT(HTTP request) + file transmission

 

Persistent HTTP: Multiple Objects on One TCP connection

HTTP is stateless: 

server maintains no information about past client requests.


2. HTTP Request messages:

Request line: method path protocol

Header lines

Entity body


3. HTTP Response messages:

Status line: protocol statuscode statusphrase

Header lines

Data


4. Cookies

As we have disscussed above, HTTP is stateless, so if we want to keep states of users, we must utilize the process of HTTP to get it. 

Most of Web Sites use cookies.

Four components:

1) cookie header line in HTTP request message

2) cookie header line in HTTP response message

3) cookie file kept on user‘s host, managed by user browser

4) cookie file kept on server database of Web sites

To sum up, HTTP is stateless for it does not store the information of user states. But we can store the cookies in user hosts and servers and let the HTTP messages carry states.


5. Web cache

Why caching

1) reduce response time

2) reduce traffic

With HTTP:

Use conditional GET: If-modified-since, Not-modified


2.2 FTP
FTP seperate control and data connections, see following:
out-of-band: 是控制和資料分離,當有緊急情況(控制資料須要傳輸時。控制傳輸具有較高的優先順序)
1) client build control connection, server build data connection
2) FTP is stateful


2.3 Email
1. SMTP: reliably transfer email messages(TCP connection)
 
Compare with HTTP
HTTP: pull(GET); No such restriction; each object encapsulated in its own response msg
SMTP: push(transfer); 7-bit ASCII; multiple objects sent in multiple msg
Message Format: 7-bit ASCII
header lines (if extention, add some lines to declare the file type)
body
2. POP3
Store email locally.
3. IMAP
Store on mail server.

4. The difference of them
This part I most quoted from the page.
SMTP is the basis. POP3(locally, stateless) and IMAP(on the server, stateful-folder) are used to access the mails.

2.4 DNS

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvc2l5dW1hdG8=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" >TLD: Top-Level-Domain com, cn, org ...

1. DNS records
hostname is the name of a host - ibm
domain is part of URL you can consider as. - ibm.com
alias name is URL - www.ibm.com
canonical name is real name - servereast.backup2.ibm.com
2. DNS Protocol, Message
query and reply messages
header: identification and flags
some fields
3. An Example: Inserting records into DNS

(networkutopia.com,dns1.networkutopia.com, NS)

(dns1.networkutopia.com,212.212.212.1, A)

Then others can find your web site at IP 212.212.212.1

2.5 P2P
There are some properties of P2P: 
1) no always-on server
2) end systems directly communicate
3) peers change IP

1. File Distribution

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvc2l5dW1hdG8=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" >

C/S is "N copies upload and N copies download", but P2P is "One copy uploads and N copies download".

BitTorrent  
tracker: track peers participating in torrent.  - an individual
torrent: group of peers exchanging chunks of a file. - a group
The processes of bit torrent consist of pulling chunks and sending chunks. 
- When downloading chunks, the peer will request a list of chunks from its neighbors, and choose the rarest chunks first. (從最稀缺的內容開始)
- When uploading chunks, the peer will send chunks to four neighbors currently sending it chunks at highest rate.(投桃報李)
So one file will be held by several peers in the network and each peer can both download and upload. And there are some prescriptions for peers to down and up.
2. Searching for Information
Query blood
is a method to find resource in a P2P network. Because the graph of P2P network may not be connected by each node. So a query must be broadcasted in the network to find a resource.
It may cause DoS attack. 
The TCP connection built in the process of blooding form a hierarchical searching graph.
3. Skype
Almost similar with BitTorrent and Query blood.





End.


[Network]Application Layer

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.