SlideShare a Scribd company logo
1 of 79
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 5
Application Layer
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Traditional applications
• Electronic Mail
• SMTP – Simple Mail Transfer Protocol
• POP 3
• IMAP
• MIME
• HTTP – Hyper Text Transfer Protocol
• Web Services
• DNS – Domain Name System
• SNMP – Simple Network Management Protocol
Application Layer
Introduction
• Applications – that are given to the END
USER.
• Every application is developed for a purpose
and have its own style of working
Apps available
That’s is not ALL.
Traditional Applications
• Among all the applications our study focuses on 2 main traditional
applications. They are :
Reason for Traditional Applications
• We call these application as traditional application because they existed
since the early days of computer networks.
Before starting the Topic…
• There are 3 general points that have to be made clear.
1. Distinguish between the Application Program and Application Protocols
2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called
simple because it only specifies the procedure, format is taken care by companion
protocol)
3. Each protocol will have a companion protocol which defines the format of the contents.
Distinguish between the Application Program and Application
Protocols
• example
Each protocol reinvents the Simple Remote procedure call (RPC)
mechanism
• Remote Procedure Call (RPC) is a protocol that one program can use to request a
service from a program located in another computer in a network without having
to understand network details. (A procedure call is also sometimes known as a
function call or a subroutine call.)
• RPC uses the client/server model.
RPC Mechanism
• Most of the application programs works on Query – Respond Principle.
• This RPC specifies, which mechanism to be followed to fetch information
from the source.
Each protocol will have a companion protocol
• This companion protocol specifies the format of the information to be
exchanged.
overview
• Application Program:
• Which is available to the end user
without knowing any knowledge
about the network.
• Application Protocol:
• Which specifies the RPC
mechanism to fetch information
available at remotely located
systems.
• Companion Protocol:
• Which specifies the format
of the data that are to be
exchanged.
Electronic Mail
E - Mail
• This is the one of the oldest applications.
• It is mandatory to distinguish between the User Interface – Transfer
Protocols – Companion Protocol
What happens when you press
Send Button
EMAIL CLIENT
MIME
EMAIL CLIENT
E - Mail
• Message Format – MIME
• Message Transfer – SMTP
• Mail Reader – POP / IMAP
Format of an E Mail
Message Format
• Message format is defined by the companion protocols. Two majorly used
protocols are given below.
• RFC 822 - Standard for the format of ARPA Internet text messages
• MIME - Multipurpose Internet Mail Extensions.
RFC 822
• This defines 2 parts
• Header
• Body
• Few headers are obtained by the user.
• Ex:
• TO address
• CC address
• BCC address
• Sub Text
• Few headers are added automatically by the program
• Ex:
• From Address
• Mail Server
• Date and Time
Syntax:
<Header Type> : <Header Value>
MIME
• Multipurpose Internet Mail Extensions.
• This is an supplementary protocol that allows Non ASCII data to be sent through E Mail
• This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
MIME Headers
• MIME mainly consists of 5 header:
• MIME - Version
• Content type
• Content transfer encoding
• Content ID
• Content Description
MIME Headers
Data types and subtypes in MIME
Content Transfer Encoding
Message Transfer
Introduction
• Once the mails are composed they are transferred to the destination using
Mail Transfer Protocols.
• Some of the popular Mail Transfer Protocols are
• SMTP – Simple Mail Transfer Protocol
• POP – Post Office Protocol
• IMAP – Internet Message Access Protocol
SMTP
• The actual mail transfer is done through the Mail Transfer Agents.
• The protocol that defines the MTA Client and Server is called SMTP.
• SMTP is used 2 Times
• Between sender and mail server.
• Between 2 mail servers.
• SMTP simply defines how commands and responses must be sent back
and forth.
SMTP Commands
SMTP Responses
Connection Establishment
Mail Transfer
Connection Termination
Message Reader / Message Access
Introduction
• SMPT is not involved in the third stage because SMTP is a Push Protocol.
• It pushes the message from the client to the server.
• The third stage need the Pull Protocol.
• The client must pull message from the server.
• Two of the popularly used message access agents are POP3 and IMAP
POP 3
• Post Office Protocol Version 3 (POP 3)
• Client POP 3 will be installed in the recipient’s computer and the server POP 3
is installed at the server.
• Message access will be initiated when the user wants to download the mail from
the server.
Modes of POP 3
• POP 3 have 2 modes
• Delete Mode
• In this mode, the mail is deleted from the mailbox after each retrieval.
• Keep Mode
• In this mode, the mail is kept is the personal computer for future access.
Exchange of Commands and Responses in POP 3
IMAP 4
• Internet Mail Access Protocol, Version 4
• IMAP 4 is similar to the POP 3 but with added features.
• The features are:
• A user can check the email header prior to downloading.
• A user can search the content of the email for a specific string
• A user can download partial email due to bandwidth constraints.
• User can create delete or rename mail boxes
• User can create hierarchy of mail boxes.
POP 3 Vs IMAP 4
My Official Account – POP 3 Setting
My Official account - IMAP Settings
MY Personal Account
Video Presentation on E - Mail
End
of
E - Mail
World Wide Web - WWW
Introduction
• The WWW is a repository of information
linked together from points all over the
world.
• The original goal of the web was to find a way to organize and retrieve information about
hyper linked documents.
• WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed
shortly)
WWW Architecture
Clients (Browsers)
1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents.
2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc.,
3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content
CLIENT
(BROWSERS)
 There are variety of browsers available that interprets and displays
a web document.
 Every client consists of three parts
Clients (Browsers)
Server
• The webpage is stored at the server
• Each time the request is received the corresponding document
is sent to the client.
• The server can be more efficient by enabling “Multithreading”
(Answering Multiple requests)
URL – Uniform Resource Locator
• When a page needs to be accessed it must have a address.
• HTTP uses locators to access the webpages available at widely distributed areas.
• URL is a standard for specifying any kind of information on the internet.
• URL defines 4 Important things:
Example URL
HTTP – Hyper Text Transfer Protocol
Introduction
• The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the
world wide web.
• HTTP is the combination of FTP and SMTP.
• It is like FTP because it uses TCP Connection.
• It is like SMTP because data transferred between the server and client looks like
SMTP messages.
HTTP Transaction
• The client initiates the transaction by sending a request message and the
server replies through an response message.
Formats of Request and Response Messages
Request Line and Status Line
Request Type
Status Code
• This field indicates the status of the request through codes.
• Codes in the range of
• 100  informational
• 200  Successful Request
• 300  Redirect the client to another URL
• 400  Error at client
• 500  Error at server
Status Codes and their Phrases
Contd..
Header
• The format of the header is shown in the figure.
• The request header and Response header have different values.
Request Header
Response Header
End
of
HTTP
Web Services
End
of
Web Services
Domain Name System - DNS
End
of
DNS
Simple Network Management Protocol - SNMP
End
of
SNMP

More Related Content

What's hot

Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
ymghorpade
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

What's hot (20)

User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Osi model
Osi modelOsi model
Osi model
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Dns resource record
Dns resource recordDns resource record
Dns resource record
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
5. icmp
5. icmp5. icmp
5. icmp
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 

Similar to Computer networks unit v

Similar to Computer networks unit v (20)

Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
E mail flow
E mail flowE mail flow
E mail flow
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Email
EmailEmail
Email
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
The Internet
The InternetThe Internet
The Internet
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
how email works
how email workshow email works
how email works
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Standard client server protocol.pptx
Standard client server protocol.pptxStandard client server protocol.pptx
Standard client server protocol.pptx
 
Email
EmailEmail
Email
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Http
HttpHttp
Http
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 

More from JAIGANESH SEKAR

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Recently uploaded

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Recently uploaded (20)

FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 

Computer networks unit v

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 5 Application Layer Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Traditional applications • Electronic Mail • SMTP – Simple Mail Transfer Protocol • POP 3 • IMAP • MIME • HTTP – Hyper Text Transfer Protocol • Web Services • DNS – Domain Name System • SNMP – Simple Network Management Protocol
  • 5. Introduction • Applications – that are given to the END USER. • Every application is developed for a purpose and have its own style of working
  • 8. Traditional Applications • Among all the applications our study focuses on 2 main traditional applications. They are :
  • 9. Reason for Traditional Applications • We call these application as traditional application because they existed since the early days of computer networks.
  • 10. Before starting the Topic… • There are 3 general points that have to be made clear. 1. Distinguish between the Application Program and Application Protocols 2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called simple because it only specifies the procedure, format is taken care by companion protocol) 3. Each protocol will have a companion protocol which defines the format of the contents.
  • 11. Distinguish between the Application Program and Application Protocols • example
  • 12. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism • Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details. (A procedure call is also sometimes known as a function call or a subroutine call.) • RPC uses the client/server model.
  • 14. • Most of the application programs works on Query – Respond Principle. • This RPC specifies, which mechanism to be followed to fetch information from the source.
  • 15. Each protocol will have a companion protocol • This companion protocol specifies the format of the information to be exchanged.
  • 16. overview • Application Program: • Which is available to the end user without knowing any knowledge about the network. • Application Protocol: • Which specifies the RPC mechanism to fetch information available at remotely located systems. • Companion Protocol: • Which specifies the format of the data that are to be exchanged.
  • 17.
  • 19. E - Mail • This is the one of the oldest applications. • It is mandatory to distinguish between the User Interface – Transfer Protocols – Companion Protocol
  • 20. What happens when you press Send Button EMAIL CLIENT MIME EMAIL CLIENT
  • 21. E - Mail • Message Format – MIME • Message Transfer – SMTP • Mail Reader – POP / IMAP
  • 22. Format of an E Mail
  • 23. Message Format • Message format is defined by the companion protocols. Two majorly used protocols are given below. • RFC 822 - Standard for the format of ARPA Internet text messages • MIME - Multipurpose Internet Mail Extensions.
  • 24. RFC 822 • This defines 2 parts • Header • Body
  • 25. • Few headers are obtained by the user. • Ex: • TO address • CC address • BCC address • Sub Text • Few headers are added automatically by the program • Ex: • From Address • Mail Server • Date and Time Syntax: <Header Type> : <Header Value>
  • 26. MIME • Multipurpose Internet Mail Extensions. • This is an supplementary protocol that allows Non ASCII data to be sent through E Mail • This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
  • 27. MIME Headers • MIME mainly consists of 5 header: • MIME - Version • Content type • Content transfer encoding • Content ID • Content Description
  • 29. Data types and subtypes in MIME
  • 31.
  • 33. Introduction • Once the mails are composed they are transferred to the destination using Mail Transfer Protocols. • Some of the popular Mail Transfer Protocols are • SMTP – Simple Mail Transfer Protocol • POP – Post Office Protocol • IMAP – Internet Message Access Protocol
  • 34. SMTP • The actual mail transfer is done through the Mail Transfer Agents. • The protocol that defines the MTA Client and Server is called SMTP. • SMTP is used 2 Times • Between sender and mail server. • Between 2 mail servers.
  • 35. • SMTP simply defines how commands and responses must be sent back and forth.
  • 41. Message Reader / Message Access
  • 42. Introduction • SMPT is not involved in the third stage because SMTP is a Push Protocol. • It pushes the message from the client to the server. • The third stage need the Pull Protocol. • The client must pull message from the server. • Two of the popularly used message access agents are POP3 and IMAP
  • 43. POP 3 • Post Office Protocol Version 3 (POP 3) • Client POP 3 will be installed in the recipient’s computer and the server POP 3 is installed at the server. • Message access will be initiated when the user wants to download the mail from the server.
  • 44. Modes of POP 3 • POP 3 have 2 modes • Delete Mode • In this mode, the mail is deleted from the mailbox after each retrieval. • Keep Mode • In this mode, the mail is kept is the personal computer for future access.
  • 45. Exchange of Commands and Responses in POP 3
  • 46. IMAP 4 • Internet Mail Access Protocol, Version 4 • IMAP 4 is similar to the POP 3 but with added features. • The features are: • A user can check the email header prior to downloading. • A user can search the content of the email for a specific string • A user can download partial email due to bandwidth constraints. • User can create delete or rename mail boxes • User can create hierarchy of mail boxes.
  • 47. POP 3 Vs IMAP 4
  • 48. My Official Account – POP 3 Setting
  • 49. My Official account - IMAP Settings
  • 53. World Wide Web - WWW
  • 54. Introduction • The WWW is a repository of information linked together from points all over the world. • The original goal of the web was to find a way to organize and retrieve information about hyper linked documents. • WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed shortly)
  • 56. Clients (Browsers) 1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents. 2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc., 3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content CLIENT (BROWSERS)  There are variety of browsers available that interprets and displays a web document.  Every client consists of three parts
  • 58. Server • The webpage is stored at the server • Each time the request is received the corresponding document is sent to the client. • The server can be more efficient by enabling “Multithreading” (Answering Multiple requests)
  • 59. URL – Uniform Resource Locator • When a page needs to be accessed it must have a address. • HTTP uses locators to access the webpages available at widely distributed areas. • URL is a standard for specifying any kind of information on the internet. • URL defines 4 Important things:
  • 61. HTTP – Hyper Text Transfer Protocol
  • 62. Introduction • The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the world wide web. • HTTP is the combination of FTP and SMTP. • It is like FTP because it uses TCP Connection. • It is like SMTP because data transferred between the server and client looks like SMTP messages.
  • 63. HTTP Transaction • The client initiates the transaction by sending a request message and the server replies through an response message.
  • 64. Formats of Request and Response Messages
  • 65. Request Line and Status Line
  • 67. Status Code • This field indicates the status of the request through codes. • Codes in the range of • 100  informational • 200  Successful Request • 300  Redirect the client to another URL • 400  Error at client • 500  Error at server
  • 68. Status Codes and their Phrases
  • 70. Header • The format of the header is shown in the figure. • The request header and Response header have different values.
  • 78. Simple Network Management Protocol - SNMP