SlideShare a Scribd company logo
1 of 34
THE APPLICATION LAYER
DNS- Domain Name System
 Every host in internet can be accessed using IP address, but it very difficult for humans
to remember IP address of each host, he needs to contact.
 As a solution, host are gives names, humans can access host using name.
 Naming scheme is hierarchical, domain based naming scheme.
 To manage large number of named, internet authority have managed it like postal
system. In postal system, each address consist of country, state, city, street etc.
 Names of host are also according some hierarchy.
 Conceptually, internet is divided into top 200 domain, similarly like country in postal
system.
 Each domain is partitioned into subdomains and these are further partitioned. This is
similar to states in country, and cities in state.
 This naming system can be represented by tree.
Domain Name Space
A portion of the Internet domain name space.
Domain Name System
 Getting a second level domain, such as name-of-company.com is easy.
 It just requires registration of the name with the authority of the top level domain.
 Domains are named by path from it to root in upward direction.
 Domain names are case insensitive. Each component can contain up to 63 character
and full path name must not exceed 255 characters.
 Each domain can create sub domain within it.
 Domain can contain single host or multiple host within it.
Domain Name Server
 Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses.
 This is necessary because, although domain names are easy for people to remember,
computers or machines, access websites based on IP addresses.
 Each domain can have different types of records of it, these are called resource
records.
 Recourse record is five tuple record.
domain-name time-to-live class type value
1. domain-name: is name of domain to whom given record belongs.
2. time-to-live: gives indication how stable information is.
3. class: class of information. For internet information, class is IN.
4. type: type of information.
5. value: value of record.
Resource Record
The principal DNS resource record types
Resource Records
Name Server
 A single name server can contain entire DNS database, but in practical, this server would be
overloaded.
 To avoid this problem, DNS name space is divided into zones.
 A zone contains some part of DNS tree and name server holding information about zone.
Name Server
 A zone will have a primary server and secondary server.
 Primary server gets information about zone from disk, secondary server gets information about zone
from primary servers.
 When ever host requires DNS record, it will call a program called “resolver” and pass it the host name
for which IP address is required.
 Resolver first pass query to local name server, if host name falls under boundary of that local server, it
will reply with record. This record is called “Authoritative Record”.
 If the local name server does not have data of given host name, it will ask another name server. This
method is called recursive query.
Recursive Query
Iterative Query
E mail
 Mail system is consist of TWO subsystem.
user agent: allows people to read and write mail.
Message Transfer agent: moves message from source to destination.
 User agent is program that provides command base or menu base interface.
 Message transfer agent are daemons, that run in background.
 services provided by Email system
1. Composition: process of creating and answering.
2. Transfer: Moving message from sender to receiver.
3. Reporting: report to sender about status of sent message
4. Displaying: displays the messages to the user
5. Disposition: allows to save or throw message.
Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
User Agent
 User agent is a program that accepts commands for composing, receiving, replying to message.
 When user agent starts up, it first of check mailbox of user for incoming email. Then it displays
messages in mailbox.
 Message Format: messages consist of header field, blank line and message body.
header according to RFC 822 standard is given below.
User Agent
Some other fields used in the RFC 822 message header.
User Agent
 Earlier, mail used to be written only in English and expressed in ASCII format.
Due to growth of internet, mails are required to support other type of data also.
Solution is called MIME(Multipurpose Internet Mail Extensions).
 MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.
 MIME messages can sent using normal program and protocol, only sending and receiving user
agent needs to change so that they can support other language.
 MIME header is attached after mail header, this header contains information about data and how
that data can be interpreted.
Message headers added by MIME.
Message Transfer agent
 Message transfer agent deliver message from sender to receiver.
 It complete task by establishing transport connection, transfer the data then
release connection.
 SMTP: The Simple Mail Transfer Protocol
 To send and receiver mail, SMTP is followed. Message transfer agent that is
using SMTP is listening at port 25. so TCP connection is established at port 25
of destination machine.
 These message transfer daemon accepts incoming message, copies into
appropriate mailbox.
 If message can not be delivered then error report is sent to sender.
Message Transfer agent
Architecture of the email system
Message Transfer
Message Transfer
Message Transfer
 Until now, it is assumed that receiver message agent is always ready to accept but it is not
normal.
 Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of
customer and stores in mailbox on ISP machine.
 When user agent comes on line, it will fetch mail from ISP’s machine.
 To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.
 POP3 begins when user starts mail reader. It establishes TCP connection with message agent
on ISP on port POP3.
 Once connection is established, POP3 performs three steps in sequence.
1. authentication
2. Transaction
3. Update
Message Transfer
Message transfer
Using POP3 to fetch Three Messages
WWW
 World wide web is an architectural framework for accessing linked documents spread out all over
the internet.
 The web began in 1989 at CERN, European center for nuclear research.
 In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for
further development of web.
 From users point of view, web is vast collection of documents called web pages.
 Each page may contain link to another page.
 Pages are viewed with a program called browser, browser fetches a page, interpret command in
it and displays page according to format.
 String of text that is linked to another page is called hyperlink.
WWW
Architecture of the Web.
WWW
The Client Side:
 Browser program at client side display the page and catches mouse clicks. When any item is
selected, browser follows hyperlink and page is fetched.
 In hyperlink, pages are name using URL( Uniform Resource Locator).
http://www.abcd.com/product.html
 URL has three parts,
1. Name of protocol (here http) used access resource.
2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com)
3. name of file containing the resource. (here product.html)
WWW
 When user clicks on hyperlink, browser carries out following series of steps to
fetch the page.
1. Browser determines the URL
2. Browser asks DNS for the IP address of the server
3. DNS replies
4. The browser makes a TCP connection
5. Sends HTTP request for the page
6. Server sends the page as HTTP response
7. The TCP connection is released
8. The browser displays the page
 Web pages are written in standard language like HTML, so all browser can
understand it.
WWW
 Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can
interpret all the data. To overcome problem, two solutions are possible.
1. plug in
2. helper application
(a) A browser plug-in. (b) A helper application.
WWW
The Server Side:
 The steps that server or web server performs when request from client are listed below
1. Accept a TCP connection from client
2. Get path to page, name of file requested.
3. Get the file (from disk).
4. Send contents of the file to the client.
5. Release the TCP connection.
 One problem is for every file, disk access is required. Solution is to maintain cache of n most
recently used files.
 Modern server also performs authentication and access control task, it will first perform
authentication and access control, then it will fetch file from disk.
WWW
A multithreaded Web server with a front end
and processing modules.
HTTP
 The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer
Protocol).
 It specifies what messages Client may send to server and what response they got back in
return.
 Usual way to for browser to contact server is establish TCP connection with server, send
request, get the reply and release connection.
 HTTP 1.1, supports persistent connections, with them it is possible to send and receive
multiple request, reply using single TCP connection.
 Client request pages and other action on pages using various request method.
HTTP
The built-in HTTP request methods.
HTTP
 Every request gets response consist of status line and other information.
 Status line contains three digit Status code.
The status code response groups
HTTP
 Message header:
The http methods may be followed by additional lines with more information. They are called
request headers.
 Responses from server may also additional information, they are called response headers.
 There are several types of request and response header for various purpose.
 “User-agent” header allows client to inform server about its browser, OS and other properties.
 “host” header contains servers DNS name.
HTTP
Some HTTP message headers.

More Related Content

What's hot

Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffenHarikiran Raju
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolUjjayanta Bhaumik
 
Domain name system (dns)
Domain name system (dns)Domain name system (dns)
Domain name system (dns)Atikur Rahman
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol BasicChuong Mai
 

What's hot (20)

Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffen
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Transport layer
Transport layerTransport layer
Transport layer
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Domain name system (dns)
Domain name system (dns)Domain name system (dns)
Domain name system (dns)
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Computer network
Computer networkComputer network
Computer network
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
web server
web serverweb server
web server
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 

Viewers also liked

The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (9)

Application Layer
Application Layer Application Layer
Application Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Email ppt
Email pptEmail ppt
Email ppt
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Application layer

telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp emailswatihans
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptxMarwaAnany1
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationPushkar Mishra
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptxZahouAmel1
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.pptGirT2
 
Application layer
Application layer Application layer
Application layer anonymous
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdfEidTahir
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 

Similar to Application layer (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp email
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.ppt
 
Chapter3
Chapter3Chapter3
Chapter3
 
Application layer
Application layer Application layer
Application layer
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdf
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Appl layer
Appl layerAppl layer
Appl layer
 
Application layer
Application layerApplication layer
Application layer
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 

Application layer

  • 2. DNS- Domain Name System  Every host in internet can be accessed using IP address, but it very difficult for humans to remember IP address of each host, he needs to contact.  As a solution, host are gives names, humans can access host using name.  Naming scheme is hierarchical, domain based naming scheme.  To manage large number of named, internet authority have managed it like postal system. In postal system, each address consist of country, state, city, street etc.  Names of host are also according some hierarchy.  Conceptually, internet is divided into top 200 domain, similarly like country in postal system.  Each domain is partitioned into subdomains and these are further partitioned. This is similar to states in country, and cities in state.  This naming system can be represented by tree.
  • 3. Domain Name Space A portion of the Internet domain name space.
  • 4. Domain Name System  Getting a second level domain, such as name-of-company.com is easy.  It just requires registration of the name with the authority of the top level domain.  Domains are named by path from it to root in upward direction.  Domain names are case insensitive. Each component can contain up to 63 character and full path name must not exceed 255 characters.  Each domain can create sub domain within it.  Domain can contain single host or multiple host within it.
  • 5. Domain Name Server  Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.  This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.  Each domain can have different types of records of it, these are called resource records.  Recourse record is five tuple record. domain-name time-to-live class type value 1. domain-name: is name of domain to whom given record belongs. 2. time-to-live: gives indication how stable information is. 3. class: class of information. For internet information, class is IN. 4. type: type of information. 5. value: value of record.
  • 6. Resource Record The principal DNS resource record types
  • 8. Name Server  A single name server can contain entire DNS database, but in practical, this server would be overloaded.  To avoid this problem, DNS name space is divided into zones.  A zone contains some part of DNS tree and name server holding information about zone.
  • 9. Name Server  A zone will have a primary server and secondary server.  Primary server gets information about zone from disk, secondary server gets information about zone from primary servers.  When ever host requires DNS record, it will call a program called “resolver” and pass it the host name for which IP address is required.  Resolver first pass query to local name server, if host name falls under boundary of that local server, it will reply with record. This record is called “Authoritative Record”.  If the local name server does not have data of given host name, it will ask another name server. This method is called recursive query.
  • 12. E mail  Mail system is consist of TWO subsystem. user agent: allows people to read and write mail. Message Transfer agent: moves message from source to destination.  User agent is program that provides command base or menu base interface.  Message transfer agent are daemons, that run in background.  services provided by Email system 1. Composition: process of creating and answering. 2. Transfer: Moving message from sender to receiver. 3. Reporting: report to sender about status of sent message 4. Displaying: displays the messages to the user 5. Disposition: allows to save or throw message. Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
  • 13. User Agent  User agent is a program that accepts commands for composing, receiving, replying to message.  When user agent starts up, it first of check mailbox of user for incoming email. Then it displays messages in mailbox.  Message Format: messages consist of header field, blank line and message body. header according to RFC 822 standard is given below.
  • 14. User Agent Some other fields used in the RFC 822 message header.
  • 15. User Agent  Earlier, mail used to be written only in English and expressed in ASCII format. Due to growth of internet, mails are required to support other type of data also. Solution is called MIME(Multipurpose Internet Mail Extensions).  MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.  MIME messages can sent using normal program and protocol, only sending and receiving user agent needs to change so that they can support other language.  MIME header is attached after mail header, this header contains information about data and how that data can be interpreted. Message headers added by MIME.
  • 16. Message Transfer agent  Message transfer agent deliver message from sender to receiver.  It complete task by establishing transport connection, transfer the data then release connection.  SMTP: The Simple Mail Transfer Protocol  To send and receiver mail, SMTP is followed. Message transfer agent that is using SMTP is listening at port 25. so TCP connection is established at port 25 of destination machine.  These message transfer daemon accepts incoming message, copies into appropriate mailbox.  If message can not be delivered then error report is sent to sender.
  • 17. Message Transfer agent Architecture of the email system
  • 20. Message Transfer  Until now, it is assumed that receiver message agent is always ready to accept but it is not normal.  Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of customer and stores in mailbox on ISP machine.  When user agent comes on line, it will fetch mail from ISP’s machine.  To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.  POP3 begins when user starts mail reader. It establishes TCP connection with message agent on ISP on port POP3.  Once connection is established, POP3 performs three steps in sequence. 1. authentication 2. Transaction 3. Update
  • 22. Message transfer Using POP3 to fetch Three Messages
  • 23. WWW  World wide web is an architectural framework for accessing linked documents spread out all over the internet.  The web began in 1989 at CERN, European center for nuclear research.  In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for further development of web.  From users point of view, web is vast collection of documents called web pages.  Each page may contain link to another page.  Pages are viewed with a program called browser, browser fetches a page, interpret command in it and displays page according to format.  String of text that is linked to another page is called hyperlink.
  • 25. WWW The Client Side:  Browser program at client side display the page and catches mouse clicks. When any item is selected, browser follows hyperlink and page is fetched.  In hyperlink, pages are name using URL( Uniform Resource Locator). http://www.abcd.com/product.html  URL has three parts, 1. Name of protocol (here http) used access resource. 2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com) 3. name of file containing the resource. (here product.html)
  • 26. WWW  When user clicks on hyperlink, browser carries out following series of steps to fetch the page. 1. Browser determines the URL 2. Browser asks DNS for the IP address of the server 3. DNS replies 4. The browser makes a TCP connection 5. Sends HTTP request for the page 6. Server sends the page as HTTP response 7. The TCP connection is released 8. The browser displays the page  Web pages are written in standard language like HTML, so all browser can understand it.
  • 27. WWW  Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can interpret all the data. To overcome problem, two solutions are possible. 1. plug in 2. helper application (a) A browser plug-in. (b) A helper application.
  • 28. WWW The Server Side:  The steps that server or web server performs when request from client are listed below 1. Accept a TCP connection from client 2. Get path to page, name of file requested. 3. Get the file (from disk). 4. Send contents of the file to the client. 5. Release the TCP connection.  One problem is for every file, disk access is required. Solution is to maintain cache of n most recently used files.  Modern server also performs authentication and access control task, it will first perform authentication and access control, then it will fetch file from disk.
  • 29. WWW A multithreaded Web server with a front end and processing modules.
  • 30. HTTP  The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer Protocol).  It specifies what messages Client may send to server and what response they got back in return.  Usual way to for browser to contact server is establish TCP connection with server, send request, get the reply and release connection.  HTTP 1.1, supports persistent connections, with them it is possible to send and receive multiple request, reply using single TCP connection.  Client request pages and other action on pages using various request method.
  • 31. HTTP The built-in HTTP request methods.
  • 32. HTTP  Every request gets response consist of status line and other information.  Status line contains three digit Status code. The status code response groups
  • 33. HTTP  Message header: The http methods may be followed by additional lines with more information. They are called request headers.  Responses from server may also additional information, they are called response headers.  There are several types of request and response header for various purpose.  “User-agent” header allows client to inform server about its browser, OS and other properties.  “host” header contains servers DNS name.