SlideShare a Scribd company logo
THE APPLICATION LAYER
Prepared By: Reshma Dayma
DNS- Domain Name System
 Every host in internet can be accessed using IP address, but it very difficult for humans
to remember IP address of each host, he needs to contact.
 As a solution, host are gives names, humans can access host using name.
 Naming scheme is hierarchical, domain based naming scheme.
 To manage large number of named, internet authority have managed it like postal
system. In postal system, each address consist of country, state, city, street etc.
 Names of host are also according some hierarchy.
 Conceptually, internet is divided into top 200 domain, similarly like country in postal
system.
 Each domain is partitioned into subdomains and these are further partitioned. This is
similar to states in country, and cities in state.
 This naming system can be represented by tree.
Domain Name Space
A portion of the Internet domain name space.
Domain Name System
 Getting a second level domain, such as name-of-company.com is easy.
 It just requires registration of the name with the authority of the top level domain.
 Domains are named by path from it to root in upward direction.
 Domain names are case insensitive. Each component can contain up to 63 character
and full path name must not exceed 255 characters.
 Each domain can create sub domain within it.
 Domain can contain single host or multiple host within it.
Domain Name Server
 Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses.
 This is necessary because, although domain names are easy for people to remember,
computers or machines, access websites based on IP addresses.
 Each domain can have different types of records of it, these are called resource
records.
 Recourse record is five tuple record.
domain-name time-to-live class type value
1. domain-name: is name of domain to whom given record belongs.
2. time-to-live: gives indication how stable information is.
3. class: class of information. For internet information, class is IN.
4. type: type of information.
5. value: value of record.
Resource Record
The principal DNS resource record types
Resource Records
Name Server
 A single name server can contain entire DNS database, but in practical, this server would be
overloaded.
 To avoid this problem, DNS name space is divided into zones.
 A zone contains some part of DNS tree and name server holding information about zone.
Name Server
 A zone will have a primary server and secondary server.
 Primary server gets information about zone from disk, secondary server gets information about zone
from primary servers.
 When ever host requires DNS record, it will call a program called “resolver” and pass it the host name
for which IP address is required.
 Resolver first pass query to local name server, if host name falls under boundary of that local server, it
will reply with record. This record is called “Authoritative Record”.
 If the local name server does not have data of given host name, it will ask another name server. This
method is called recursive query.
Recursive Query
Iterative Query
E mail
 Mail system is consist of TWO subsystem.
user agent: allows people to read and write mail.
Message Transfer agent: moves message from source to destination.
 User agent is program that provides command base or menu base interface.
 Message transfer agent are daemons, that run in background.
 services provided by Email system
1. Composition: process of creating and answering.
2. Transfer: Moving message from sender to receiver.
3. Reporting: report to sender about status of sent message
4. Displaying: displays the messages to the user
5. Disposition: allows to save or throw message.
Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
User Agent
 User agent is a program that accepts commands for composing, receiving, replying to message.
 When user agent starts up, it first of check mailbox of user for incoming email. Then it displays
messages in mailbox.
 Message Format: messages consist of header field, blank line and message body.
header according to RFC 822 standard is given below.
User Agent
Some other fields used in the RFC 822 message header.
User Agent
 Earlier, mail used to be written only in English and expressed in ASCII format.
Due to growth of internet, mails are required to support other type of data also.
Solution is called MIME(Multipurpose Internet Mail Extensions).
 MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.
 MIME messages can sent using normal program and protocol, only sending and receiving user
agent needs to change so that they can support other language.
 MIME header is attached after mail header, this header contains information about data and how
that data can be interpreted.
Message headers added by MIME.
Message Transfer agent
 Message transfer agent deliver message from sender to receiver.
 It complete task by establishing transport connection, transfer the data then
release connection.
 SMTP: The Simple Mail Transfer Protocol
 To send and receiver mail, SMTP is followed. Message transfer agent that is
using SMTP is listening at port 25. so TCP connection is established at port 25
of destination machine.
 These message transfer daemon accepts incoming message, copies into
appropriate mailbox.
 If message can not be delivered then error report is sent to sender.
Message Transfer agent
Architecture of the email system
Message Transfer
Message Transfer
Message Transfer
 Until now, it is assumed that receiver message agent is always ready to accept but it is not
normal.
 Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of
customer and stores in mailbox on ISP machine.
 When user agent comes on line, it will fetch mail from ISP’s machine.
 To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.
 POP3 begins when user starts mail reader. It establishes TCP connection with message agent
on ISP on port POP3.
 Once connection is established, POP3 performs three steps in sequence.
1. authentication
2. Transaction
3. Update
Message Transfer
Message transfer
Using POP3 to fetch Three Messages
WWW
 World wide web is an architectural framework for accessing linked documents spread out all over
the internet.
 The web began in 1989 at CERN, European center for nuclear research.
 In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for
further development of web.
 From users point of view, web is vast collection of documents called web pages.
 Each page may contain link to another page.
 Pages are viewed with a program called browser, browser fetches a page, interpret command in
it and displays page according to format.
 String of text that is linked to another page is called hyperlink.
WWW
Architecture of the Web.
WWW
The Client Side:
 Browser program at client side display the page and catches mouse clicks. When any item is
selected, browser follows hyperlink and page is fetched.
 In hyperlink, pages are name using URL( Uniform Resource Locator).
http://www.abcd.com/product.html
 URL has three parts,
1. Name of protocol (here http) used access resource.
2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com)
3. name of file containing the resource. (here product.html)
WWW
 When user clicks on hyperlink, browser carries out following series of steps to
fetch the page.
1. Browser determines the URL
2. Browser asks DNS for the IP address of the server
3. DNS replies
4. The browser makes a TCP connection
5. Sends HTTP request for the page
6. Server sends the page as HTTP response
7. The TCP connection is released
8. The browser displays the page
 Web pages are written in standard language like HTML, so all browser can
understand it.
WWW
 Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can
interpret all the data. To overcome problem, two solutions are possible.
1. plug in
2. helper application
(a) A browser plug-in. (b) A helper application.
WWW
The Server Side:
 The steps that server or web server performs when request from client are listed below
1. Accept a TCP connection from client
2. Get path to page, name of file requested.
3. Get the file (from disk).
4. Send contents of the file to the client.
5. Release the TCP connection.
 One problem is for every file, disk access is required. Solution is to maintain cache of n most
recently used files.
 Modern server also performs authentication and access control task, it will first perform
authentication and access control, then it will fetch file from disk.
WWW
A multithreaded Web server with a front end
and processing modules.
HTTP
 The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer
Protocol).
 It specifies what messages Client may send to server and what response they got back in
return.
 Usual way to for browser to contact server is establish TCP connection with server, send
request, get the reply and release connection.
 HTTP 1.1, supports persistent connections, with them it is possible to send and receive
multiple request, reply using single TCP connection.
 Client request pages and other action on pages using various request method.
HTTP
The built-in HTTP request methods.
HTTP
 Every request gets response consist of status line and other information.
 Status line contains three digit Status code.
The status code response groups
HTTP
 Message header:
The http methods may be followed by additional lines with more information. They are called
request headers.
 Responses from server may also additional information, they are called response headers.
 There are several types of request and response header for various purpose.
 “User-agent” header allows client to inform server about its browser, OS and other properties.
 “host” header contains servers DNS name.
HTTP
Some HTTP message headers.

More Related Content

What's hot

Automata theory
Automata theoryAutomata theory
Automata theory
Pardeep Vats
 
Domain name system
Domain name systemDomain name system
Domain name system
Diwaker Pant
 
Multiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesMultiversion Concurrency Control Techniques
Multiversion Concurrency Control Techniques
Raj vardhan
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
ABDUL GAFOOR K V
 
Lecture 1,2
Lecture 1,2Lecture 1,2
Lecture 1,2
shah zeb
 
DNS Presentation
DNS PresentationDNS Presentation
DNS Presentation
Shubham Srivastava
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
Nv Thejaswini
 
Multi Head, Multi Tape Turing Machine
Multi Head, Multi Tape Turing MachineMulti Head, Multi Tape Turing Machine
Multi Head, Multi Tape Turing Machine
Radhakrishnan Chinnusamy
 
POST’s CORRESPONDENCE PROBLEM
POST’s CORRESPONDENCE PROBLEMPOST’s CORRESPONDENCE PROBLEM
POST’s CORRESPONDENCE PROBLEM
Rajendran
 
Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)   Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)
Tasif Tanzim
 
Domain name system presentation
Domain name system presentationDomain name system presentation
Domain name system presentation
Anchit Dhingra
 
Domain name system
Domain name systemDomain name system
Domain name system
mahakant sharma
 
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with ExamplesDML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
LGS, GBHS&IC, University Of South-Asia, TARA-Technologies
 
Know the UNIX Commands
Know the UNIX CommandsKnow the UNIX Commands
Know the UNIX Commands
Brahma Killampalli
 
Vi editor in linux
Vi editor in linuxVi editor in linux
Vi editor in linux
Bhumivaghasiya
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
Akshay Tiwari
 
Turing machine - theory of computation
Turing machine - theory of computationTuring machine - theory of computation
Turing machine - theory of computation
Rubaya Mim
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
ThousandEyes
 
Finite Automata
Finite AutomataFinite Automata
Finite Automata
Mukesh Tekwani
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
Shashidhara Vyakaranal
 

What's hot (20)

Automata theory
Automata theoryAutomata theory
Automata theory
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Multiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesMultiversion Concurrency Control Techniques
Multiversion Concurrency Control Techniques
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Lecture 1,2
Lecture 1,2Lecture 1,2
Lecture 1,2
 
DNS Presentation
DNS PresentationDNS Presentation
DNS Presentation
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Multi Head, Multi Tape Turing Machine
Multi Head, Multi Tape Turing MachineMulti Head, Multi Tape Turing Machine
Multi Head, Multi Tape Turing Machine
 
POST’s CORRESPONDENCE PROBLEM
POST’s CORRESPONDENCE PROBLEMPOST’s CORRESPONDENCE PROBLEM
POST’s CORRESPONDENCE PROBLEM
 
Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)   Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)
 
Domain name system presentation
Domain name system presentationDomain name system presentation
Domain name system presentation
 
Domain name system
Domain name systemDomain name system
Domain name system
 
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with ExamplesDML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
DML, DDL, DCL ,DRL/DQL and TCL Statements in SQL with Examples
 
Know the UNIX Commands
Know the UNIX CommandsKnow the UNIX Commands
Know the UNIX Commands
 
Vi editor in linux
Vi editor in linuxVi editor in linux
Vi editor in linux
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Turing machine - theory of computation
Turing machine - theory of computationTuring machine - theory of computation
Turing machine - theory of computation
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
 
Finite Automata
Finite AutomataFinite Automata
Finite Automata
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 

Viewers also liked

Wap & WML
Wap & WMLWap & WML
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
Application layer jain
Application layer jainApplication layer jain
Application layer jain
chempa
 
Application layer
Application layerApplication layer
Application layer
Sagar jethi
 
Object Oriented Concept
Object Oriented ConceptObject Oriented Concept
Object Oriented Concept
smj
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
Dr. Amitava Nag
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
Hasam Panezai
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
Fatbardh Hysa
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
adil raja
 

Viewers also liked (12)

Wap & WML
Wap & WMLWap & WML
Wap & WML
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Application layer jain
Application layer jainApplication layer jain
Application layer jain
 
Application layer
Application layerApplication layer
Application layer
 
Object Oriented Concept
Object Oriented ConceptObject Oriented Concept
Object Oriented Concept
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Transport layer
Transport layer Transport layer
Transport layer
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Application Layer
Application Layer Application Layer
Application Layer
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 

Similar to Application layer

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
N.Jagadish Kumar
 
telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp email
swatihans
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
MarwaAnany1
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
Pushkar Mishra
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
ZahouAmel1
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
Salauddin Rubel
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.ppt
GirT2
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
MochamadSyaifulAnwar2
 
Chapter3
Chapter3Chapter3
Chapter3
siageoksoon
 
Application layer
Application layer Application layer
Application layer
anonymous
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdf
EidTahir
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
ArunArun542872
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
syedhaiderraza
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
VISWANATHAN R V
 
Application layer
Application layerApplication layer
Application layer
Sisir Ghosh
 
Application layer
Application layerApplication layer
Application layer
Mukesh Chinta
 
Appl layer
Appl layerAppl layer
Appl layer
rajanikant
 
Application layer
Application layerApplication layer
Application layer
AnithaRaj31
 

Similar to Application layer (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp email
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.ppt
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Chapter3
Chapter3Chapter3
Chapter3
 
Application layer
Application layer Application layer
Application layer
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdf
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Appl layer
Appl layerAppl layer
Appl layer
 
Application layer
Application layerApplication layer
Application layer
 

Recently uploaded

CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 

Recently uploaded (20)

CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 

Application layer

  • 2. DNS- Domain Name System  Every host in internet can be accessed using IP address, but it very difficult for humans to remember IP address of each host, he needs to contact.  As a solution, host are gives names, humans can access host using name.  Naming scheme is hierarchical, domain based naming scheme.  To manage large number of named, internet authority have managed it like postal system. In postal system, each address consist of country, state, city, street etc.  Names of host are also according some hierarchy.  Conceptually, internet is divided into top 200 domain, similarly like country in postal system.  Each domain is partitioned into subdomains and these are further partitioned. This is similar to states in country, and cities in state.  This naming system can be represented by tree.
  • 3. Domain Name Space A portion of the Internet domain name space.
  • 4. Domain Name System  Getting a second level domain, such as name-of-company.com is easy.  It just requires registration of the name with the authority of the top level domain.  Domains are named by path from it to root in upward direction.  Domain names are case insensitive. Each component can contain up to 63 character and full path name must not exceed 255 characters.  Each domain can create sub domain within it.  Domain can contain single host or multiple host within it.
  • 5. Domain Name Server  Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.  This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.  Each domain can have different types of records of it, these are called resource records.  Recourse record is five tuple record. domain-name time-to-live class type value 1. domain-name: is name of domain to whom given record belongs. 2. time-to-live: gives indication how stable information is. 3. class: class of information. For internet information, class is IN. 4. type: type of information. 5. value: value of record.
  • 6. Resource Record The principal DNS resource record types
  • 8. Name Server  A single name server can contain entire DNS database, but in practical, this server would be overloaded.  To avoid this problem, DNS name space is divided into zones.  A zone contains some part of DNS tree and name server holding information about zone.
  • 9. Name Server  A zone will have a primary server and secondary server.  Primary server gets information about zone from disk, secondary server gets information about zone from primary servers.  When ever host requires DNS record, it will call a program called “resolver” and pass it the host name for which IP address is required.  Resolver first pass query to local name server, if host name falls under boundary of that local server, it will reply with record. This record is called “Authoritative Record”.  If the local name server does not have data of given host name, it will ask another name server. This method is called recursive query.
  • 12. E mail  Mail system is consist of TWO subsystem. user agent: allows people to read and write mail. Message Transfer agent: moves message from source to destination.  User agent is program that provides command base or menu base interface.  Message transfer agent are daemons, that run in background.  services provided by Email system 1. Composition: process of creating and answering. 2. Transfer: Moving message from sender to receiver. 3. Reporting: report to sender about status of sent message 4. Displaying: displays the messages to the user 5. Disposition: allows to save or throw message. Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
  • 13. User Agent  User agent is a program that accepts commands for composing, receiving, replying to message.  When user agent starts up, it first of check mailbox of user for incoming email. Then it displays messages in mailbox.  Message Format: messages consist of header field, blank line and message body. header according to RFC 822 standard is given below.
  • 14. User Agent Some other fields used in the RFC 822 message header.
  • 15. User Agent  Earlier, mail used to be written only in English and expressed in ASCII format. Due to growth of internet, mails are required to support other type of data also. Solution is called MIME(Multipurpose Internet Mail Extensions).  MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.  MIME messages can sent using normal program and protocol, only sending and receiving user agent needs to change so that they can support other language.  MIME header is attached after mail header, this header contains information about data and how that data can be interpreted. Message headers added by MIME.
  • 16. Message Transfer agent  Message transfer agent deliver message from sender to receiver.  It complete task by establishing transport connection, transfer the data then release connection.  SMTP: The Simple Mail Transfer Protocol  To send and receiver mail, SMTP is followed. Message transfer agent that is using SMTP is listening at port 25. so TCP connection is established at port 25 of destination machine.  These message transfer daemon accepts incoming message, copies into appropriate mailbox.  If message can not be delivered then error report is sent to sender.
  • 17. Message Transfer agent Architecture of the email system
  • 20. Message Transfer  Until now, it is assumed that receiver message agent is always ready to accept but it is not normal.  Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of customer and stores in mailbox on ISP machine.  When user agent comes on line, it will fetch mail from ISP’s machine.  To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.  POP3 begins when user starts mail reader. It establishes TCP connection with message agent on ISP on port POP3.  Once connection is established, POP3 performs three steps in sequence. 1. authentication 2. Transaction 3. Update
  • 22. Message transfer Using POP3 to fetch Three Messages
  • 23. WWW  World wide web is an architectural framework for accessing linked documents spread out all over the internet.  The web began in 1989 at CERN, European center for nuclear research.  In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for further development of web.  From users point of view, web is vast collection of documents called web pages.  Each page may contain link to another page.  Pages are viewed with a program called browser, browser fetches a page, interpret command in it and displays page according to format.  String of text that is linked to another page is called hyperlink.
  • 25. WWW The Client Side:  Browser program at client side display the page and catches mouse clicks. When any item is selected, browser follows hyperlink and page is fetched.  In hyperlink, pages are name using URL( Uniform Resource Locator). http://www.abcd.com/product.html  URL has three parts, 1. Name of protocol (here http) used access resource. 2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com) 3. name of file containing the resource. (here product.html)
  • 26. WWW  When user clicks on hyperlink, browser carries out following series of steps to fetch the page. 1. Browser determines the URL 2. Browser asks DNS for the IP address of the server 3. DNS replies 4. The browser makes a TCP connection 5. Sends HTTP request for the page 6. Server sends the page as HTTP response 7. The TCP connection is released 8. The browser displays the page  Web pages are written in standard language like HTML, so all browser can understand it.
  • 27. WWW  Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can interpret all the data. To overcome problem, two solutions are possible. 1. plug in 2. helper application (a) A browser plug-in. (b) A helper application.
  • 28. WWW The Server Side:  The steps that server or web server performs when request from client are listed below 1. Accept a TCP connection from client 2. Get path to page, name of file requested. 3. Get the file (from disk). 4. Send contents of the file to the client. 5. Release the TCP connection.  One problem is for every file, disk access is required. Solution is to maintain cache of n most recently used files.  Modern server also performs authentication and access control task, it will first perform authentication and access control, then it will fetch file from disk.
  • 29. WWW A multithreaded Web server with a front end and processing modules.
  • 30. HTTP  The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer Protocol).  It specifies what messages Client may send to server and what response they got back in return.  Usual way to for browser to contact server is establish TCP connection with server, send request, get the reply and release connection.  HTTP 1.1, supports persistent connections, with them it is possible to send and receive multiple request, reply using single TCP connection.  Client request pages and other action on pages using various request method.
  • 31. HTTP The built-in HTTP request methods.
  • 32. HTTP  Every request gets response consist of status line and other information.  Status line contains three digit Status code. The status code response groups
  • 33. HTTP  Message header: The http methods may be followed by additional lines with more information. They are called request headers.  Responses from server may also additional information, they are called response headers.  There are several types of request and response header for various purpose.  “User-agent” header allows client to inform server about its browser, OS and other properties.  “host” header contains servers DNS name.