Module 15 - Networks Lecture
Document Details
Uploaded by SimplestForgetMeNot
false
Tags
Summary
This document covers the application layer in computer networks, explaining its role in supporting end-user applications. It discusses peer-to-peer communication, web and email protocols, IP addressing, and file sharing services within the context of OSI and TCP/IP models. Key protocols like HTTP, DNS, and DSCP are also introduced.
Full Transcript
Welcome back to the CCNA Cisco NetAcad introduction to networks lecture series. If you are interested in the previous lectures, I will leave a link in the description to the playlist, and you can use that to watch them. Today, we will be focusing on module 15, which is the application layer. In this...
Welcome back to the CCNA Cisco NetAcad introduction to networks lecture series. If you are interested in the previous lectures, I will leave a link in the description to the playlist, and you can use that to watch them. Today, we will be focusing on module 15, which is the application layer. In this lecture, we will learn the operation of application layer protocols in providing support to end user applications. We will cover the application presentation and session layers with respect to OSI model and the TCP model will be covering that with the application layer section on their side. We will learn about peer to peer communication. We will learn about web and email protocols and explain how those protocols are used. We will learn about IP addressing services, and we will cover file sharing services, application presentation and session. Application layer, the upper three layers of the OSI model includes application presentation and session defined functions of the TCPIP application layer. So if you look at the right hand side of this window, you have the TCP IP model on the right and the OSI model on the left, and on the TCP IP model the application layer, which sits on top of the transport layer, covers the application presentation and session layers which sits on top of the transport layer on the OSI model, the application layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted, some of the most widely known application layer protocols include http, ftp, F, sorry, TFTP, i, m, A, P, and DNS. The secure layers, which are like HTTPS is also part of the application layer, which is basically a secure version of this HTTP, for example, presentation and session layer. So the presentation layer in the OSI model, which is still part of the application layer on TCPIP model has three primary functions. They are formatting or presenting data at the source device into a compatible format for received by the destination device, compressing data in a way that can be decompressed by the destination device, encrypting data for transmission and decrypting data upon receipt for the session. Layer functions. What it does is it creates and maintain dialog between source and destination. Applications. It handles the exchange of information to initiate dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time. So in presentation layer and the session layer, these are the key important things that would have that is been at their address in the OSI model. Remember, these are still part of the application layer on the TCPIP model. TCPIP application layer protocols, the TCPIP application protocols specify the format and control information necessary for many common internet communication functions. Application layer protocols are used by both the source and destination devices during a communication session. For the communications to be successful, the application layer protocols that are implemented on the source and destination host must be compatible. So that\'s a very key, important concept that you should get out of this course for the communication to be successful, the application layer protocols that are implemented on the source and the destination has to be compatible with each other. If the source and destination have incompatible application layer protocols, the communication between the two will not occur properly. Some of the examples of the TCPIP application layer protocols would be DNS, DSCP and HTTP. The DNS is a name system that use TCP, UDP. Client in 53 port 53 and it translates domain names such as cisco.com or sanoji.com into an IP address. DSCP is the Dynamic Host Configuration Protocol, which is the UDP, Port 68 for the client and port 67 for the server. And it dynamically assign IP addresses to be reused when no longer in need. And also it also provide IP addresses for new devices when it connects to a network and it requests that IP address information. HTTP is the Hypertext Transfer Protocol which used the TCP port 80 and port 8080, and it sets a rules for exchanging text, graphic, images, sound, videos and other multimedia files on the world wide web. We will go in little bit detail. We\'ll look into little bit detail on DNS, DSCP and HTTP in this course as we move through the lecture series for now, just remember, these are some of the example of TCPIP application layer protocols, peer to peer, client, server model, client and server processes are considered to be in the application layer, in the clients slash server model or client server model, the device requesting the information is called a client, and the device responding to the request is called a server. Application layer protocols describe the format of the request and responses between clients and servers. So in this example, for example, we have a server in here, and we have a device, an end device, and it is requesting to download a specific file, let\'s say a video or a image file. And if it is directly communicating with this server that is considered as a client server model, where it\'s basically like a peer to peer type of communication, similar to that, except the difference here is that it is not peer to peer because it\'s going through a network and a server is responding to a request by the end device. So peer to peer networks is also known as P to P Network. Have two or more computers that are connected via a network and can share resources such as printers and files without having a dedicated server. So in the previous model, we had a server, right? So if you look at the previous model, we have a dedicated server that is doing these the role of server to end clients. So we have 123, clients, and all of these three clients are connecting to this server to request information. But in the peer to peer networks, what happened is the two or more computers, or in devices, or devices are connected to each other, and they are communicating and sharing resources without having a dedicated server. So that\'s how make it a peer to peer networks. Every connected end device known as a peer can function as both a server and a client. That is a key feature of a peer to peer networks. Every connected end device known as a peer can function as both a server and a client. One computer might assume the role of server for one transaction, while at the same time serving as a client for another, so the same computer, so this peer can also act as a in here we have a peer one can act as a client and the server at the same time, the roles of client and server are set on peer request basis. So that\'s what make it the peer to peer networks. Next, we will look at the peer to peer applications. A peer to peer or peer to peer application allows a device to act as both a client and a server within the same communication. Some peer to peer applications use a hybrid system where each peer accesses an index server to get the location of the resources stored on another peer. If you have ever used programs like BitTorrent or torrent applications, they are actually the peer to peer applications. They use this type of technology, and that is what it is shown here on the the diagram here. So basically, you have a client and, server and a client and a server. So there is no dedicated server there or just a client. Client also act like a server. Server also act like a client, right? So we have an instant messaging platform in here for an example. So it\'s just sending back and forth between send and receiving data, and each time when they send the data, this is acting like a client, client type of thing, and then it is sorry as like a server type of thing. And when he\'s receiving data, is like acting like a client type of thing, and he\'s switching back and forth and doing that the same at the same time. So that\'s what make it a P to P network. So common peer to peer applications, as I mentioned, BitTorrent is one of them. So with peer to peer application, each computer in the network that is running the application can act as a client or a server for the other computers in the network that are also running that application. So the other common applications, other than torrent, is the direct connect e donkey and Freenet. They are all peer to peer network for this class, what you need to understand is not these clients. You know, per se, you don\'t naturally need to memorize these clients. What you need to understand is the processes and the functions of peer to peer application applications and peer to peer networks like how they actually works. So basically, the key thing you need to get out of this is that in peer to peer networks, the same device can act like a server as well as the client at the same time or at different instances, as opposed to, as opposed to having a dedicated server, web and email protocols, Hypertext Transfer Protocol and hypertext markup language. When a web address, or Uniform Resource Locator, also known as URL, is typed into the web browser, the web browser establishes a connection to the web service. The web service is running on the server that is using the HTTP or hypertext transfer protocol to better understand how the web server, browser and web server interact, let\'s examine how a web page is open in a browser. In this example, we are using the website, [www.cisco.com](http://www.cisco.com), so on the web browser, the browser interprets three parts of the URL, or Universal Resource Locator, the HTTP part, which define the protocol or the scheme,[www.cisco.com](http://www.cisco.com), part, which is the server name and index dot HTML part, which is the specific file name requested. So you have a server and you have a client. So the client is requesting that cisco.com web page, and the web browser is interpreting those information in order to reach this web server. So in step two, what happened is the browser then checks with a name server, which is a DNS, to convert [www.cisco.com](http://www.cisco.com), into a numeric IP address, which it uses to connect to the server. Remember, servers and end clients and intermediary devices have IP addresses. They don\'t actually have the you know, the domain name itself, right? So that\'s why we had to use a DNS to figure out what\'s the IP addresses, the client initiates an HTTP request to a server by sending a GET request to the server and ask for the index dot HTML file. So sometimes it is index dot HTML, sometimes it\'s default dot HTML. You know, it can be configured on the server side as well. I will not go into depth of that, but I will do a separate course that I\'m going to create on basic web systems, and I will explain that in that course. But for now, what you need to understand is the get request is sent by the you know, sent by the client, and then that\'s what causing it to receive that index, dot, HTML, fly file. Then on step three. In response to the request, the server sends the HTML code for the web page to the browser, and that code also includes any resources that needed to be available on the client side to view, such as image locations of images and videos, etc, etc. And the HTML code is similar to like looks like this. And if you would like to look at an HTML code, you can simply view the source code of this YouTube page, for example. Or you can go to sanojo.com or something like that. Just view the source code that is pretty much the HTML code for that web browser. And this in the step four, what happened is the browser receive that HTML code and it decipher and format the page for the browser window. So like, for example, just like the Cisco website, if you wish, www.sanoja.com website, you will be presented with a page like similar to this. What you are seeing here is basically what your web browser has deciphered from the HTML code that includes all the code information on where these elements should be, like such as these images, these texts, these links and any information pretending to that, like, for example, when you visit sanojo.com your web browser will decipher from the HTML code it received from my web server where this image is located, so that You will be presented with a proper web page. So next, we\'re going to look at the HTTP and HTTPS. HTTP is a request response protocol that specify the message type used for that communication. Those three common message types are GET, POST and put. Get is a client request for the data. A client or the web browser send a GET request message to the web server to request that HTML pages, post this uploads, data files to the web server, such as form data. So if you go to my website and you fill out my contact form, for example, and when you press submit, that is using that post request the post message, and then put this uploads resources or content to the web server, such as an image. So if you attach an image, for example, for that message, and you send it to my web server that will be using both post and put messages to achieve, you know what needed to be achieved on the server side, not HTTP is not a secure protocol for secure communication sent across internet. Should use HTTPS. And if you go to actually my website, sanoja.com right now, in 2022 for the past couple of years, like I believe, last five years, I have been using HTTPS. Sano.com but prior to five years ago, I have been using HTTP sano.com which is not a secure protocol. So what you need to understand with respect to HTTP and HTTPS is that we you use the GET and POST, get post and put request on both HTTP and HTTPS requests. Email Protocols. Email is a store and forward method of sending, storing and retrieving electronic messages across a network. Email messages are stored in a date in databases on mail servers. Email clients communicate with mail servers to send and receive emails. So as opposed to the HTTP and HTTPS protocol, which is a request and response protocol, what you need to remember is email is a store and forward type of protocol, and the email protocols used for operations such as SMTP, which is a Simple Mail Transfer Protocol, and pop, which is Post Office Protocol and IMAP, so the SMTP is used to send emails or mail, and Post Office Protocol or pop, and IMAP is used for clients to receive that mail. So the sender will be using SMTP and the receiver will be using POP to receive it. In this example, the sender is sending an email to someone\@cisco.com and it goes through using the SMTP protocol across maybe multiple servers and multiple routers and switches on the internet, and it reached the recipient, but the recipient will be using the IMAP or POP three to receive that data, so the sender is sending using the SMTP while the recipient is using IMAP or POP three to retrieve that email. S SMTP POP and IMAP when a client sends email, the client SMTP process connects with the server. SMTP process on well known port number 25 so the port number 25 is a standard, well known port for SMTP process. After the connection is made, the client attempts to send email to the server across the connection. When the server receives the message, it either places the message in a local account, if the recipient is local, or forward that message to another server for delivery. The destination email server may not be online or may be busy, if so, SMTP spools messages to be sent at a later time. Note, SMTP message formats required a message, header, recipient email address, send email address is included in this message header and a message body, which includes the data that the sender is trying to send to the recipient. And one of the key things that you get out of this is that because SMTP POP and IMAP is an email service. If the destination email server is not online or busy, it has the ability. The SMTP protocol has the ability to spool messages that to be sent later, so the message does when the sender send the message. It doesn\'t need to reach the recipient right away. If the recipient server or the recipient clients are busy, it can spool those messages and send it later. And another key piece of information you get out of this slide is that the SMTP message formats required a header that has the recipient email address and a sender email address, just like we look at the those packets with the header having sender and receiving MAC addresses or send and receiving IP addresses. So in packet switching and network communication, you most of the formats we use, most of the protocols we use must have the sender and the receiver information. So the pop is used by an application to retrieve mail from a mail server. When mail is downloaded from the server to the client using POP, the messages are then deleted on the server. The server starts the pop service by passively listening on TCP port 110 for client connection request. When a client wants to make use of the service, it sends a request to establish a TCP connection with the server. When the connection is established, the POP server sends a greeting the client and POP server then exchange commands and responses until the connection is closed or aborted. Remember, TCP connections are reliable connections. We learn about that in our previous modules. And if you would like to look at the TCP and UDP in depth, please go and check my previous module, and you will learn about that in that particular module. Note, pop does not store messages. It is not recommended for small businesses that need a centralized backup solution to use POP service. So one of the problem with the pop service is when the message is sent to the recipient, the message get deleted from the server. So that is not recommended for most business and company usage, because if you would want to back up all your emails, or the recipient delete the emails on their end that may not be able to retrieve back from the server. IMAP is another protocol that describes a method to retrieve email messages, unlike pop. When a user connect to an iPad IMAP server, copies of this messages are downloaded to the client application. The original messages are kept on the server until manually deleted. When a user decides to delete a message, the server synchronizes that action and deletes the message from the server. So the advantage of having an IMAP over a pop is that when the recipient retrieve the data from the server, the server doesn\'t automatically delete that email. That data is kept, that email is kept on the IMAP server until the recipient decided to go ahead and manually delete it from the server. An example of one of the most common IMAP usage is that if you are using Gmail accounts for the past couple of years to a decade, the Gmail usually keep a copy of your email, even if you are using some desktop client, such as an outlook, for example. So you can use Microsoft Outlook to access your Gmail account. But even though all the emails are downloaded onto your computer, desktop computer mail client, you still have access to the copies of those emails that you have received and sent on the Gmail servers, so you still can be traveling across the world, and you still can access to Gmail web client, and you will see the same messages because IMAP servers do not delete The copy of the message that has been retrieved by your client desktop computer. This is a key piece of information that will show up on your net Cisco, NetAcad, CCNA and CCNP exams, and make sure that you know the that key piece of difference between the POP and IMAP protocols, IP addressing services, Domain Name Service or DNS domain names were created to convert the numeric IP addresses into a simple, recognizable name, because people like you and I can remember names and letters than what, what we can do with numbers such as 190, 2.16, 8.15, 5.3, for example. So that\'s why the domain name services are important. So fully qualified domain names, also known as fqdns, includes things like cisco.com or sanoj.com and they are much easier to remember for you and I, as opposed to remembering that IP address the domain name server or DNS protocol defines an automated service that matches resources names with the required numeric network address. It includes format for query responses and data. So that\'s the primary role of a DNS protocol, and I will go over what a DNS message format look like in on our next slide, but in this slide, what you need to remember is that the primary reason why we have fqdns and DNS is because humans can remember cisco.com or sanoja.com as opposed to remembering the IP addresses associated with these websites. So on a DNS message, the DNS server stores different types of resource records that are used to resolve names. These records contain the name, address and type of record. And in the DNS message format, there are few types of data or record types included within it, and they are, for example, a, ns, cod, a and MX records. A is an n device, IP Address N s is an authoritative name server information and cod a and is an n is a n device. IPv six address and MX is a mail exchange record. So if you have a email information associated with that particular server or domain name. That\'s where the MX records come into play. When a client makes a query, the server DNS process first looks at its own records to resolve the name. So if it finds the name within its own process, within its own server. I mean, it would be able to resolve that request. If it is unable to resolve the name by using its stored records, it contacts other servers to resolve the name after a match is found and return to the original requesting server. The server temporarily stores the numbered address in the event that the same name is requested again. So when you first reach a DNS server, and if that DNS server has no information about, for example, sanujo.com, what it\'s going to do, it\'s going to go and look for other DNS servers that may have that information, and it going to retrieve that information and then respond to you with the sandwich.com web page and associated IP protocols and all The other protocols and data, because now it has learn where the sanity.com server is located in terms of the its IP address from the other servers. But now the this DNS server that you reach learn about sanoji.com because of your request, it typically you know the server will store that information and the IP address on its DNS. You know, the DNS records. I will go over this in little bit detail as we go through this lecture. DNS uses the same message format between servers consisting of a question, answer, authority and additional information for all types of client requires and server responses, error messages and transfer of resources, record information, resource record information. So remember that the DNS uses the same message format between server consists of a question answer, authority and additional information for all types of client queries and server responses, that includes error messages, transfer of resources and the you know, the resource record information. So in this table, we have a DNS message section and a description of what it doing. So we have a question, something like the question for the name server. Then we have answer, which is a resource records answering the question. And then we have authority, which is the resource records pointing towards an authority. And then we have an additional section where resource records holding additional information within that additional section. So if you look at the DNS hierarchy, DNS uses a hierarchical system to create a database to provide name resolution each DNS server maintains. A specific database file and is only responsible for managing name to IP mappings for that small portion of the entire DNS structure. When a DNS server receives a request for a name translation that is not within its DNS zone, the DNS server forwards the request to another DNS server within the proper zone for translation. An example of this would be the.com domain.org, domain.au, or.ca domains for Canada. Those are top level domains. So when a DNS server receive a request for a name translation that is not within its DNS zone, let\'s say I am in Canada and I\'m trying to access.au domain, you know, it can forward the request to another DNS server that may be holding complete records of.au.ca domains, and then retrieve that data for me. So we have something called root level domain. And that root level domain other, you know, other top level domains located in here, the root level and we then we have the top level domains called, known as the TLDs they are include.net.edu.com.au.co etc, etc. And underneath it, like, let\'s say we have sanoji.com or cisco.com it\'s going to become the second level domain, and that means something like, you know, cisco.com ftp.cisco.com, mail.cisco.com, and you know these are like web, FTP and mail, you can like further divide out, like with the sub domain. And what you need to understand in this particular site is there is a DNS hierarchy, and we have root level domain and top level domain, and if the request for a website with DNS records is not found within that DNS server or that DNS server so on, what\'s going to happen is the DNS server will forward that request to Another DNS server within the proposal for that translation, the NS lookup command. NS lookup is a computer operating system utility that allows a user to manually query the DNS servers configured on the device to resolve a given host name. This utility can be used to troubleshoot name resolution issues and to verify the current status of the name servers when the NS lookup command is issued, the default DNS server configured for your host is displayed. The name of a host or domain can be entered at the NS lookup prompt. So if you look at on your top right hand side in this example, they use the NS lookup to look for DNS dash, you know it will give out the DNS dash js.cisco.com, and it will give you that NS lookup DNS server information. And when it go and look for this, www.cisco.com, which is basically a name of a host or domain that we are entering here, the user is entering here, it will return the server information and associated IP addresses with respect to that server information as well. But however look, the NS lookup for a domain may also show DNS request timeout messages, which is not shown here the NS lookup here on the bottom right hand corner is showing exactly that timeout messages. These timeout messages doesn\'t mean that the website cannot be reached, because that may be because they your request is trying to reach that DNS and it, you know, it taking a little bit of time to get that information back. In this example, what I have done is I log into my computer and look for the and enter the NS lookup command, and it returns back with the information for my default server. In this case, I have a DNS server that is manager net. And IP address associated with that is 192 160 1.1 and I look for the remote website, the website that is not located within my building, within my internal network, called sanuja.com and it went and looked for. Manager.com records on manager net DNS server. And what happened in this situation is it returned time out messages because they are still looking for it is going to the next DNS and is waiting for authoritative answer. Finally they get a non authoritative answer right here. And finally it found the sanitary.com IP address, which is 191, 185255, 33, because it\'s finally found that information on a DNS record. So that\'s some one of the things that is not included in original slide of Cisco. I included because I think it is important for your exams, it does show up. So NS lookup may return timeout messages, Dynamic Host Configuration Protocol or DSCP, the Dynamic Host Configuration Protocol for IPv four service automates the assignment of IPv four addresses, subnet mask, gateways and other IPv four networking parameters. DSCP is considered dynamic addressing compared to static addressing. Static addressing is manually entered IP address information. So what makes it dynamic is that if you have a device, especially cell phones and mobile devices, it can just connect it to your Wi Fi network after entering the proper credentials, and it will automatically receive a DSCP IP address, because it is dynamically assigned, And the user doesn\'t have to configure any static IP addresses or a gateway, default gateway subnet mask and etc, etc, when a host connects to a network, the DHCP server is contacted and the address is requested. The DHCP server chooses an address from a configured range of addresses, call a pool and assign or lease it to the host. Many networks use both DHCP and static addressing. DHCP is used for general purpose hosts, such as the end user devices, while the static addressing is used for network devices, such as gateway routers, switches, servers and printers. So if you have a corporate network or home network and you have a printer, network printer or a file server, I would recommend that you use static IP addresses, because you do not want those server IP addresses, such as FTP clients, IP addresses to change all the time, because that is something that is being always accessed by multiple clients, multiple end users, and it will always be connected to your network. It\'s not like a mobile device that keep connecting and disconnecting whenever, if the mobile device is within your network connection area or not, right? But however, having that DSCP pool of IP addresses allow you to connect your cell phones, laptop computers, new devices. When your friends arrive at your home and connected to either your Wi Fi network or through a wired connection, your DSCP pool will automatically assign all the information it needs, the subnet mask, the IP address, the DNA, DSCP and DNS configurations and everything will be assigned to that DSCP server. So that\'s why you you might use both DSCP and static addresses, even at home and not DSCP for IP v6 is known as DSCP v6 provides similar services for IP v6 clients. However, the DSCP version six does not provide a default gateway address. This can only be obtained dynamically from the router advertisement messages, and they are known as the RA messages, and we actually went through some of those IPv six message overviews on our previous lectures. If you are interested in learning about the DHCP version six overview, you can go ahead and check my previous discussions, the previous lectures associated with this lecture series, you should know basic concepts associated with that for exams and quizzes, for CCNA and CCNP exams, DSCP operation. This is a important concept that you should understand and you should remember, like back of your hand for your exams. So when an IP v4 DSCP configure device boots up or connects to the network, the client broadcast a DSCP discover message to identify any. Available DSCP servers on the network. So that message sometimes is called DSCP discover message, and a DSCP server replies with a DSCP offer message, which is known as a DSCP offer message, or DHCP offer, which offer a lease to the client. So the when, when you first boot up or connect to a IPv for DHCP configure device is send a DSCP discover message, and the DSCP server reply with the DHCP offer message. The client send a DSCP request, which is a DSCP request message that identify the explicit server and lease offer that the client is accepting. So they\'re saying, Hey, I\'m accepting that, you know, offer, then the server returns a DSCP acknowledgement message known as a DHCP arc message, that acknowledges to the client that the lease has been finalized. If the offer is no longer valid, then the selected server respond with a DSCP negative acknowledgement known as a DHCP nak message, or NAC message, and the process must begin with a new DSCP discover message, which started at the beginning up here and on the right hand side, on that on this diagram, that is what the Cisco is trying to, you know, explain here. So you have a client that just got boot, booted up or just connected to this new network, and he sent a DSCP discover message, and the DSCP server, whichever the DSCP server available in that network, or the DHCP server that the first DHCP server that received that information gonna respond back with the DHCP offer message, and then The client sent a message back, saying the DSCP request that identify the server and the least of our information, and then the DSCP server come back with the DSCP arc message, which is an acknowledgement of that this client Is will be using that particular the IP addresses and information retrieve from that DHCP server, not DHCP version six has a set of messages that is similar to those for DHCP version four. The DHCP version six messages are sello, state, advertise, information, request and reply, as opposed to DHCP. Discover DHCP, offer DHCP request and DSCP arc messages on the IPv four side of DHCP. So those are like the differences for these exams and quizzes for CCNA and CCMP, you should know the differences between the IPv four DSCP messages and IPv six DSCP messages. However, in this lecture series, we usually cover IPv four more than IPv six. There is a lab available to you on your Cisco NetAcad site, if you have access to it, please go ahead and do the lab. Call observe DNS resolution. If you do not have access to this particular lab, I will try to find a copy of that lab and post to my website so that you can go ahead and do them. I would pause this video and do this lab. If you do have access to this lab, you server, file sharing services, File Transfer Protocol, or FTP, was developed to allow for data transfers between a client and server. An FTP client is an application which runs on a computer that being used to push and pull data from an FTP server. So the client so is a piece of application or a software that has to run on the the end device in client side that it can be used to push and pull data from the FTP server. In other words, save data or retrieve data from the server. So how this protocol works is, in step one, the clients establishes the first connection to the server for the control traffic using TCP, port number 21 again, remember the differences between TCP and UDP protocols from our previous lectures. And if you don\'t remember that, you should go ahead and check that on my YouTube channel. It\'s in the same lecture series. So FTP uses the TCP, which is a reliable connection, and it uses port number 21 the traffic consists of client commands and. Server replies. In steps two, the client establishes the second connection to the server for the actual data transfer using the TCP port number 20, this connection is created every time there is data to be transferred. In step three, the data transfer can happen in either direction. The client can download, which is pulling data from the server, or the client can upload, which is the pushing data to the server. So that\'s what they\'re trying to explain here on the left hand side. So you have the FTP server. You have a network in between the client and the server and the client have the FTP client install, and it used the control connection, and the client opens the first connection to the server for the control traffic, and then the data can once the data connection is established, the clients open the second connection for the data traffic. So that\'s what it is explained. So port 21 is that control right here happening at the big very beginning, when the clients connect to the server, and the port 20 is the data connection that is created to transfer data between the client and the server. Server Message Block or SMB is a client, server, request, response, file sharing protocol servers can make their own resources available to clients on the network. There are three functions of server, message block or SMB messages. There are start, authenticate and terminate sessions, control file and print, access and allow an application to send or receive messages to or from another device. Unlike the file sharing supported by FTP clients, establish a long term connection to the servers after the connection is established, the user of the client can access the resources on the server as though the resources is local to the client host. So this is a very important concept, unlike the FTP where you had have an FTP client in order to access those files within the FTP server, using SMB, the Server Message Block. What you can do, actually, you can create a network folder within your client\'s computer, and once that network connection is established, once the client establishes a long term connection, using the SMB, the user of that client can access the resources on the server through the that connection like that, it is a local file like for example, if you have a network drive at your office, for example, every single time you log into your computer, when you access that network drive through your Windows Computer, that is most likely we use in the Server Message Block system. So those are the differences between the FTP and the Server Message Block so Server Message Block clients establish a long term connection to the server. And that would bring us to the end of this lecture, and I will go over a summary of what we have covered in this module. We learn application layer protocols are used to exchange data between programs running on the source and destination host. The presentation layer has three primary function formatting or presenting data, compressing data and encrypting data for transmission and decrypting data upon receipt. The session layer creates and maintains dialogs between source and destination applications in the client server model, the device requesting the information is called a client, while the device responding to the request is called a server. In a peer to peer network, two or more computers are connected. We are a network, and can share resources without having a dedicated server. So make sure you know the differences between client server model and peer to peer network and how to describe them. Three common HTTP message types are get post and put and make sure you know the definitions of those and how they are differ from each other. Email supports three separate protocols for operation, SMTP, POP and IMAP and again, make sure you know the differences among them, and especially POP and IMAP DNS protocol matches resource names with the required numeric network address, and remember why we need DNS, because humans are easy. For humans, it is easy to remember sanoji. Dot com or cisco.com as opposed to remembering an IP address for sandwich.com and that\'s why we the what is the primary reason why we have DNS, the DSCP for IPv four service automates the assignment of IPv four addresses, subnet mask gateways and other IPv four networking parameters the DHCP version six messages are solicit, advertise, information, request and reply. We did not go over in depth how the DHCP version six messages works, but you should know roughly the differences between IPv four, DSCP and the IPv six, DHCP. An FTP client is an application which runs on a computer that is being used to push and pull data, in other words, send data or retrieve data from an FTP client. And remember, FTP client is required on the end device in order for it to access the FTP server, three functions of SMB messages start, authenticate and terminate sessions, control file and printer access and allow application To send or receive messages to or from another device. You should also remember that compared to FTP, SMB creates long term connections with your end client, and that allow the user that is using SMB to access network drive drives containing files and folders like they are accessing that information as a local resource, as opposed to FTP. You it\'s, it\'s, you know, it\'s pretty obvious, it is a remote resource. So those are like key differences between FTP and SMB you should be remember for your CCNA and CCNP exams.