CS475: Computer Networks - The Application Layer
Activity Goals
The goals of this activity are:- To describe the functionality of application layer protocols including HTTP and SMTP
Supplemental Reading
Feel free to visit these resources for supplemental background reading material.The Activity
Directions
Consider the activity models and answer the questions provided. First reflect on these questions on your own briefly, before discussing and comparing your thoughts with your group. Appoint one member of your group to discuss your findings with the class, and the rest of the group should help that member prepare their response. Answer each question individually from the activity, and compare with your group to prepare for our whole-class discussion. After class, think about the questions in the reflective prompt and respond to those individually in your notebook. Report out on areas of disagreement or items for which you and your group identified alternative approaches. Write down and report out questions you encountered along the way for group discussion.Model 1: HTTP
Questions
- If a web page contained an image, what would need to happen? How might this be optimized? Hint: this optimization is implemented in HTTP/1.1
- What information could be stored to maintain state between requests; that is, to associate a request with a particular user or session? Why isn't a stateful session mechanism built into HTTP?
- Look up a few HTTP response code numbers. What pattern do you see?
- What are some HTTP client headers and what do they do?
- How do you upload a file via HTTP?
- Since socket I/O is typically a blocking call, how can you know how much data to read from the socket so that you don't block forever waiting for data that never arrives?
- How do you know when you are finished sending or receiving headers? How do you parse each header? How do you know when HTTP (or web page) data begins and ends?
Model 2: SMTP
(From Wikipedia)
Questions
- How does a mail client indicate to the server that they are finished sending a message? What if the sender wishes to transmit that character?
- How might a sender authenticate against the server?
- Where does the sender indicate their email address? What unfortunate consequence could result from this?
- How might a sender attach a file?
- What might you do if you were sending non-text, like an MP3 file, over a text-based protocol like this one?
Model 3: End-to-End Review
Questions
- Describe, in your own words, the life of a packet from end to end!