SlideShare a Scribd company logo
Application Layer
Protocols
Overview
 Process
 network applications and application-layer protocols
 Components of web application
 Application-layer protocols
 Addressing
 User agents
Process
 Processes are communicating in a network.
 A process can be thought of as a program that is
running within an end system.
 Processes on two different end systems communicate
with each other by exchanging messages across the
computer network.
 A sending process creates and sends messages into
the network;
 A receiving process receives these messages and
possibly responds by sending messages back.
Process…
 Networking applications have application-layer
protocols that define the format and order of the
messages exchanged between processes, as well as
the actions taken on the transmission or receipt of a
message.
Network applications and application-layer
protocols
 An application-layer protocol is a piece of a network
application.
 The Web is a network application that allows users to
obtain "documents" from Web servers on demand.
Components of web application
 A standard for document formats (i.e., HTML)
 Web browsers (e.g., Netscape Navigator and Internet
Explorer)
 Web servers (e.g., Apache, Microsoft and Netscape
servers),
 An application-layer protocol(e.g., HTTP, FTP)
 HTTP defines how messages are passed between browser and
Web server.
Application-layer protocol
 Defines how an application's processes, running on different
end systems, pass messages to each other.
The types of messages exchanged, e.g., request
messages and response messages;
The syntax of the various message types, i.e.,
the fields in the message and how the fields
are delineated;
The semantics of the fields, i.e., the meaning of
the information in the fields;
The rules for determining when and how a
process sends messages and responds to
messages.
Clients and Servers
 The client side in one end system communicates with
the server side in another end system.
 For example, a Web browser implements the client
side of HTTP and a Web server implements the
server side of HTTP
Processes Communicating Across a
Network
 An application involves two processes in two
different hosts communicating with each other over a
network.
 The two processes communicate with each other by
sending and receiving messages through their
sockets.
 A process's socket can be thought of as the process's
door
 A process sends messages into, and receives message
from, the network through its socket.
Socket
 A socket is the interface between the application
layer and the transport layer within a host.
 It is also referred to as the API (application
programmers interface) between the application
and the network, since the socket is the
programming interface with which networked
applications are built in the Internet
Addressing Processes
 In order for a process on one host to send a
message to a process on another host, the sending
process must identify the receiving process.
 To identify the receiving process, one must
typically specify two pieces of information:
(i) the name or address of the host machine, and
(ii) an identifier that specifies the identity of the
receiving process on the destination host.
Addressing Processes…
 In Internet applications, the destination host is
specified by its IP address.
 The IP address is a 32-bit quantity that uniquely
identifies the end-system.
 Since the IP address of any end system connected to
the public Internet must be globally unique.
Addressing Processes…
 To identify the destination process to direct the
message to the appropriate process on the
destination system, a receive-side port number
is used.
 Popular application-layer protocols have been
assigned specific port numbers.
 For example, a Web server process (which uses the
HTTP protocol) is identified by port number 80.
 A mail server (using the SMTP) protocol is
identified by port number 25.
User Agents
 The user agent is an interface between the user and
the network application.
 For example, for Web application, the user agent is a
browser such as Netscape Navigator or Microsoft
Explorer.
 The browser allows a user to view Web pages, to
navigate in the Web, to provide input to forms, to
interact with Java applets, etc.
 The browser also implements the client side of the
HTTP protocol.
 Thus, when activated, the browser is a process that,
along with providing an interface to the user, sends
messages into a socket.
What Services Does an Application
Need?
 We can broadly classify an application's service
requirements along three dimensions:
data loss,
bandwidth, and
timing.
Services Provided by the Internet
Transport Protocols
 TCP Services
 Connection-oriented service
 Reliable transport service:
 Congestion Control
 UDP Services
 Connectionless
 No guarantee
 No congestion control
application layer protocols

More Related Content

What's hot

Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
Andy Juan Sarango Veliz
 
Mime
MimeMime
Mime
pullel
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
Laguna State Polytechnic University
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
HDLC
HDLCHDLC
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
Naveen Kumar
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Computer network
Computer networkComputer network
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Network servers
Network serversNetwork servers
Network servers
Online
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 

What's hot (20)

Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
Mime
MimeMime
Mime
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Internetworking
InternetworkingInternetworking
Internetworking
 
HDLC
HDLCHDLC
HDLC
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Computer network
Computer networkComputer network
Computer network
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Network servers
Network serversNetwork servers
Network servers
 
Mail server
Mail serverMail server
Mail server
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 

Viewers also liked

Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Application Layer
Application LayerApplication Layer
Application Layerrosmida
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 
Application Layer
Application LayerApplication Layer
Application Layer
ushabarad142
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
Fatbardh Hysa
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
adil raja
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Ram Dutt Shukla
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
Dr. Amitava Nag
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 

Viewers also liked (20)

Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Application Layer
Application Layer Application Layer
Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Chapter3
Chapter3Chapter3
Chapter3
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Communication Networks
Communication NetworksCommunication Networks
Communication Networks
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similar to application layer protocols

CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
VISWANATHAN R V
 
Client server relation
Client server relationClient server relation
Client server relation
PoojaWalia6
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Abiud Orina
 
Task communication
Task communicationTask communication
Task communication
1jayanti
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
sirajmohammed35
 
Web application development ( basics )
Web application development ( basics )Web application development ( basics )
Web application development ( basics )
Chirag Nag
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Week2 lec3-bscs1
Week2 lec3-bscs1Week2 lec3-bscs1
Week2 lec3-bscs1
syedhaiderraza
 
6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda
UsamaMushtaq15
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
FamiDan
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
DBU
 
How does internet works
How does internet worksHow does internet works
How does internet works
RamonNavarro46
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
Samsil Arefin
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
syedhaiderraza
 

Similar to application layer protocols (20)

CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Chapter2 Application
Chapter2 ApplicationChapter2 Application
Chapter2 Application
 
Client server relation
Client server relationClient server relation
Client server relation
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Task communication
Task communicationTask communication
Task communication
 
Chapter 3-Processes.ppt
Chapter 3-Processes.pptChapter 3-Processes.ppt
Chapter 3-Processes.ppt
 
Web application development ( basics )
Web application development ( basics )Web application development ( basics )
Web application development ( basics )
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Week2 lec3-bscs1
Week2 lec3-bscs1Week2 lec3-bscs1
Week2 lec3-bscs1
 
6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda
 
CHP-4.pptx
CHP-4.pptxCHP-4.pptx
CHP-4.pptx
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Week1 lec2-bscs1
Week1 lec2-bscs1Week1 lec2-bscs1
Week1 lec2-bscs1
 

More from bhavanatmithun

Code optimisation presnted
Code optimisation presntedCode optimisation presnted
Code optimisation presnted
bhavanatmithun
 
computer networks
computer networkscomputer networks
computer networks
bhavanatmithun
 
Deadlock
DeadlockDeadlock
Deadlock
bhavanatmithun
 
krisibhavan site
krisibhavan sitekrisibhavan site
krisibhavan site
bhavanatmithun
 
User server interaction
User server interactionUser server interaction
User server interaction
bhavanatmithun
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
bhavanatmithun
 
Snmp
SnmpSnmp
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
bhavanatmithun
 
HTTP
HTTPHTTP
FTP
FTPFTP
DNS
DNSDNS
Group communication
Group communicationGroup communication
Group communication
bhavanatmithun
 
Group communication
Group communicationGroup communication
Group communication
bhavanatmithun
 

More from bhavanatmithun (13)

Code optimisation presnted
Code optimisation presntedCode optimisation presnted
Code optimisation presnted
 
computer networks
computer networkscomputer networks
computer networks
 
Deadlock
DeadlockDeadlock
Deadlock
 
krisibhavan site
krisibhavan sitekrisibhavan site
krisibhavan site
 
User server interaction
User server interactionUser server interaction
User server interaction
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
Snmp
SnmpSnmp
Snmp
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
HTTP
HTTPHTTP
HTTP
 
FTP
FTPFTP
FTP
 
DNS
DNSDNS
DNS
 
Group communication
Group communicationGroup communication
Group communication
 
Group communication
Group communicationGroup communication
Group communication
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

application layer protocols

  • 2. Overview  Process  network applications and application-layer protocols  Components of web application  Application-layer protocols  Addressing  User agents
  • 3. Process  Processes are communicating in a network.  A process can be thought of as a program that is running within an end system.  Processes on two different end systems communicate with each other by exchanging messages across the computer network.  A sending process creates and sends messages into the network;  A receiving process receives these messages and possibly responds by sending messages back.
  • 4. Process…  Networking applications have application-layer protocols that define the format and order of the messages exchanged between processes, as well as the actions taken on the transmission or receipt of a message.
  • 5. Network applications and application-layer protocols  An application-layer protocol is a piece of a network application.  The Web is a network application that allows users to obtain "documents" from Web servers on demand.
  • 6. Components of web application  A standard for document formats (i.e., HTML)  Web browsers (e.g., Netscape Navigator and Internet Explorer)  Web servers (e.g., Apache, Microsoft and Netscape servers),  An application-layer protocol(e.g., HTTP, FTP)  HTTP defines how messages are passed between browser and Web server.
  • 7. Application-layer protocol  Defines how an application's processes, running on different end systems, pass messages to each other. The types of messages exchanged, e.g., request messages and response messages; The syntax of the various message types, i.e., the fields in the message and how the fields are delineated; The semantics of the fields, i.e., the meaning of the information in the fields; The rules for determining when and how a process sends messages and responds to messages.
  • 8. Clients and Servers  The client side in one end system communicates with the server side in another end system.  For example, a Web browser implements the client side of HTTP and a Web server implements the server side of HTTP
  • 9. Processes Communicating Across a Network  An application involves two processes in two different hosts communicating with each other over a network.  The two processes communicate with each other by sending and receiving messages through their sockets.  A process's socket can be thought of as the process's door  A process sends messages into, and receives message from, the network through its socket.
  • 10.
  • 11. Socket  A socket is the interface between the application layer and the transport layer within a host.  It is also referred to as the API (application programmers interface) between the application and the network, since the socket is the programming interface with which networked applications are built in the Internet
  • 12. Addressing Processes  In order for a process on one host to send a message to a process on another host, the sending process must identify the receiving process.  To identify the receiving process, one must typically specify two pieces of information: (i) the name or address of the host machine, and (ii) an identifier that specifies the identity of the receiving process on the destination host.
  • 13. Addressing Processes…  In Internet applications, the destination host is specified by its IP address.  The IP address is a 32-bit quantity that uniquely identifies the end-system.  Since the IP address of any end system connected to the public Internet must be globally unique.
  • 14. Addressing Processes…  To identify the destination process to direct the message to the appropriate process on the destination system, a receive-side port number is used.  Popular application-layer protocols have been assigned specific port numbers.  For example, a Web server process (which uses the HTTP protocol) is identified by port number 80.  A mail server (using the SMTP) protocol is identified by port number 25.
  • 15. User Agents  The user agent is an interface between the user and the network application.  For example, for Web application, the user agent is a browser such as Netscape Navigator or Microsoft Explorer.  The browser allows a user to view Web pages, to navigate in the Web, to provide input to forms, to interact with Java applets, etc.  The browser also implements the client side of the HTTP protocol.  Thus, when activated, the browser is a process that, along with providing an interface to the user, sends messages into a socket.
  • 16. What Services Does an Application Need?  We can broadly classify an application's service requirements along three dimensions: data loss, bandwidth, and timing.
  • 17.
  • 18. Services Provided by the Internet Transport Protocols  TCP Services  Connection-oriented service  Reliable transport service:  Congestion Control  UDP Services  Connectionless  No guarantee  No congestion control