SlideShare a Scribd company logo
1 of 34
APPLICATION LAYER
Videos
• Video1
• Video2
• Video3
• Video4
• Video5
• Video6
• Video7
OSI MODEL BLOCK DIAGRAM
3
Application-Layer Protocols
OSI ENCAPSULATION PROCESS
5
APPLICATION PROTOCOL DESIGN
 Think of different people/teams, working on the client and server
programs.
– Different programming languages.
– Diverse hardware, operating systems.
 Be unambiguous, precise.
– Consider potential error conditions.
 Allow for future extensions.
– Leave room for additional data, meta-data.
 Do not replicate services provided by lower layer protocols
– e.g., checksum 7
APPLICATION LAYER PROTOCOLS
 An application layer protocol defines how an application processes
(clients and servers), running on different end systems, pass
messages to each other.
 In particular, an application layer protocol defines:
–The types of messages, e.g., request messages and response
messages.
– The syntax of the various message types, i.e., the fields in the
message and
 how the fields are delineated.
–The semantics of the fields, i.e., the meaning of the information that
the
 field is supposed to contain;
–Rules for determining when and how a process sends messages
and responds to messages. 9
CONTINUE..
 Many Internet application-layer protocols are fully specified in
Request.
 For Comments documents (RFCs) and are therefore in the public
domain.
–For example, the HTTP 1.1 specification is included in RFC 2068,
which was
 finalized and made public January 1997.
– If a browser (HTTP client) developer follows the rules of the HTTP
1.1 RFC,
 the browser will be able to retrieve Web pages from any Web server
that has also has followed the rules of the HTTP 1.1 RFC.
10
CONTINUE..
Application layer protocols as follows:
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol)
11
1. HTTP
 Hypertext Transfer Protocol is used to transfer files that make up
the web pages of the World Wide Web.
 HTTP: TCP port 80.
 Was originally developed to publish and retrieve HTML pages.
 used for distributed, collaborative information systems.
 HTTP is used across the world wide web for data transfer and is one
of the most used application protocols.
 HTTP specifies a request/response protocol.
 When a client, typically a web browser, sends a request message to
a server, the HTTP protocol defines the message types the client
uses to request the web page and the message types the server
uses to respond.
 The three common message types are:
o GET
o POST
o PUT
12
CONTINUE..
 GET is a client request for data. A web browser sends the GET
message to request pages from a web server.
 POST and PUT are used to send messages that upload data to the
web server.
 HTTP protocol using GET.
13
Application-Layer Protocols
2. DNS
 HOSTNAMES:
 IP Addresses are great for computers
– IP address includes information used for routing.
 IP addresses are tough for humans to remember.
 IP addresses are impossible to guess.
– ever guessed at the name of a WWW site?
 The Domain Name System:
 The domain name system is usually used to translate a host
name into an IP address .
 Domain names comprise a hierarchy so that names are unique,
yet easy to remember.
14
CONTINUE..
 DNS Hierarchy
edu com org jp
rpi albany
15
CONTINUE..
 Host name structure:
• Each host name is made up of a sequence of labels separated by
periods.
– Each label can be up to 63 characters
– The total name can be at most 255characters.
• Examples:
– whitehouse.gov
– barney.the.purple.dinosaur.com
– monica.cs.rpi.edu
 Domain Name
• The domain name for a host is the sequence of labels that lead from
the host (leaf node in the naming tree) to the top of the worldwide
naming tree.
• A domain is a subtree of the world wide naming tree.
16
CONTINUE..
 Top level domains:
• edu, gov, com, net, org, mil, …
• Countries each have a top level domain(2 letter domain name).
• New top level domains include:
.aero .biz .coop .info .name .pro
 DNS Organization
• Distributed Database
–The organization that owns a domain name is responsible for
running a DNS server that can provide the mapping between
hostnames within the domain to IP addresses.
– So - some machine run by RPI is responsible for everything within
the rpi.edu domain.
17
CONTINUE..
 DNS Clients:
• A DNS client is called a resolver.
• A call to getByName(host)is handled by a resolver (typically part of
the client).
• Most Unix workstations have the file /etc/resolv.conf that contains
the local domain and the addresses of DNS servers for that domain.
 Nslookup:
the user to
• nslookup is an interactive resolver that allows
communicate directly with a DNS server.
• nslookup is usually available on Unix workstations.
18
CONTINUE..
 DNS Servers:
• Servers handle requests for their domain directly.
• Servers handle requests for other domains by contacting remote
DNS server(s).
• Servers cache external mappings.
o DNS Message Format:
19
CONTINUE..
 DNS Message Header:
20
3. FTP
 promote sharing of files.
 encourage indirect use of remote computers.
 shield user from variations in file storage.
 transfer data reliably and efficiently.
 “FTP, although usable directly by a user at a terminal, is designed
mainly for use by programs”.
 To successfully transfer files, FTP requires two connections between
the client and the server: one for commands and replies, and the
other for the actual file transfer.
 The client establishes the first connection to the server on TCP port
21. This connection is used for control traffic, consisting of client
commands and server replies.
 The client establishes the second connection to the server over TCP
port 20. This connection is for the actual file transfer and is created
every time a file is transferred.
21
CONTINUE..
 The client can download (pull) a file from the server or upload (push)
a file to the server.
 FTP Process
22
4. TELNET
 TELNET is a protocol that provides “a general, bi-directional, eight-bit
byte oriented communications facility”.
 telnet is a program that supports the TELNET protocol over TCP.
 Many application protocols are built upon the TELNET protocol.
 TELNET service:
23
CONTINUE..
 The TELNET Protocol
o TCP connection
o data and control over the same connection.
o Network Virtual Terminal
o negotiated options
24
CONTINUE..
 Network Virtual Terminal
o intermediate representation of a generic terminal.
o provides a standard language for communication of terminal control
functions.
25
CONTINUE..
 Negotiated Options:
o All NVTs support a minimal set of capabilities.
o Some terminals have more capabilities than the minimal set.
o The 2 endpoints negotiate a set of mutually acceptable options
(character set, echo mode, etc).
o The protocol for requesting optional features is well defined and
includes rules for eliminating possible negotiation “loops”.
o The set of options is not part of the TELNET protocol, so that new
terminal features can be incorporated without changing the TELNET
protocol.
26
CONTINUE..
 Control Functions:
o TELNET includes support for a series of control functions commonly
supported by servers.
for communication of (the
o This provides a uniform mechanism
supported) control functions.
o Interrupt Process (IP)
– suspend/abort process.
o Abort Output (AO)
– process can complete, but send no more output to user’s terminal.
o Are You There (AYT)
– check to see if system is still running.
o Erase Character (EC)
– delete last character sent
– typically used to edit keyboard input.
o Erase Line (EL)
– delete all input in current line. 27
5. DHCP
 DHCP enables clients on a network to obtain IP addresses and other
information from a DHCP server.
 DHCP allows a host to obtain an IP address dynamically when it
connects to the network.
 The DHCP server is contacted by sending a request, and an IP
address is requested.
 The DHCP server chooses an address from a configured range of
addresses called a pool and assigns it to the host client for a set
period.
 different ways of having DHCP servers arranged in next diagram
28
CONTINUE..
29
7. SMTP
 Protocol originated in 1982 (RFC821, Jon Postel)
 Standard message format (RFC822,2822, D. Crocker)
 Goal: To transfer mail reliably and efficiently
30
CONTINUE..
 SMTP clients and servers have two
main components:
 User Agents – Prepares the
message, encloses it in an envelope.
(ex. Thunderbird, Eudora)
 Mail Transfer Agent – Transfers the
mail across the internet (ex.
Sendmail, Exim)
 Analogous to the postal system in
many ways
31
CONTINUE..
 SMTP also allows the use of
Relays allowing other MTAs
to relay the mail.
 Mail Gateways are used to
relay mail prepared by a
protocol other than SMTP and
convert it to SMTP.
32
CONTINUE..
 Connection establishment:
33
CONTINUE..
 Message Progress:
34
Application-Layer Protocols
CONTINUE..
 Connection Termination:
35
TCP Connection Termination
CONTINUE..
Limitations in SMTP:
 Only uses NVT 7 bit ASCII format
 How to represent other data types?
 No authentication mechanisms
 Messages are sent un-encrypted
 Susceptible to misuse (Spamming,
faking sender address)
36
Questions
 Explain OSI model with 7 layers.
 Explain application layer protocol in detail.
Write note on:
o HTTP(Hypertext Transfer Protocol)
o DNS(Domain Name System)
o FTP(File Transfer Protocol)
o TELNET
o DHCP(Dynamic Host Configuration Protocol)
o SMTP(Simple Mail Transfer Protocol)
37

More Related Content

What's hot

Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPrakriti Dubey
 
Ftp server linux
Ftp server linuxFtp server linux
Ftp server linuxPawan Kumar
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirementsAbDul ThaYyal
 
Networking Basics with Linux
Networking Basics with LinuxNetworking Basics with Linux
Networking Basics with LinuxHenry Osborne
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003Muuluu
 
1.1 windows server 2003
1.1 windows server 20031.1 windows server 2003
1.1 windows server 2003Muuluu
 
Multitenancy: Kafka clusters for everyone at LINE
Multitenancy: Kafka clusters for everyone at LINEMultitenancy: Kafka clusters for everyone at LINE
Multitenancy: Kafka clusters for everyone at LINEkawamuray
 
Session 7 Tp 7
Session 7 Tp 7Session 7 Tp 7
Session 7 Tp 7githe26200
 
LINE's messaging service architecture underlying more than 200 million monthl...
LINE's messaging service architecture underlying more than 200 million monthl...LINE's messaging service architecture underlying more than 200 million monthl...
LINE's messaging service architecture underlying more than 200 million monthl...kawamuray
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Hari
 
Kafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINE
Kafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINEKafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINE
Kafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINEkawamuray
 
File transfer protocol (ftp) in application
File transfer protocol (ftp) in applicationFile transfer protocol (ftp) in application
File transfer protocol (ftp) in applicationRochakSrivastava3
 
10135 a 07
10135 a 0710135 a 07
10135 a 07Bố Su
 
Packet Framework - Cristian Dumitrescu
Packet Framework - Cristian DumitrescuPacket Framework - Cristian Dumitrescu
Packet Framework - Cristian Dumitrescuharryvanhaaren
 
Lisa 2015-gluster fs-hands-on
Lisa 2015-gluster fs-hands-onLisa 2015-gluster fs-hands-on
Lisa 2015-gluster fs-hands-onGluster.org
 
Server interview[1]
Server interview[1]Server interview[1]
Server interview[1]sourav nanda
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)AbDul ThaYyal
 

What's hot (20)

Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
 
Coda file system
Coda file systemCoda file system
Coda file system
 
Ftp server linux
Ftp server linuxFtp server linux
Ftp server linux
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirements
 
Networking Basics with Linux
Networking Basics with LinuxNetworking Basics with Linux
Networking Basics with Linux
 
windows server 2003
 windows server 2003 windows server 2003
windows server 2003
 
1.1 windows server 2003
1.1 windows server 20031.1 windows server 2003
1.1 windows server 2003
 
Multitenancy: Kafka clusters for everyone at LINE
Multitenancy: Kafka clusters for everyone at LINEMultitenancy: Kafka clusters for everyone at LINE
Multitenancy: Kafka clusters for everyone at LINE
 
Session 7 Tp 7
Session 7 Tp 7Session 7 Tp 7
Session 7 Tp 7
 
LINE's messaging service architecture underlying more than 200 million monthl...
LINE's messaging service architecture underlying more than 200 million monthl...LINE's messaging service architecture underlying more than 200 million monthl...
LINE's messaging service architecture underlying more than 200 million monthl...
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)
 
11. dfs
11. dfs11. dfs
11. dfs
 
Kafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINE
Kafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINEKafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINE
Kafka Multi-Tenancy - 160 Billion Daily Messages on One Shared Cluster at LINE
 
File transfer protocol (ftp) in application
File transfer protocol (ftp) in applicationFile transfer protocol (ftp) in application
File transfer protocol (ftp) in application
 
10135 a 07
10135 a 0710135 a 07
10135 a 07
 
AFS introduction
AFS introductionAFS introduction
AFS introduction
 
Packet Framework - Cristian Dumitrescu
Packet Framework - Cristian DumitrescuPacket Framework - Cristian Dumitrescu
Packet Framework - Cristian Dumitrescu
 
Lisa 2015-gluster fs-hands-on
Lisa 2015-gluster fs-hands-onLisa 2015-gluster fs-hands-on
Lisa 2015-gluster fs-hands-on
 
Server interview[1]
Server interview[1]Server interview[1]
Server interview[1]
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)
 

Similar to APP LAYER PROTOCOLS

application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.pptssuser1774d3
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Web server administration
Web server administrationWeb server administration
Web server administrationsawsan slii
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...MrKarwega
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
A Presentation on Servers & Splunk
A Presentation on Servers & SplunkA Presentation on Servers & Splunk
A Presentation on Servers & SplunkAvinash Kumar
 

Similar to APP LAYER PROTOCOLS (20)

application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Application Layer
Application Layer Application Layer
Application Layer
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
Iso model
Iso modelIso model
Iso model
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
A Presentation on Servers & Splunk
A Presentation on Servers & SplunkA Presentation on Servers & Splunk
A Presentation on Servers & Splunk
 
Computer networks
Computer networksComputer networks
Computer networks
 

More from Neha Kurale

Ch7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kuraleCh7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kuraleCh6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleCh6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kuraleCh5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleCh5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kuraleCh4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleNeha Kurale
 
Ch3 3 Data communication and networking
Ch3 3  Data communication and networking Ch3 3  Data communication and networking
Ch3 3 Data communication and networking Neha Kurale
 
Ch3 2 Data communication and networking
Ch3 2  Data communication and networkingCh3 2  Data communication and networking
Ch3 2 Data communication and networkingNeha Kurale
 
Ch3 1 Data communication and networking
Ch3 1 Data communication and networkingCh3 1 Data communication and networking
Ch3 1 Data communication and networkingNeha Kurale
 
Ch3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kuraleCh3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kuraleNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Computer funda bsc_hs
Computer funda bsc_hsComputer funda bsc_hs
Computer funda bsc_hsNeha Kurale
 
Unit1 three part secondary storage devices
Unit1 three part secondary storage devicesUnit1 three part secondary storage devices
Unit1 three part secondary storage devicesNeha Kurale
 
Unit1 four part basic computer organization
Unit1 four part basic computer organizationUnit1 four part basic computer organization
Unit1 four part basic computer organizationNeha Kurale
 
Unit 1 two part hw sw os app sw
Unit 1 two part hw sw os app swUnit 1 two part hw sw os app sw
Unit 1 two part hw sw os app swNeha Kurale
 
Unit 1 one part introduction to computers
Unit 1 one part introduction to computersUnit 1 one part introduction to computers
Unit 1 one part introduction to computersNeha Kurale
 
Unit 1 four part pocessor and memory
Unit 1 four part pocessor and memoryUnit 1 four part pocessor and memory
Unit 1 four part pocessor and memoryNeha Kurale
 

More from Neha Kurale (20)

Ch7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kuraleCh7 Data communication and networking by neha g. kurale
Ch7 Data communication and networking by neha g. kurale
 
Ch6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kuraleCh6 2 Data communication and networking by neha g. kurale
Ch6 2 Data communication and networking by neha g. kurale
 
Ch6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kuraleCh6 1 Data communication and networking by neha g. kurale
Ch6 1 Data communication and networking by neha g. kurale
 
Ch5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kuraleCh5 1 Data communication and networking by neha g. kurale
Ch5 1 Data communication and networking by neha g. kurale
 
Ch5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kuraleCh5 Data communication and networking by neha g. kurale
Ch5 Data communication and networking by neha g. kurale
 
Ch4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kuraleCh4 1 Data communication and networking by neha g. kurale
Ch4 1 Data communication and networking by neha g. kurale
 
Ch4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kuraleCh4 Data communication and networking by neha g. kurale
Ch4 Data communication and networking by neha g. kurale
 
Ch3 3 Data communication and networking
Ch3 3  Data communication and networking Ch3 3  Data communication and networking
Ch3 3 Data communication and networking
 
Ch3 2 Data communication and networking
Ch3 2  Data communication and networkingCh3 2  Data communication and networking
Ch3 2 Data communication and networking
 
Ch3 1 Data communication and networking
Ch3 1 Data communication and networkingCh3 1 Data communication and networking
Ch3 1 Data communication and networking
 
Ch3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kuraleCh3Data communication and networking by neha g. kurale
Ch3Data communication and networking by neha g. kurale
 
Ch2
Ch2Ch2
Ch2
 
Ch1
Ch1Ch1
Ch1
 
Application layer
Application layerApplication layer
Application layer
 
Computer funda bsc_hs
Computer funda bsc_hsComputer funda bsc_hs
Computer funda bsc_hs
 
Unit1 three part secondary storage devices
Unit1 three part secondary storage devicesUnit1 three part secondary storage devices
Unit1 three part secondary storage devices
 
Unit1 four part basic computer organization
Unit1 four part basic computer organizationUnit1 four part basic computer organization
Unit1 four part basic computer organization
 
Unit 1 two part hw sw os app sw
Unit 1 two part hw sw os app swUnit 1 two part hw sw os app sw
Unit 1 two part hw sw os app sw
 
Unit 1 one part introduction to computers
Unit 1 one part introduction to computersUnit 1 one part introduction to computers
Unit 1 one part introduction to computers
 
Unit 1 four part pocessor and memory
Unit 1 four part pocessor and memoryUnit 1 four part pocessor and memory
Unit 1 four part pocessor and memory
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

APP LAYER PROTOCOLS

  • 2. Videos • Video1 • Video2 • Video3 • Video4 • Video5 • Video6 • Video7
  • 3. OSI MODEL BLOCK DIAGRAM 3 Application-Layer Protocols
  • 5. APPLICATION PROTOCOL DESIGN  Think of different people/teams, working on the client and server programs. – Different programming languages. – Diverse hardware, operating systems.  Be unambiguous, precise. – Consider potential error conditions.  Allow for future extensions. – Leave room for additional data, meta-data.  Do not replicate services provided by lower layer protocols – e.g., checksum 7
  • 6. APPLICATION LAYER PROTOCOLS  An application layer protocol defines how an application processes (clients and servers), running on different end systems, pass messages to each other.  In particular, an application layer protocol defines: –The types of messages, e.g., request messages and response messages. – The syntax of the various message types, i.e., the fields in the message and  how the fields are delineated. –The semantics of the fields, i.e., the meaning of the information that the  field is supposed to contain; –Rules for determining when and how a process sends messages and responds to messages. 9
  • 7. CONTINUE..  Many Internet application-layer protocols are fully specified in Request.  For Comments documents (RFCs) and are therefore in the public domain. –For example, the HTTP 1.1 specification is included in RFC 2068, which was  finalized and made public January 1997. – If a browser (HTTP client) developer follows the rules of the HTTP 1.1 RFC,  the browser will be able to retrieve Web pages from any Web server that has also has followed the rules of the HTTP 1.1 RFC. 10
  • 8. CONTINUE.. Application layer protocols as follows: 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol) 11
  • 9. 1. HTTP  Hypertext Transfer Protocol is used to transfer files that make up the web pages of the World Wide Web.  HTTP: TCP port 80.  Was originally developed to publish and retrieve HTML pages.  used for distributed, collaborative information systems.  HTTP is used across the world wide web for data transfer and is one of the most used application protocols.  HTTP specifies a request/response protocol.  When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and the message types the server uses to respond.  The three common message types are: o GET o POST o PUT 12
  • 10. CONTINUE..  GET is a client request for data. A web browser sends the GET message to request pages from a web server.  POST and PUT are used to send messages that upload data to the web server.  HTTP protocol using GET. 13 Application-Layer Protocols
  • 11. 2. DNS  HOSTNAMES:  IP Addresses are great for computers – IP address includes information used for routing.  IP addresses are tough for humans to remember.  IP addresses are impossible to guess. – ever guessed at the name of a WWW site?  The Domain Name System:  The domain name system is usually used to translate a host name into an IP address .  Domain names comprise a hierarchy so that names are unique, yet easy to remember. 14
  • 12. CONTINUE..  DNS Hierarchy edu com org jp rpi albany 15
  • 13. CONTINUE..  Host name structure: • Each host name is made up of a sequence of labels separated by periods. – Each label can be up to 63 characters – The total name can be at most 255characters. • Examples: – whitehouse.gov – barney.the.purple.dinosaur.com – monica.cs.rpi.edu  Domain Name • The domain name for a host is the sequence of labels that lead from the host (leaf node in the naming tree) to the top of the worldwide naming tree. • A domain is a subtree of the world wide naming tree. 16
  • 14. CONTINUE..  Top level domains: • edu, gov, com, net, org, mil, … • Countries each have a top level domain(2 letter domain name). • New top level domains include: .aero .biz .coop .info .name .pro  DNS Organization • Distributed Database –The organization that owns a domain name is responsible for running a DNS server that can provide the mapping between hostnames within the domain to IP addresses. – So - some machine run by RPI is responsible for everything within the rpi.edu domain. 17
  • 15. CONTINUE..  DNS Clients: • A DNS client is called a resolver. • A call to getByName(host)is handled by a resolver (typically part of the client). • Most Unix workstations have the file /etc/resolv.conf that contains the local domain and the addresses of DNS servers for that domain.  Nslookup: the user to • nslookup is an interactive resolver that allows communicate directly with a DNS server. • nslookup is usually available on Unix workstations. 18
  • 16. CONTINUE..  DNS Servers: • Servers handle requests for their domain directly. • Servers handle requests for other domains by contacting remote DNS server(s). • Servers cache external mappings. o DNS Message Format: 19
  • 18. 3. FTP  promote sharing of files.  encourage indirect use of remote computers.  shield user from variations in file storage.  transfer data reliably and efficiently.  “FTP, although usable directly by a user at a terminal, is designed mainly for use by programs”.  To successfully transfer files, FTP requires two connections between the client and the server: one for commands and replies, and the other for the actual file transfer.  The client establishes the first connection to the server on TCP port 21. This connection is used for control traffic, consisting of client commands and server replies.  The client establishes the second connection to the server over TCP port 20. This connection is for the actual file transfer and is created every time a file is transferred. 21
  • 19. CONTINUE..  The client can download (pull) a file from the server or upload (push) a file to the server.  FTP Process 22
  • 20. 4. TELNET  TELNET is a protocol that provides “a general, bi-directional, eight-bit byte oriented communications facility”.  telnet is a program that supports the TELNET protocol over TCP.  Many application protocols are built upon the TELNET protocol.  TELNET service: 23
  • 21. CONTINUE..  The TELNET Protocol o TCP connection o data and control over the same connection. o Network Virtual Terminal o negotiated options 24
  • 22. CONTINUE..  Network Virtual Terminal o intermediate representation of a generic terminal. o provides a standard language for communication of terminal control functions. 25
  • 23. CONTINUE..  Negotiated Options: o All NVTs support a minimal set of capabilities. o Some terminals have more capabilities than the minimal set. o The 2 endpoints negotiate a set of mutually acceptable options (character set, echo mode, etc). o The protocol for requesting optional features is well defined and includes rules for eliminating possible negotiation “loops”. o The set of options is not part of the TELNET protocol, so that new terminal features can be incorporated without changing the TELNET protocol. 26
  • 24. CONTINUE..  Control Functions: o TELNET includes support for a series of control functions commonly supported by servers. for communication of (the o This provides a uniform mechanism supported) control functions. o Interrupt Process (IP) – suspend/abort process. o Abort Output (AO) – process can complete, but send no more output to user’s terminal. o Are You There (AYT) – check to see if system is still running. o Erase Character (EC) – delete last character sent – typically used to edit keyboard input. o Erase Line (EL) – delete all input in current line. 27
  • 25. 5. DHCP  DHCP enables clients on a network to obtain IP addresses and other information from a DHCP server.  DHCP allows a host to obtain an IP address dynamically when it connects to the network.  The DHCP server is contacted by sending a request, and an IP address is requested.  The DHCP server chooses an address from a configured range of addresses called a pool and assigns it to the host client for a set period.  different ways of having DHCP servers arranged in next diagram 28
  • 27. 7. SMTP  Protocol originated in 1982 (RFC821, Jon Postel)  Standard message format (RFC822,2822, D. Crocker)  Goal: To transfer mail reliably and efficiently 30
  • 28. CONTINUE..  SMTP clients and servers have two main components:  User Agents – Prepares the message, encloses it in an envelope. (ex. Thunderbird, Eudora)  Mail Transfer Agent – Transfers the mail across the internet (ex. Sendmail, Exim)  Analogous to the postal system in many ways 31
  • 29. CONTINUE..  SMTP also allows the use of Relays allowing other MTAs to relay the mail.  Mail Gateways are used to relay mail prepared by a protocol other than SMTP and convert it to SMTP. 32
  • 33. CONTINUE.. Limitations in SMTP:  Only uses NVT 7 bit ASCII format  How to represent other data types?  No authentication mechanisms  Messages are sent un-encrypted  Susceptible to misuse (Spamming, faking sender address) 36
  • 34. Questions  Explain OSI model with 7 layers.  Explain application layer protocol in detail. Write note on: o HTTP(Hypertext Transfer Protocol) o DNS(Domain Name System) o FTP(File Transfer Protocol) o TELNET o DHCP(Dynamic Host Configuration Protocol) o SMTP(Simple Mail Transfer Protocol) 37