逆水行舟用力撑,一篙松劲退千寻。这篇文章主要讲述[Network]Application Layer相关的知识,希望能为你提供帮助。
1 Principles of Network Applications
1.1 Application Architectures
Client-ServerPeer-to-PeerHybird of C/S and P2P--Skypeclient-server: find the address of the remote clientclient-client: direct communication--Instant messagingSimilar with Skype
1.2 Application Requirements(From Transport Layer Services)
1. About Data Loss2. Timing3. Throughput4. Security
2 Application-Layer Protocols
2.1 Web and HTTP
1. Properties of HTTP
Uses TCP
Nonpersistent HTTP: One TCP connection for One object transmission
RTT: time for a small packet from client to server and back.
Response time: RTT(TCP connection) + RTT(HTTP request) + file transmission
文章图片
Persistent HTTP: Multiple Objects on One TCP connection
HTTP is stateless:
server maintains no information about past client requests.
2. HTTP Request messages:
Request line: method path protocol
Header lines
Entity body
3. HTTP Response messages:
Status line: protocol statuscode statusphrase
Header lines
Data
4. Cookies
As we have disscussed above, HTTP is stateless, so if we want to keep states of users, we must utilize the process of HTTP to get it.
Most of Web Sites use cookies.
Four components:
1) cookie header line in HTTP request message
2) cookie header line in HTTP response message
3) cookie file kept on user‘s host, managed by user browser
4) cookie file kept on server database of Web sites
To sum up, HTTP is stateless for it does not store the information of user states. But we can store the cookies in user hosts and servers and let the HTTP messages carry states.
5. Web cacheWhy caching
1) reduce response time
2) reduce traffic
With HTTP:
Use conditional GET: If-modified-since, Not-modified
2.2 FTP
FTP seperate control and data connections, see following:
文章图片
out-of-band: 是控制和数据分离,当有紧急情况(控制数据须要传输时。控制传输具有较高的优先级)1) client build control connection, server build data connection2) FTP is stateful
2.3 Email
1. SMTP: reliably transfer email messages(TCP connection)
文章图片
Compare with HTTPHTTP: pull(GET); No such restriction; each object encapsulated in its own response msgSMTP: push(transfer); 7-bit ASCII; multiple objects sent in multiple msgMessage Format: 7-bit ASCIIheader lines (if extention, add some lines to declare the file type)body2. POP3Store email locally.3. IMAPStore on mail server.4. The difference of themThis part I most quoted from the page.SMTP is the basis. POP3(locally, stateless) and IMAP(on the server, stateful-folder) are used to access the mails.
2.4 DNS
TLD: Top-Level-Domain com, cn, org ... 1. DNS recordshostname is the name of a host - ibmdomain is part of URL you can consider as. - ibm.comalias name is URL - www.ibm.comcanonical name is real name - servereast.backup2.ibm.com
文章图片
2. DNS Protocol, Messagequery and reply messagesheader: identification and flagssome fields3. An Example: Inserting records into DNS(networkutopia.com,dns1.networkutopia.com, NS)
(dns1.networkutopia.com,212.212.212.1, A)
Then others can find your web site at IP 212.212.212.1
2.5 P2P
There are some properties of P2P:1) no always-on server2) end systems directly communicate3) peers change IP1. File Distribution C/S is " N copies upload and N copies download" , but P2P is " One copy uploads and N copies download" .BitTorrenttracker: track peers participating in torrent. - an individualtorrent: group of peers exchanging chunks of a file. - a group
文章图片
The processes of bit torrent consist of pulling chunks and sending chunks.- When downloading chunks, the peer will request a list of chunks from its neighbors, and choose the rarest chunks first. (从最稀缺的内容開始)- When uploading chunks, the peer will send chunks to four neighbors currently sending it chunks at highest rate.(投桃报李)So one file will be held by several peers in the network and each peer can both download and upload. And there are some prescriptions for peers to down and up.2. Searching for InformationQuery bloodis a method to find resource in a P2P network. Because the graph of P2P network may not be connected by each node. So a query must be broadcasted in the network to find a resource.It may cause DoS attack.The TCP connection built in the process of blooding form a hierarchical searching graph.3. SkypeAlmost similar with BitTorrent and Query blood.
【[Network]Application Layer】
End.
推荐阅读
- 小程序微商城功能定制开发系统App
- Android activity之间的跳转和数据传递
- Android混淆
- 强烈鄙视那些(自己完全不用android手机,却在做android开发的人)
- android 自定义控件之水波纹loading的实现
- POJ 2486 Apple Tree(树型dp)
- Maven报错( Could not resolve archetype org.apache.maven.archetypes:maven-archetype-webapp)
- Android 四大组件学习之ContentProvider二
- Android LayoutInflater