Internet History, Technology and Security (Week 7)

Week 7

Technology: Application Protocols

Welcome to Week 7 of IHTS. This week has less material than other weeks. I like to think of it as a "seventh inning stretch" - where you get a little breather. This week wraps up the three weeks of "Technology" (i.e packets and stuff). After this week we have two weeks on Security and the final exam and then you are done. Thanks for sticking with it. You are almost there.

This week, we’ll be covering application protocols. With reliable “pipes” available from the Transport layer, we can build applications like web browsers, file transfer applications, or email clients and servers.

Layer 4: Applications

Application Layer

现在讲Application Layer.

The services of the TCP layer are basically to give us a reliable, sequenced end to end stream, that can start in one application in one computer and end in an application in a different computer, and have a two way communication.

TCP give us a reliable pipe.当关注某一层级时,我们就可以忽略其他层级的实现细节。

端口(port):

像电话话号码的扩展;

具体到某一个应用(application)。

关于应用层的两个问题:

  1. 哪个应用得到data;
  2. 什么规则和应用进行通话。

One is, which application gets the data. And this is done using a mechanism called ports, and ports allow a IP address, or a single computer, or a single server, to serve up multiple services, and then for a client to be able to dial up much like a telephone extension, and pick the service that they are interested in.

一句话来说:IP地址决定你连接哪台电脑,端口决定你访问这台电脑之后,会与哪个应用通信。

下图展示了各个不同的Ports:

常用的端口

既然TCP给我们提供了一个可靠的通信管道,那我们可以用这个管道做什么呢?什么问题又需要解决呢?

So, TCP gives us this reliable connection, we now can connect to the server that we desire to connect to by using ports, and the question is, what are we going to to say across that connection, and what we say across that connection, who talks first, what do you send, what comes back, depends on the kind of server that you are talking to。

即万维网服务器。万维网中的客户端和服务端使用的是名为HTTP的协议进行通信。网址URL中的HTTP://dada.dada.dada就是。

下图是 HTTP Request/Response Cycle.点击一个运行在你电脑中的客户端client的一个link,浏览器就会和web server 连接并发送一个请求,web server看到了就会返回请求,返回的document就会出现在客户端的桌面上。

这里老师给我们展示了一个栗子:

接下来老师要介绍telnet client,不过人们认为这不安全,因为这是一个old and less secure protocols.

Van Jacobson - Content Centered Networking

这里是关于人物介绍,所以感兴趣就留言吧~

原文地址:https://www.cnblogs.com/codingbylch/p/9192551.html

时间: 2024-10-09 06:03:31

Internet History, Technology and Security (Week 7)的相关文章

Internet History, Technology and Security (Week 2)

Week 2 History: The First Internet - NSFNet Welcome to week 2! This week, we'll be covering the history of the first internet: NSFnet. In the 1960s and 1970s, there was a great deal of research done to build the first wide-area packet switched networ

Internet History, Technology and Security (Week 4)

Week 4 History: Commercialization and Growth We are now moving into Week 4! This week, we will be covering commercialization and growth. The late 1990's saw the web and Internet used increasingly to revolutionize how business was done. Companies like

Internet History, Technology and Security (Week 3)

Week 3 History: The Web Makes it Easy to Use Welcome to week 3! This is our fourth and final week of History where we make the connection from those early innovations of the modern Internet we are using for this class. Up next we move into looking at

Internet History,Technology,and Security -Technology: Application Protocols(Week7)

Week7 Technology: Application Protocols This week, we’ll be covering application protocols. With reliable “pipes” available from the Transport layer, we can build applications like web browsers, file transfer applications, or email clients and server

Internet History,Technology,and Security -Security: Encrypting and Signing(Week8)

Week 8 Security: Encrypting and Signing This week we start two weeks of Internet Security. It is a little technical but don't worry - we stay at a very high level and I am confident that if you are still keeping up with the class that you will enjoy

Internet History, Technology, and Security(week8)——Security: Encrypting and Signing

Hiding Date from Ohters Security Introduction Alice and Bob是密码学.博弈论.物理学等领域中的通用角色之一.Alice(代表A)和Bob(代表B)一般是形容好人的,用来描述通讯双方.通讯中也会出现一些不怀好意的人(People with bad intent),比如窃听者(Eve),用E代表. Security is Always a Tradeoff,安全总是一种充满妥协的权衡.对于安全这回事,几乎不存在所谓的Perfect Secur

【Internet History, Technology, and Security】第八讲心得

结束了网络协议的介绍后,本周要介绍的是网络安全. Security Introduction 网络安全其实离我们并不遥远,这里有个简单的例子.假设有两个人叫做爱丽丝(Alice)和鲍勃(Bob),也许是因为异地的原因,他们希望在网络上交流一些比较私密的信息,但这时候,可能会存在着一个心怀不轨的人,我们把他称之为C.爱丽丝和鲍勃希望自己发送的一些信息不会被打扰,然而C就在那里偷听,又或是有别的不轨的企图.如何让A与B安全的交流?这就是网络安全要做的事. 这个简单的例子应该可以让你明白安全的重要性,

【Internet History, Technology, and Security】第六讲心得

结合第五周的课程,依照TCP/IP网络架构从下往上,这周主要讲解的是传输层. Transport Layer 如果说前面都只是IP层的内容,那从传输层开始,就是TCP层面的内容了,TCP层的目的是补偿IP层中可能出现的错误,并最大限度地利用可用资源.TCP/IP组网是为了有效地共享,所以我们需要知道我们的网络是快还是慢,这就是我们用TCP层要解决的问题.底层网络的速度有多快,可靠性有多高,如果出现问题,我们应该如何处理.因此,TCP/IP协议的核心思想就是在发送数据时,将数据分成多个包,然后将每

【Internet History, Technology, and Security】第七讲心得

这一讲来到了应用层,同时也是协议体系中的顶层. Application Layer 其实从之前的课程中可以发现,每一个层次都会依赖它的下一层,应用层也一样,它将会应用TCP层的服务,TCP层的服务为应用层提供了可靠.有序的端到端数据流.可以从一台电脑中一个应用程序开始,到另一台电脑的应用中结束并可提供双向交流.在我们得到了这样的框架后,我们应该怎么去使用它?在日常通信中,我们该如何请求数据? 课程中的图给出了很好的答案,左端表示客户端,而右端则为服务端,客户端给我们信息,而服务器负责给客户端提供