SlideShare a Scribd company logo
1 of 25
Internet Connectivity Principles
Internet connectivity
Introduction
Application Layer
Protocols
Application Layer Protocols
• TCP/IP suite consists of a number application layer
protocols.
• For example, HTTP, HTTPS, FTP, Telnet and others.
Application Layer Protocols
• TCP/IP suite consists of a number application layer
protocols.
• For example, HTTP, HTTPS, FTP, Telnet and others.
Application Layer Protocols
HTTP:
• It is a protocol used to access the
data on the World Wide Web
(www).
• The HTTP protocol can be used to
transfer the data in the form of plain
text, hypertext, audio, video, and so
on.
• Its efficiency that allows us to use in
a hypertext environment where
there are rapid jumps from one
• HTTP is like the FTP as it also transfers
the files from one host to another host.
But HTTP is simpler than FTP.
• HTTP is like SMTP as the data is
transferred between client and server.
• SMTP messages are stored and
forwarded while HTTP messages are
delivered immediately.
Application Layer Protocols
Features of HTTP:
• Port number is 80.
• HTTP is the standard protocol for·
requesting a URL defined web-page
resource, and for sending a response
to the web server.
• The connection between client and
server exist only during the current
request and response time only.
• Stateless: HTTP is a stateless protocol as
both the client and server know each
other only during the current request.
• Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.
Application Layer Protocols
Features of HTTP:
• Port number is 80.
• HTTP is the standard protocol for·
requesting a URL defined web-page
resource, and for sending a response
to the web server.
• The connection between client and
server exist only during the current
request and response time only.
• Stateless: HTTP is a stateless protocol as
both the client and server know each
other only during the current request.
• Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.
Application Layer Protocols
Application Layer Protocols
• Status codes add in the response and
caching of a resource provided at a
server (and proxy).
• For example, status code returned as
response when 400 means a bad
request (the request not responding),
• 401 unauthorized request
• 402 means request requires a
• payment before response feasible,
403 means request is for a forbidden
resource and
• 404 means URL resource not found
by the server.
Application Layer Protocols
Uniform Resource Locator
(URL):
• A client that wants to access the
document in an internet needs an
address and to facilitate the access of
documents, the HTTP uses the
concept of Uniform Resource
Locator (URL).
• The URL defines four parts: method,
host computer, port, and path.
Application Layer Protocols
Method: The method is the protocol
used to retrieve the document from a
server. For example, HTTP.
Host: The host is the computer where
the information is stored, Web pages
are mainly stored in the computers and
the computers are given an alias name
that begins with the characters "www".
Application Layer Protocols
Port: The URL can also contain the port
number of the server, but it's an
optional field.
Path: Path is the pathname of the file
where the information is stored. The
path itself contain slashes that separate
the directories from the subdirectories
and files.
Application Layer Protocols
HTTPS:
• HTTPS stands for Hyper Text
Transfer Protocol Secure. It is highly
advanced and secure version of
HTTP.
• It uses the port no. 443 for Data
Communication.
• It allows the secure transactions by
encrypting the entire
communication with SSL. It is a
• HTTP also allows you to create a
secure encrypted connection
between the server and the browser.
• It offers the bi-directional security of
Data. This helps you to protect
potentially sensitive information
from being stolen.
Application Layer Protocols
Advantages of HTTPS:
• In most cases, sites running over
HTTPS will have a redirect in place.
Therefore, even if you type in
HTTP:// it will redirect to an https
over a secured connection
• It allows users to perform secure e-
commerce transaction, such as
online banking.
• SSL technology protects any users
and builds trust
• An independent authority verifies
the identity of the certificate owner.
So, each SSL Certificate contains
unique, authenticated information
about the certificate owner.
Application Layer Protocols
Limitations of HTTPS:
• HTTPS protocol can't stop stealing
confidential information from the
pages cached on the browser
• SSL data can be encrypted only
during transmission on the network.
So, it can't clear the text in the
browser memory
• HTTPS can increase computational
overhead as well as network
overhead of the organization
Application Layer Protocols
FTP:
• FTP is a standard internet protocol
provided by TCP/IP used for
transmitting the files from one host to
another.
• It is mainly used for transferring the
web page files .
• It is also used for downloading the
files to computer from other servers.
Objectives of FTP:
• It provides the sharing of files.
• It is used to encourage the use of
remote computers.
• It transfers the data more reliably and
efficiently.
Application Layer Protocols
Application Layer Protocols
Control Connection:
• The control connection uses very
simple rules for communication.
Through control connection,
• The control connection remains
connected during the entire
interactive FTP session.
Application Layer Protocols
Data Connection:
• The Data Connection uses very
complex rules as data types may
vary.
• The data connection opens when a
command comes for transferring the
files and closes when the file is
transferred.
Application Layer Protocols
Advantages:
• Speed: The FTP is one of the fastest way
to transfer the files.
• Efficient: We do not need to complete
all the operations to get the entire file.
• Security: To access the FTP server, we
need to login with the username and
password.
• Back & forth movement: Send some
information to all and they all send
information back on the same server.
Disadvantages:
• FTP serves two operations, i.e., to
send and receive large files on a
network.
• It also doesn't allow you to run
simultaneous transfers to multiple
receivers.
• Passwords and file contents are sent
in clear text that allows unwanted
eavesdropping.
• It is not compatible with every
Application Layer Protocols
TELNET:
• The main task of the internet is to
provide services to users.
• For example, users want to run different
application programs at the remote site
and transfers a result to the local site.
• This requires a client-server program
such as FTP, SMTP. But this would not
allow us to create a specific program for
each demand.
• The better solution is to provide a
general client-server program that
lets the user access any application
program on a remote computer.
• Therefore, a program that allows a
user to log on to a remote computer.
A
• Popular client-server program Telnet
is used to meet such demands. Telnet
is an abbreviation for Terminal
Application Layer Protocols
There are two types of login:
• Local Login
• Remote Login
Application Layer Protocols
There are two types of login:
• Local Login
• Remote Login
Application Layer Protocols
Advantages:
• Telnet client is versatile
• Can be used cross-platform
• Unlimited access to target resources
Disadvantages:
• Unencrypted data exchange
• Full access makes it easier for hackers
• Only few servers can be reached via
Telnet
Internet Connectivity Principles
Internet connectivity
Introduction
Application Layer
Protocols

More Related Content

What's hot

wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Network protocol
Network protocolNetwork protocol
Network protocolSWAMY NAYAK
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoTFabMinds
 
Internet connectivity
Internet connectivityInternet connectivity
Internet connectivityFabMinds
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 

What's hot (20)

wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Network switch
Network switchNetwork switch
Network switch
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
Internet connectivity
Internet connectivityInternet connectivity
Internet connectivity
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
6lowpan
6lowpan6lowpan
6lowpan
 
Osi model
Osi modelOsi model
Osi model
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Application Layer
Application Layer Application Layer
Application Layer
 

Similar to Application layer protocols

Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...smitha273566
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide WebAbhishek Kharbanda
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Nidhitransport
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.pptssuserf7cd2b
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxDSPL
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guideSrihari
 
CS-324-6-3 (2).pdf
CS-324-6-3 (2).pdfCS-324-6-3 (2).pdf
CS-324-6-3 (2).pdfRizulthakur2
 

Similar to Application layer protocols (20)

Lecture 6- http
Lecture  6- httpLecture  6- http
Lecture 6- http
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.ppt
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Web technology
Web technologyWeb technology
Web technology
 
Web technology Unit I Part C
Web technology Unit I  Part CWeb technology Unit I  Part C
Web technology Unit I Part C
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
CS-324-6-3 (2).pdf
CS-324-6-3 (2).pdfCS-324-6-3 (2).pdf
CS-324-6-3 (2).pdf
 

More from FabMinds

Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists | Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists | FabMinds
 
Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings | Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings | FabMinds
 
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration | Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration | FabMinds
 
Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study | Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study | FabMinds
 
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions | Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions | FabMinds
 
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion | Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion | FabMinds
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)FabMinds
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoTFabMinds
 
introduction for web connectivity (IoT)
introduction for web connectivity (IoT)introduction for web connectivity (IoT)
introduction for web connectivity (IoT)FabMinds
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsFabMinds
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsFabMinds
 
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...FabMinds
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3FabMinds
 
M2M Communication
M2M CommunicationM2M Communication
M2M CommunicationFabMinds
 

More from FabMinds (20)

Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists | Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists |
 
Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings | Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings |
 
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration | Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
 
Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study | Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study |
 
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions | Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
 
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion | Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
introduction for web connectivity (IoT)
introduction for web connectivity (IoT)introduction for web connectivity (IoT)
introduction for web connectivity (IoT)
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
 
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5
 
Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4
 
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
 
Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Application layer protocols

  • 1.
  • 2. Internet Connectivity Principles Internet connectivity Introduction Application Layer Protocols
  • 3. Application Layer Protocols • TCP/IP suite consists of a number application layer protocols. • For example, HTTP, HTTPS, FTP, Telnet and others.
  • 4. Application Layer Protocols • TCP/IP suite consists of a number application layer protocols. • For example, HTTP, HTTPS, FTP, Telnet and others.
  • 5. Application Layer Protocols HTTP: • It is a protocol used to access the data on the World Wide Web (www). • The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on. • Its efficiency that allows us to use in a hypertext environment where there are rapid jumps from one • HTTP is like the FTP as it also transfers the files from one host to another host. But HTTP is simpler than FTP. • HTTP is like SMTP as the data is transferred between client and server. • SMTP messages are stored and forwarded while HTTP messages are delivered immediately.
  • 6. Application Layer Protocols Features of HTTP: • Port number is 80. • HTTP is the standard protocol for· requesting a URL defined web-page resource, and for sending a response to the web server. • The connection between client and server exist only during the current request and response time only. • Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. • Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.
  • 7. Application Layer Protocols Features of HTTP: • Port number is 80. • HTTP is the standard protocol for· requesting a URL defined web-page resource, and for sending a response to the web server. • The connection between client and server exist only during the current request and response time only. • Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. • Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.
  • 9. Application Layer Protocols • Status codes add in the response and caching of a resource provided at a server (and proxy). • For example, status code returned as response when 400 means a bad request (the request not responding), • 401 unauthorized request • 402 means request requires a • payment before response feasible, 403 means request is for a forbidden resource and • 404 means URL resource not found by the server.
  • 10. Application Layer Protocols Uniform Resource Locator (URL): • A client that wants to access the document in an internet needs an address and to facilitate the access of documents, the HTTP uses the concept of Uniform Resource Locator (URL). • The URL defines four parts: method, host computer, port, and path.
  • 11. Application Layer Protocols Method: The method is the protocol used to retrieve the document from a server. For example, HTTP. Host: The host is the computer where the information is stored, Web pages are mainly stored in the computers and the computers are given an alias name that begins with the characters "www".
  • 12. Application Layer Protocols Port: The URL can also contain the port number of the server, but it's an optional field. Path: Path is the pathname of the file where the information is stored. The path itself contain slashes that separate the directories from the subdirectories and files.
  • 13. Application Layer Protocols HTTPS: • HTTPS stands for Hyper Text Transfer Protocol Secure. It is highly advanced and secure version of HTTP. • It uses the port no. 443 for Data Communication. • It allows the secure transactions by encrypting the entire communication with SSL. It is a • HTTP also allows you to create a secure encrypted connection between the server and the browser. • It offers the bi-directional security of Data. This helps you to protect potentially sensitive information from being stolen.
  • 14. Application Layer Protocols Advantages of HTTPS: • In most cases, sites running over HTTPS will have a redirect in place. Therefore, even if you type in HTTP:// it will redirect to an https over a secured connection • It allows users to perform secure e- commerce transaction, such as online banking. • SSL technology protects any users and builds trust • An independent authority verifies the identity of the certificate owner. So, each SSL Certificate contains unique, authenticated information about the certificate owner.
  • 15. Application Layer Protocols Limitations of HTTPS: • HTTPS protocol can't stop stealing confidential information from the pages cached on the browser • SSL data can be encrypted only during transmission on the network. So, it can't clear the text in the browser memory • HTTPS can increase computational overhead as well as network overhead of the organization
  • 16. Application Layer Protocols FTP: • FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another. • It is mainly used for transferring the web page files . • It is also used for downloading the files to computer from other servers. Objectives of FTP: • It provides the sharing of files. • It is used to encourage the use of remote computers. • It transfers the data more reliably and efficiently.
  • 18. Application Layer Protocols Control Connection: • The control connection uses very simple rules for communication. Through control connection, • The control connection remains connected during the entire interactive FTP session.
  • 19. Application Layer Protocols Data Connection: • The Data Connection uses very complex rules as data types may vary. • The data connection opens when a command comes for transferring the files and closes when the file is transferred.
  • 20. Application Layer Protocols Advantages: • Speed: The FTP is one of the fastest way to transfer the files. • Efficient: We do not need to complete all the operations to get the entire file. • Security: To access the FTP server, we need to login with the username and password. • Back & forth movement: Send some information to all and they all send information back on the same server. Disadvantages: • FTP serves two operations, i.e., to send and receive large files on a network. • It also doesn't allow you to run simultaneous transfers to multiple receivers. • Passwords and file contents are sent in clear text that allows unwanted eavesdropping. • It is not compatible with every
  • 21. Application Layer Protocols TELNET: • The main task of the internet is to provide services to users. • For example, users want to run different application programs at the remote site and transfers a result to the local site. • This requires a client-server program such as FTP, SMTP. But this would not allow us to create a specific program for each demand. • The better solution is to provide a general client-server program that lets the user access any application program on a remote computer. • Therefore, a program that allows a user to log on to a remote computer. A • Popular client-server program Telnet is used to meet such demands. Telnet is an abbreviation for Terminal
  • 22. Application Layer Protocols There are two types of login: • Local Login • Remote Login
  • 23. Application Layer Protocols There are two types of login: • Local Login • Remote Login
  • 24. Application Layer Protocols Advantages: • Telnet client is versatile • Can be used cross-platform • Unlimited access to target resources Disadvantages: • Unencrypted data exchange • Full access makes it easier for hackers • Only few servers can be reached via Telnet
  • 25. Internet Connectivity Principles Internet connectivity Introduction Application Layer Protocols