SlideShare a Scribd company logo
1 of 35
The Application Layer
10/29/2023 Dr.T.Thendral - CN
DNSā€”The Domain Name System
ā€¢ IP addresses: These addresses are hard for
people to remember
ā€¢ To solve these problems, DNS (the Domain
Name System) was invented.
ā€¢ DNS is the phonebook of the Internet
ā€¢ DNS translates domain names to IP addresses
so browsers can load Internet resources.
10/29/2023 Dr.T.Thendral - CN
The DNS Name Space
ā€¢ A portion of the Internet domain name space
10/29/2023 Dr.T.Thendral - CN
Reference
10/29/2023 Dr.T.Thendral - CN
EXAMPLES
ā€¢ 1. cs.yale.edu (Yale University, in the United
States)
ā€¢ 2. cs.vu.nl (Vrije Universiteit, in The
Netherlands)
ā€¢ 3. cs.keio.ac.jp (Keio University, in Japan)
10/29/2023 Dr.T.Thendral - CN
Resource Records
ā€¢ Every domain, whether it is a single host or a
top-level domain, can have a set of resource
records associated with it
ā€¢ For a single host, the most common resource
record is just its IP address
ā€¢ A resource record is a five-tuple
ā€¢ The format we will use is as follows:
Domain_name Time_to_live Class Type Value
10/29/2023 Dr.T.Thendral - CN
ā€¢ The Domain_name tells the domain to which
this record applies
ā€¢ The Time_to_live field gives an indication of
how stable the record is
ā€¢ The third field of every resource record is the
Class
ā€¢ For Internet information, it is always IN.
10/29/2023 Dr.T.Thendral - CN
The Principal DNS Resource Record Types
For Internet Protocol version 4 (IPv4)
10/29/2023 Dr.T.Thendral - CN
IPv4 an address consists of 32 bits
10/29/2023 Dr.T.Thendral - CN
Name Servers
ā€¢ DNS name server is a server that stores the
DNS records
ā€¢ To avoid the problems associated with having
only a single source of information, the DNS
name space is divided into nonoverlapping
zones
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
Electronic Mail
ā€¢ Electronic mail, or e-mail, as it is known to its many
fans, has been around for over two decades
ā€¢ Before 1990, it was mostly used in academia
ā€¢ E-mail, like most other forms of communication, has
its own conventions and styles
ā€¢ In particular, it is very informal and has a low
threshold of use
ā€¢ E-mail is full of jargon such as BTW (By The Way),
ROTFL (Rolling On The Floor Laughing), and IMHO (In
My Humble Opinion)
10/29/2023 Dr.T.Thendral - CN
Some smileys
ā€¢ Many people also use little ASCII symbols
called smileys or emoticons in their e-mail
10/29/2023 Dr.T.Thendral - CN
Some of the complaints were as follows:
1. Sending a message to a group of people was inconvenient. Managers often
need this facility to send memos to all their subordinates.
2. Messages had no internal structure, making computer processing difficult
For example, if a forwarded message was included in the body of another
message, extracting the forwarded part from the received message was
difficult.
3. The originator (sender) never knew if a message arrived or not.
4. If someone was planning to be away on business for several weeks and
wanted all incoming e-mail to be handled by his secretary, this was not easy to
arrange.
5. The user interface was poorly integrated with the transmission system
requiring users first to edit a file, then leave the editor and invoke the file
transfer program.
6. It was not possible to create and send messages containing a mixture of
text, drawings, facsimile, and voice
10/29/2023 Dr.T.Thendral - CN
Architecture and Services
ā€¢ They normally consist of two subsystems:
ā€¢ The user agents, which allow people to read
and send e-mail, and the message transfer
agents, which move the messages from the
source to the destination
ā€¢ Typically, e-mail systems support five basic
functions
ā€¢ Composition, Transfer, Reporting, Displaying,
Disposition
10/29/2023 Dr.T.Thendral - CN
ā€¢ Most systems allow users to create mailboxes
to store incoming e-mail
ā€¢ Commands are needed to create and destroy
mailboxes, inspect the contents of mailboxes,
insert and delete messages from mailboxes,
and so on.
ā€¢ This gives rise to the idea of a mailing list,
which is a list of e-mail addresses
ā€¢ A key idea in e-mail systems is the distinction
between the envelope and its contents
ā€¢ The message inside the envelope consists of
two parts: the header and the body
10/29/2023 Dr.T.Thendral - CN
The User Agent
ā€¢ Sending E-mail, Reading E-mail
ā€¢ An example display of the contents of a
mailbox
10/29/2023 Dr.T.Thendral - CN
Message Formats
10/29/2023 Dr.T.Thendral - CN
RFC 822 header fields related to message transport
10/29/2023 Dr.T.Thendral - CN
MIMEā€”The Multipurpose Internet Mail
Extensions
1. Messages in languages with accents (e.g.,
French and German)
2. Messages in non-Latin alphabets (e.g.,
Hebrew and Russian)
3. Messages in languages without alphabets
(e.g., Chinese and Japanese)
4. Messages not containing text at all (e.g.,
audio or images)
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
Message Transfer
ā€¢ SMTPā€”The Simple Mail Transfer Protocol
ā€¢ (a) Sending and reading mail when the receiver has a permanent Internet
connection and the user agent runs on the same machine as the message
transfer agent
ā€¢ (b) Reading e-mail when the receiver has a dial-up connection to an ISP
(internet service provider)
10/29/2023 Dr.T.Thendral - CN
Network Security
ā€¢ Most security problems are intentionally
caused by malicious people trying to gain
some benefit, get attention, or to harm
someone
ā€¢ Some people who cause security problems
and why
10/29/2023 Dr.T.Thendral - CN
ā€¢ Network security problems can be divided
roughly into four areas:
ā€¢ secrecy, authentication, nonrepudiation, and
integrity control
10/29/2023 Dr.T.Thendral - CN
Cryptography
ā€¢ Cryptography comes from the Greek words for
''secret writing.'ā€˜
ā€¢ Professionals make a distinction between
ciphers and codes
ā€¢ A cipher is a character-for-character or bit-
for-bit transformation, without regard to the
linguistic structure of the message
ā€¢ In contrast, a code replaces one word with
another word or symbol
10/29/2023 Dr.T.Thendral - CN
Introduction to Cryptography
10/29/2023 Dr.T.Thendral - CN
Substitution Ciphers
ā€¢ In a substitution cipher each letter or group of
letters is replaced by another letter or group
of letters to disguise it
ā€¢ One of the oldest known ciphers is the Caesar
cipher, attributed to Julius Caesar.
ā€¢ In this method, a becomes D, b becomes E, c
becomes F, ... , and z becomes C
10/29/2023 Dr.T.Thendral - CN
ā€¢ The next improvement is to have each of the symbols
in the plaintext, say, the 26 letters for simplicity, map
onto some other letter.
ā€¢ For example,
ā€¢ plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
ā€¢ ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C
V B N M
ā€¢ The general system of symbol-for-symbol
substitution is called a monoalphabetic substitution
ā€¢ The plaintext attack would be transformed into the
ciphertext QZZQEA
10/29/2023 Dr.T.Thendral - CN
Transposition Ciphers
ā€¢ Transposition ciphers, in contrast, reorder the
letters but do not disguise them
ā€¢ In this example, MEGABUCK is the key
10/29/2023 Dr.T.Thendral - CN
One-Time Pads
ā€¢ First choose a random bit string as the key
ā€¢ Then convert the plaintext into a bit string, for
example by using its ASCII representation
ā€¢ With a one-time pad, the encryption
algorithm is simply the XOR operation
ā€¢ The resulting ciphertext cannot be broken,
This method, known as the one-time pad
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
Two Fundamental Cryptographic
Principles
ā€¢ Redundancy - The first principle is that all
encrypted messages must contain some
redundancy, that is, information not needed
to understand the message
ā€¢ Cryptographic principle 1: Messages must
contain some redundancy
ā€¢ EX: CRC, Hamming or Reed Solomon code is a
more efficient way to do error detection and
correction
10/29/2023 Dr.T.Thendral - CN
Freshness
ā€¢ Cryptographic principle 2: Some method is
needed to foil replay attacks
ā€¢ The second cryptographic principle is that
some measures must be taken to ensure that
each message received can be verified as
being fresh, that is, sent very recently
10/29/2023 Dr.T.Thendral - CN

More Related Content

What's hot

Networking devices
Networking devicesNetworking devices
Networking devicesRavi KC
Ā 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
Ā 
Lan technologies
Lan technologiesLan technologies
Lan technologiesManusha Dilan
Ā 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link LayerMeenakshi Paul
Ā 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolUjjayanta Bhaumik
Ā 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
Ā 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIAKak Yong
Ā 
Computer networking
Computer networkingComputer networking
Computer networkingMaulik Togadiya
Ā 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in NetworkingMuhammad Arshad
Ā 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
Ā 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided mediaHassan Osama
Ā 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
Ā 
Data link control
Data link controlData link control
Data link controlIffat Anjum
Ā 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3JAIGANESH SEKAR
Ā 

What's hot (20)

Networking devices
Networking devicesNetworking devices
Networking devices
Ā 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Ā 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Ā 
Telnet ppt
Telnet pptTelnet ppt
Telnet ppt
Ā 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
Ā 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Ā 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ā 
Forouzan ppp
Forouzan pppForouzan ppp
Forouzan ppp
Ā 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
Ā 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ā 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
Ā 
Token ring
Token ringToken ring
Token ring
Ā 
Frame Relay
Frame RelayFrame Relay
Frame Relay
Ā 
Computer networking
Computer networkingComputer networking
Computer networking
Ā 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
Ā 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Ā 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
Ā 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
Ā 
Data link control
Data link controlData link control
Data link control
Ā 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
Ā 

Similar to The Application Layer.ppt

Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalsravya reddy
Ā 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mailMaxwell Musonda
Ā 
Lecture 3 internet and web
Lecture 3 internet and webLecture 3 internet and web
Lecture 3 internet and webDhiviya Rose
Ā 
SUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptxSUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptxBagalanaSteven
Ā 
12 IPT0302 Examples of Communication Systems
12 IPT0302   Examples of Communication Systems12 IPT0302   Examples of Communication Systems
12 IPT0302 Examples of Communication Systemsctedds
Ā 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfSuriyaMahendran2
Ā 
e COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptxe COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptxREVITADESIHERTIN
Ā 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1Vasanti Dutta
Ā 
Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)80094859
Ā 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)GulshanKumar368
Ā 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technologyInexk Pedrero
Ā 
Application Layer
Application LayerApplication Layer
Application Layerushabarad142
Ā 
network.pptx
network.pptxnetwork.pptx
network.pptxssuser8347a1
Ā 
The internet
The internetThe internet
The internetjoseph0914
Ā 

Similar to The Application Layer.ppt (20)

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
Ā 
applicationlayer.pptx
applicationlayer.pptxapplicationlayer.pptx
applicationlayer.pptx
Ā 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mail
Ā 
Lecture 3 internet and web
Lecture 3 internet and webLecture 3 internet and web
Lecture 3 internet and web
Ā 
SUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptxSUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptx
Ā 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
Ā 
12 IPT0302 Examples of Communication Systems
12 IPT0302   Examples of Communication Systems12 IPT0302   Examples of Communication Systems
12 IPT0302 Examples of Communication Systems
Ā 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdf
Ā 
e COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptxe COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptx
Ā 
Electronic communication
Electronic communicationElectronic communication
Electronic communication
Ā 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
Ā 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
Ā 
Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)
Ā 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
Ā 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
Ā 
IS100 Week 5
IS100 Week 5IS100 Week 5
IS100 Week 5
Ā 
Networking
Networking Networking
Networking
Ā 
Application Layer
Application LayerApplication Layer
Application Layer
Ā 
network.pptx
network.pptxnetwork.pptx
network.pptx
Ā 
The internet
The internetThe internet
The internet
Ā 

More from DrTThendralCompSci

SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptDrTThendralCompSci
Ā 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.pptDrTThendralCompSci
Ā 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptxDrTThendralCompSci
Ā 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptxDrTThendralCompSci
Ā 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptxDrTThendralCompSci
Ā 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.pptDrTThendralCompSci
Ā 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptDrTThendralCompSci
Ā 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxDrTThendralCompSci
Ā 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptDrTThendralCompSci
Ā 

More from DrTThendralCompSci (14)

Loader and linker.pptx
Loader and linker.pptxLoader and linker.pptx
Loader and linker.pptx
Ā 
SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
Ā 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
Ā 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
Ā 
SOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
Ā 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
Ā 
Ethernet.ppt
Ethernet.pptEthernet.ppt
Ethernet.ppt
Ā 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
Ā 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
Ā 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
Ā 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
Ā 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
Ā 
PROCESS MODELS.ppt
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
Ā 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
Ā 

Recently uploaded

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
Ā 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
Ā 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Ā 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
Ā 
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,Virag Sontakke
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
Ā 

Recently uploaded (20)

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Ā 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Ā 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Ā 
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Ā 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
Ā 
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
ą¤­ą¤¾ą¤°ą¤¤-ą¤°ą„‹ą¤® ą¤µą„ą¤Æą¤¾ą¤Ŗą¤¾ą¤°.pptx, Indo-Roman Trade,
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
Ā 

The Application Layer.ppt

  • 1. The Application Layer 10/29/2023 Dr.T.Thendral - CN
  • 2. DNSā€”The Domain Name System ā€¢ IP addresses: These addresses are hard for people to remember ā€¢ To solve these problems, DNS (the Domain Name System) was invented. ā€¢ DNS is the phonebook of the Internet ā€¢ DNS translates domain names to IP addresses so browsers can load Internet resources. 10/29/2023 Dr.T.Thendral - CN
  • 3. The DNS Name Space ā€¢ A portion of the Internet domain name space 10/29/2023 Dr.T.Thendral - CN
  • 5. EXAMPLES ā€¢ 1. cs.yale.edu (Yale University, in the United States) ā€¢ 2. cs.vu.nl (Vrije Universiteit, in The Netherlands) ā€¢ 3. cs.keio.ac.jp (Keio University, in Japan) 10/29/2023 Dr.T.Thendral - CN
  • 6. Resource Records ā€¢ Every domain, whether it is a single host or a top-level domain, can have a set of resource records associated with it ā€¢ For a single host, the most common resource record is just its IP address ā€¢ A resource record is a five-tuple ā€¢ The format we will use is as follows: Domain_name Time_to_live Class Type Value 10/29/2023 Dr.T.Thendral - CN
  • 7. ā€¢ The Domain_name tells the domain to which this record applies ā€¢ The Time_to_live field gives an indication of how stable the record is ā€¢ The third field of every resource record is the Class ā€¢ For Internet information, it is always IN. 10/29/2023 Dr.T.Thendral - CN
  • 8. The Principal DNS Resource Record Types For Internet Protocol version 4 (IPv4) 10/29/2023 Dr.T.Thendral - CN IPv4 an address consists of 32 bits
  • 10. Name Servers ā€¢ DNS name server is a server that stores the DNS records ā€¢ To avoid the problems associated with having only a single source of information, the DNS name space is divided into nonoverlapping zones 10/29/2023 Dr.T.Thendral - CN
  • 13. Electronic Mail ā€¢ Electronic mail, or e-mail, as it is known to its many fans, has been around for over two decades ā€¢ Before 1990, it was mostly used in academia ā€¢ E-mail, like most other forms of communication, has its own conventions and styles ā€¢ In particular, it is very informal and has a low threshold of use ā€¢ E-mail is full of jargon such as BTW (By The Way), ROTFL (Rolling On The Floor Laughing), and IMHO (In My Humble Opinion) 10/29/2023 Dr.T.Thendral - CN
  • 14. Some smileys ā€¢ Many people also use little ASCII symbols called smileys or emoticons in their e-mail 10/29/2023 Dr.T.Thendral - CN
  • 15. Some of the complaints were as follows: 1. Sending a message to a group of people was inconvenient. Managers often need this facility to send memos to all their subordinates. 2. Messages had no internal structure, making computer processing difficult For example, if a forwarded message was included in the body of another message, extracting the forwarded part from the received message was difficult. 3. The originator (sender) never knew if a message arrived or not. 4. If someone was planning to be away on business for several weeks and wanted all incoming e-mail to be handled by his secretary, this was not easy to arrange. 5. The user interface was poorly integrated with the transmission system requiring users first to edit a file, then leave the editor and invoke the file transfer program. 6. It was not possible to create and send messages containing a mixture of text, drawings, facsimile, and voice 10/29/2023 Dr.T.Thendral - CN
  • 16. Architecture and Services ā€¢ They normally consist of two subsystems: ā€¢ The user agents, which allow people to read and send e-mail, and the message transfer agents, which move the messages from the source to the destination ā€¢ Typically, e-mail systems support five basic functions ā€¢ Composition, Transfer, Reporting, Displaying, Disposition 10/29/2023 Dr.T.Thendral - CN
  • 17. ā€¢ Most systems allow users to create mailboxes to store incoming e-mail ā€¢ Commands are needed to create and destroy mailboxes, inspect the contents of mailboxes, insert and delete messages from mailboxes, and so on. ā€¢ This gives rise to the idea of a mailing list, which is a list of e-mail addresses ā€¢ A key idea in e-mail systems is the distinction between the envelope and its contents ā€¢ The message inside the envelope consists of two parts: the header and the body 10/29/2023 Dr.T.Thendral - CN
  • 18. The User Agent ā€¢ Sending E-mail, Reading E-mail ā€¢ An example display of the contents of a mailbox 10/29/2023 Dr.T.Thendral - CN
  • 19. Message Formats 10/29/2023 Dr.T.Thendral - CN RFC 822 header fields related to message transport
  • 21. MIMEā€”The Multipurpose Internet Mail Extensions 1. Messages in languages with accents (e.g., French and German) 2. Messages in non-Latin alphabets (e.g., Hebrew and Russian) 3. Messages in languages without alphabets (e.g., Chinese and Japanese) 4. Messages not containing text at all (e.g., audio or images) 10/29/2023 Dr.T.Thendral - CN
  • 24. Message Transfer ā€¢ SMTPā€”The Simple Mail Transfer Protocol ā€¢ (a) Sending and reading mail when the receiver has a permanent Internet connection and the user agent runs on the same machine as the message transfer agent ā€¢ (b) Reading e-mail when the receiver has a dial-up connection to an ISP (internet service provider) 10/29/2023 Dr.T.Thendral - CN
  • 25. Network Security ā€¢ Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone ā€¢ Some people who cause security problems and why 10/29/2023 Dr.T.Thendral - CN
  • 26. ā€¢ Network security problems can be divided roughly into four areas: ā€¢ secrecy, authentication, nonrepudiation, and integrity control 10/29/2023 Dr.T.Thendral - CN
  • 27. Cryptography ā€¢ Cryptography comes from the Greek words for ''secret writing.'ā€˜ ā€¢ Professionals make a distinction between ciphers and codes ā€¢ A cipher is a character-for-character or bit- for-bit transformation, without regard to the linguistic structure of the message ā€¢ In contrast, a code replaces one word with another word or symbol 10/29/2023 Dr.T.Thendral - CN
  • 29. Substitution Ciphers ā€¢ In a substitution cipher each letter or group of letters is replaced by another letter or group of letters to disguise it ā€¢ One of the oldest known ciphers is the Caesar cipher, attributed to Julius Caesar. ā€¢ In this method, a becomes D, b becomes E, c becomes F, ... , and z becomes C 10/29/2023 Dr.T.Thendral - CN
  • 30. ā€¢ The next improvement is to have each of the symbols in the plaintext, say, the 26 letters for simplicity, map onto some other letter. ā€¢ For example, ā€¢ plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z ā€¢ ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C V B N M ā€¢ The general system of symbol-for-symbol substitution is called a monoalphabetic substitution ā€¢ The plaintext attack would be transformed into the ciphertext QZZQEA 10/29/2023 Dr.T.Thendral - CN
  • 31. Transposition Ciphers ā€¢ Transposition ciphers, in contrast, reorder the letters but do not disguise them ā€¢ In this example, MEGABUCK is the key 10/29/2023 Dr.T.Thendral - CN
  • 32. One-Time Pads ā€¢ First choose a random bit string as the key ā€¢ Then convert the plaintext into a bit string, for example by using its ASCII representation ā€¢ With a one-time pad, the encryption algorithm is simply the XOR operation ā€¢ The resulting ciphertext cannot be broken, This method, known as the one-time pad 10/29/2023 Dr.T.Thendral - CN
  • 34. Two Fundamental Cryptographic Principles ā€¢ Redundancy - The first principle is that all encrypted messages must contain some redundancy, that is, information not needed to understand the message ā€¢ Cryptographic principle 1: Messages must contain some redundancy ā€¢ EX: CRC, Hamming or Reed Solomon code is a more efficient way to do error detection and correction 10/29/2023 Dr.T.Thendral - CN
  • 35. Freshness ā€¢ Cryptographic principle 2: Some method is needed to foil replay attacks ā€¢ The second cryptographic principle is that some measures must be taken to ensure that each message received can be verified as being fresh, that is, sent very recently 10/29/2023 Dr.T.Thendral - CN