SlideShare a Scribd company logo
Application
Layer
Protocols
HTTP –
HyperText
Transfer
Protocol
○ Many applications are running concurrently over
the Web, such as web browsing/surfing, e-mail,
file transfer, audio & video streaming, and so
on. In order for proper communication to take
place between the client and the server, these
applications must agree on a specific application-
level protocol such as HTTP, FTP, SMTP, POP, and
etc.
3
HyperText Transfer Protocol (HTTP)
HTTP is an asymmetric request-response client-server protocol as
illustrated. An HTTP client sends a request message to an HTTP
server. The server, in turn, returns a response message. In other
words, HTTP is a pull protocol, the client pulls information from the
server (instead of server pushes information down to the client).
4
“ 5
Whenever you issues a URL from your browser to get a web resource using HTTP,
e.g. http://www.nowhere123.com/index.html, the browser turns the URL into a request message and sends it to the
HTTP server. The HTTP server interprets the request message, and returns you an appropriate response message
which is either the resource you requested or an error message. This process is illustrated below:
HTTP – Request Message
As mentioned, whenever you enter a URL in the address box of the browser, the browser
translates the URL into a request message according to the specified protocol; and sends
the request message to the server. For example, the browser translated the URL
http://www.test101.com/doc/index.html into the following request message:
6
“Request Message Format-
bytecode
for carriage
return
bytes that
are placed as
end-of-line
markers.
HTTP – Response Message
When this request message reaches the server, the server can take either one of these
actions:
1)The server interprets the request received, maps the request into a file under the
server's document directory, and returns the file requested to the client.
2)The server interprets the request received, maps the request into a program kept in the
server, executes the program, and returns the output of the program to the client.
3)The request cannot be satisfied, the server returns an error message.
Response Message Format-
“○ HTTP Request Methods
HTTP protocol defines a set of request methods. The methods are:
GET: A client can use the GET request to get a web resource from the server.
HEAD: A client can use the HEAD request to get the header that a GET request would have
obtained. Since the header contains the last-modified date of the data, this can be used to
check against the local cache copy.
POST: Used to post data up to the web server.
PUT: Ask the server to store the data.
DELETE: Ask the server to delete the data.
TRACE: Ask the server to return a diagnostic trace of the actions it takes.
OPTIONS: Ask the server to return the list of request methods it supports.
CONNECT: Used to tell a proxy to make a connection to another host and simply reply the
content, without attempting to parse or cache it. This is often used to make SSL connection
through the proxy.
GET - Request method
GET is the most common HTTP request method. A client can use the GET request method to request (or
"get") for a piece of resource from an HTTP server. A GET request message takes the following syntax:
GET request-URI HTTP-version
(optional request headers)
(blank line)
(optional request body)
 The keyword GET is case sensitive and must be in uppercase.
 request-URI: specifies the path of resource requested, which must begin from the root
"/" of the document base directory.
 HTTP-version: Either HTTP/1.0 or HTTP/1.1. This client negotiates the protocol to be used
for the current session. For example, the client may request to use HTTP/1.1. If the server
does not support HTTP/1.1, it may inform the client in the response to use HTTP/1.0.
 The client uses the optional request headers (such as Accept, Accept-Language, and etc)
to negotiate with the server and ask the server to deliver the preferred contents (e.g., in
the language that the client preferred).
 GET request message has an optional request body which contains the query string
“○ For Deep learning of HTTP protocol-
Testing HTTP Requests
Network Program
Response Status Code
Misspelt Request Method
404 File Not Found
Wrong HTTP Version Number
Wrong Request-URI
Keep-Alive Connection
https://www.ntu.edu.sg/home/ehchua/programming/webprog
ramming/HTTP_Basics.html
Simple Mail Transfer Protocol (SMTP)
SMTP is a push protocol and is used to send the mail whereas POP (post office protocol)
or IMAP (internet message access protocol) are used to retrieve those mails at the
receiver’s side.
“○ SMTP System
Connection Establishment-
MTA Client MTA Server
220 Service Ready
Helo deanza.edu
250 OK
Email Message Process-
“○ Connection Termination
SMTP Commands-
“○ Post Office Protocol-
Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts
and retrieves email from a remote mail server for access by the host machine.
Techopedia explains Post Office Protocol (POP)
Post Office Protocol is the primary protocol behind email communication. POP works through a
supporting email software client that integrates POP for connecting to the remote email server and
downloading email messages to the recipient’s computer machine.
POP uses the TCP/IP protocol stack for network connection and works with Simple Mail Transfer Protocol
(SMTP) for end-to-end email communication, where POP pulls messages and SMTP pushes them to the
server. As of 2012, Post Office Protocol is in its third version known as POP 3 and is commonly used in
most email client/server communication architecture.
Downloading
Email in POP 3
“○ Disadvantages of POP3
1)Opening attachments is a quick and painless process, unless the attachment has a virus
payload in it.
If you have JavaScript enabled in your email reader, you might be target of rogue JavaScript
embedded in an email.
2)All messages are stored on your hard drive eating up what is sometimes very valuable
space.
Since all attachments are stored (downloaded) on your PC there is a potential danger of
virus attack if they are not properly scanned by virus scanners. Then sirus scans can only
address 60% of attacks effectively leaving your PC to a great danger.
3)Email folders can become corrupted and sometimes lost forever. Recovering is often a
painful exercise.
4)All messages are stored on your system, and privacy disappears when someone sits down
at your machine. Even if your email reader is password protected, it is often possible for
someone who knows what they are doing to read your email by using another application
to open your mail folders.
Thanks !
Any questions?
You can find detail info at
https://en.wikibooks.org/wiki/Communication_Networks/HTTP_Protocol
😉
https://technet.microsoft.com/en-us/library/cc737236(v=ws.10).aspx

More Related Content

What's hot

Application layer
Application layerApplication layer
Application layer
reshmadayma
 
Application layer
Application layerApplication layer
Application layer
Mukesh Chinta
 
Application layer
Application layerApplication layer
Application layer
AnithaRaj31
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
N.Jagadish Kumar
 
Application layer
Application layerApplication layer
Application layer
reshmadayma
 
Application protocols
Application protocolsApplication protocols
Application protocols
Online
 
Application layer
Application layerApplication layer
Application layer
Ahmed_Hamed_Attia
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
Dr. Amitava Nag
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
Nil Menon
 
Chapter 2 : Application Layer
Chapter 2 : Application LayerChapter 2 : Application Layer
Chapter 2 : Application Layer
Amin Omi
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocolTom Hanstead
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
tumetr1
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
Online
 

What's hot (20)

Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer
Application layerApplication layer
Application layer
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Application layer
Application layerApplication layer
Application layer
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Chapter 2 : Application Layer
Chapter 2 : Application LayerChapter 2 : Application Layer
Chapter 2 : Application Layer
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
Chapter4
Chapter4Chapter4
Chapter4
 
Protocol
ProtocolProtocol
Protocol
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 

Similar to Application layer

Hypertex transfer protocol
Hypertex transfer protocolHypertex transfer protocol
Hypertex transfer protocolwanangwa234
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
Akshay Dhole
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
VietAnhNguyen337355
 
Http
HttpHttp
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
Abshar Fatima
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
DeepakKumar408406
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcaRenu Thakur
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
VISWANATHAN R V
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
Gouasmia Zakaria
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP webhostingguy
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
Port80 Software
 
Application layer
Application layer Application layer
Application layer
anonymous
 
Www and http
Www and httpWww and http
Www and http
SanthiNivas
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
Syed Ariful Islam Emon
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
MochamadSyaifulAnwar2
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
ShehryarFreelancer
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
MarwaAnany1
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 

Similar to Application layer (20)

Hypertex transfer protocol
Hypertex transfer protocolHypertex transfer protocol
Hypertex transfer protocol
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
 
Http
HttpHttp
Http
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
 
Www and http
Www and httpWww and http
Www and http
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Application layer
Application layer Application layer
Application layer
 
Www and http
Www and httpWww and http
Www and http
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 

Recently uploaded

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 

Application layer

  • 1.
  • 3. HTTP – HyperText Transfer Protocol ○ Many applications are running concurrently over the Web, such as web browsing/surfing, e-mail, file transfer, audio & video streaming, and so on. In order for proper communication to take place between the client and the server, these applications must agree on a specific application- level protocol such as HTTP, FTP, SMTP, POP, and etc. 3
  • 4. HyperText Transfer Protocol (HTTP) HTTP is an asymmetric request-response client-server protocol as illustrated. An HTTP client sends a request message to an HTTP server. The server, in turn, returns a response message. In other words, HTTP is a pull protocol, the client pulls information from the server (instead of server pushes information down to the client). 4
  • 5. “ 5 Whenever you issues a URL from your browser to get a web resource using HTTP, e.g. http://www.nowhere123.com/index.html, the browser turns the URL into a request message and sends it to the HTTP server. The HTTP server interprets the request message, and returns you an appropriate response message which is either the resource you requested or an error message. This process is illustrated below:
  • 6. HTTP – Request Message As mentioned, whenever you enter a URL in the address box of the browser, the browser translates the URL into a request message according to the specified protocol; and sends the request message to the server. For example, the browser translated the URL http://www.test101.com/doc/index.html into the following request message: 6
  • 7. “Request Message Format- bytecode for carriage return bytes that are placed as end-of-line markers.
  • 8. HTTP – Response Message When this request message reaches the server, the server can take either one of these actions: 1)The server interprets the request received, maps the request into a file under the server's document directory, and returns the file requested to the client. 2)The server interprets the request received, maps the request into a program kept in the server, executes the program, and returns the output of the program to the client. 3)The request cannot be satisfied, the server returns an error message.
  • 10. “○ HTTP Request Methods HTTP protocol defines a set of request methods. The methods are: GET: A client can use the GET request to get a web resource from the server. HEAD: A client can use the HEAD request to get the header that a GET request would have obtained. Since the header contains the last-modified date of the data, this can be used to check against the local cache copy. POST: Used to post data up to the web server. PUT: Ask the server to store the data. DELETE: Ask the server to delete the data. TRACE: Ask the server to return a diagnostic trace of the actions it takes. OPTIONS: Ask the server to return the list of request methods it supports. CONNECT: Used to tell a proxy to make a connection to another host and simply reply the content, without attempting to parse or cache it. This is often used to make SSL connection through the proxy.
  • 11. GET - Request method GET is the most common HTTP request method. A client can use the GET request method to request (or "get") for a piece of resource from an HTTP server. A GET request message takes the following syntax: GET request-URI HTTP-version (optional request headers) (blank line) (optional request body)  The keyword GET is case sensitive and must be in uppercase.  request-URI: specifies the path of resource requested, which must begin from the root "/" of the document base directory.  HTTP-version: Either HTTP/1.0 or HTTP/1.1. This client negotiates the protocol to be used for the current session. For example, the client may request to use HTTP/1.1. If the server does not support HTTP/1.1, it may inform the client in the response to use HTTP/1.0.  The client uses the optional request headers (such as Accept, Accept-Language, and etc) to negotiate with the server and ask the server to deliver the preferred contents (e.g., in the language that the client preferred).  GET request message has an optional request body which contains the query string
  • 12. “○ For Deep learning of HTTP protocol- Testing HTTP Requests Network Program Response Status Code Misspelt Request Method 404 File Not Found Wrong HTTP Version Number Wrong Request-URI Keep-Alive Connection https://www.ntu.edu.sg/home/ehchua/programming/webprog ramming/HTTP_Basics.html
  • 13. Simple Mail Transfer Protocol (SMTP) SMTP is a push protocol and is used to send the mail whereas POP (post office protocol) or IMAP (internet message access protocol) are used to retrieve those mails at the receiver’s side.
  • 15. Connection Establishment- MTA Client MTA Server 220 Service Ready Helo deanza.edu 250 OK
  • 19.
  • 20. “○ Post Office Protocol- Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server for access by the host machine. Techopedia explains Post Office Protocol (POP) Post Office Protocol is the primary protocol behind email communication. POP works through a supporting email software client that integrates POP for connecting to the remote email server and downloading email messages to the recipient’s computer machine. POP uses the TCP/IP protocol stack for network connection and works with Simple Mail Transfer Protocol (SMTP) for end-to-end email communication, where POP pulls messages and SMTP pushes them to the server. As of 2012, Post Office Protocol is in its third version known as POP 3 and is commonly used in most email client/server communication architecture.
  • 21.
  • 23. “○ Disadvantages of POP3 1)Opening attachments is a quick and painless process, unless the attachment has a virus payload in it. If you have JavaScript enabled in your email reader, you might be target of rogue JavaScript embedded in an email. 2)All messages are stored on your hard drive eating up what is sometimes very valuable space. Since all attachments are stored (downloaded) on your PC there is a potential danger of virus attack if they are not properly scanned by virus scanners. Then sirus scans can only address 60% of attacks effectively leaving your PC to a great danger. 3)Email folders can become corrupted and sometimes lost forever. Recovering is often a painful exercise. 4)All messages are stored on your system, and privacy disappears when someone sits down at your machine. Even if your email reader is password protected, it is often possible for someone who knows what they are doing to read your email by using another application to open your mail folders.
  • 24. Thanks ! Any questions? You can find detail info at https://en.wikibooks.org/wiki/Communication_Networks/HTTP_Protocol 😉 https://technet.microsoft.com/en-us/library/cc737236(v=ws.10).aspx