SlideShare a Scribd company logo
Computer Networks
Application Layer
Date:
Department of Computer Engineering
Jain Group of Institution, Bangalore
Presented By:
Rubal Sagwal
Assistant Professor
Department of Computer Engineering
1ADAD
Contents
• DHCP
• HTTP
• HTTPS
• FTP
• TFTP
• SFTP
• Talnet
• Email
ADAD 2
Application Layer
DHCP – DNS – HTTP – HTTPS – FTP – TFTP – SFTP
ADAD 3
DHCP (Dynamic Host Configuration Protocol)
• Mapping Physical to Logical Address – sometimes host
knows its physical address, but needs to know its logical
address.
• Cases –
• Sometimes host moves from one physical network to another
network.
• Host wants a temporary IP address.
• Why DHCP – because other address resolution protocols are
static in nature.
• DHCP provide static and dynamic address allocation that can
be manual or automatic.
ADAD 4
Contd..
DHCP
• Static Address Allocation: Any client can request a
static address from a DHCP server.
• A DHCP server has a database that statically binds the
physical addresses to IP addresses.
• Dynamic Address Allocation: needed – when a host
moves from network to network or connected and
disconnected from a network.
• DHCP has a second database – which has pool of available IP
addresses.
• Second DB make it dynamic.
• When a DHCP client requests a temporary IP address, the
DHCP server goes to the pool of available (unused) IP
addresses and assigns an IP address for a limited period of
time.
ADAD 5
Contd..
DHCP
• Dynamic Address Allocation:
• When a DHCP client sends a request to DHCP server –
the server first checks its static database.
• If an entry with the requested physical address exist in
the static data base – the permeant IP address of the
client is returned.
• If entry doesn’t exist in the static database – the server
select an IP address from the available pool – assign the
address to the client – adds to dynamic table.
ADAD 6
HTTP
HTTPS
ADAD 7
Hyper Text Transfer Protocol
• Http used – to access data on world wide web.
• WWW -> collection of web sites -> collection of web
pages -> HTML pages -> Data <- accessed by browser <-
client.
• Http function with – FTP and SMTP.
• Similar to ftp – transfer files and uses the services of
TCP.
• Http messages are not designed to read by human –
read and interpreted by the Http server and client.
• Port number over TCP – well known port 80.
ADAD 8
Contd…
Http Transaction
ADAD 9
Request
Response
Request and Response message
Request and Status Line of Http
ADAD 10
1. Request Type:
Contd…
Request and Status Line of Http
2. URL
3. Version: Version of Http.
4. Status Code:
ADAD 11
Contd…
Request and Status Line of Http
ADAD 12
Contd…
Request and Status Line of Http
5. Header:
1. General header – general info like date etc.
2. Request header – client configuration.
3. Response header – server’s configuration.
4. Entity header – info about the body of the document.
Request message can contain only general, request
and entity header.
Response message can contain general, response
and entity header.
ADAD 13
Contd…
Request and Status Line of Http – General Header
ADAD 14
Contd…
Request and Status Line of Http – Request Header
ADAD 15
Contd…
Request and Status Line of Http – Response Header
ADAD 16
6. Body: contain the document to be sent.
HTTPS
• Hyper Text Transfer Protocol Secure (HTTPS) is the
secure version of HTTP – the protocol over which
data is sent between your browser and the website
that you are connected to.
• The 'S' at the end of HTTPS stands for 'Secure’.
• It means all communications between your
browser and the website are encrypted.
• HTTPS is often used to protect highly confidential
online transactions like online banking and online
shopping order forms.
ADAD 17
HTTPS
ADAD 18
How does HTTPS
• HTTPS pages typically use one of two secure
protocols to encrypt communications - SSL (Secure
Sockets Layer) or TLS (Transport Layer Security).
• Both the TLS and SSL protocols use what is known
as an 'asymmetric' Public Key Infrastructure (PKI)
system.
• An asymmetric system uses two 'keys' to encrypt
communications, a 'public' key and a 'private' key.
• Anything encrypted with the public key can only be
decrypted by the private key and vice-versa.
ADAD 19
How does HTTPS
• When you request a HTTPS connection to a webpage, the
website will initially send its SSL certificate to your browser.
• This certificate contains the public key needed to begin the
secure session.
• Based on this initial exchange, your browser and the
website then initiate the 'SSL handshake’.
• The SSL handshake involves the generation of shared secrets
to establish a uniquely secure connection between yourself
and the website.
• When a trusted SSL Digital Certificate is used during
a HTTPS connection, users will see a padlock icon in the
browser address bar. When an Extended Validation
Certificate is installed on a web site, the address bar will
turn green.
ADAD 20
File Transfer Protocol
TFTP – SFTP
ADAD 21
File Transfer Protocol
• File Transfer – from one computer to another –
most common task.
• FTP – standard mechanism provided by TCP/IP for
copying a file from one host to another.
• Why FTP –
• Two systems may have different ways to represent text
and data.
• Two systems may have different directory structures.
• Different formats, etc.
ADAD 22
Contd…
FTP
• FTP uses well-known TCP ports :
• Well-known port 20 – data connection.
• Well-known port 21 – control connection.
ADAD 23
Contd…
FTP
• Control Connection – remains connected during the
entire interactive FTP session.
• Data Connection – opened and then closed for
each file transferred.
• While the control connection is open – the data
connection can be opened and closed multiple
times.
ADAD 24
Contd…
FTP – Communication over Control Connection
ADAD 25
• Uses 7- bit ASCII character set.
• Communication is achieved through Command and
Response.
• Each line is terminated with a two-character end-
of-line token.
Contd…
FTP – Communication over Data Connection
ADAD 26
• A file is copied form the server to the client –
retrieving a file – done under the supervision of
the RETR command.
• A file is copied form the client to the server –
storing a file – done under the supervision of the
STOR command.
• A list of directory or file name is to be sent from the
server to the client – done under the supervision of
the LIST command.
Contd…
FTP – Communication over Data Connection
ADAD 27
• The client must define the type of the file to be
transferred, the structure of the data and the
transmission mode.
Contd…
FTP – Communication over Data Connection
ADAD 28
• File Type: ASCII file, EBCDIC file or image file.
• Data Structure:
• File Structure – file is continuous stream of bytes.
• Record Structure – file is divided into records.
• Page Structure – file is divided into pages.
• Transmission mode:
• Stream mode – default mode – continuous stream of
mode.
• Block Mode – in blocks.
• Compressed Mode – if a file is big, then we can
compress.
Trivial File Transfer Protocol (TFTP)
• Trivial File Transfer Protocol (TFTP) is a simple protocol
used for transferring files.
• It uses the User Datagram Protocol (UDP) to transport
data from one end to another.
• TFTP is mostly used to read and write files/mail to or
from a remote server.
• Trivial File Transfer Protocol is very simple in design and
has limited features as compared to File Transfer
Protocol (FTP).
• TFTP provides no authentication and security while
transferring files.
• Data transfer through TFTP is usually initiated through
port 69.
ADAD 29
Secure File Transfer Protocol (SFTP)
• Secure File Transfer Protocol (SFTP) – secure
version of File Transfer Protocol (FTP).
• Facilitates data access and data transfer over a
Secure Shell (SSH) data stream.
• It is part of the SSH Protocol. This term is also
known as SSH File Transfer Protocol.
• SFTP was designed by the Internet Engineering Task
Force (IETF) as an extended version of SSH 2.0,
allowing file transfer over SSH and use with
Transport Layer Security (TLS) and VPN
applications.
ADAD 30
Secure File Transfer Protocol (SFTP)
• Both the commands and data are encrypted in order to
prevent passwords and other sensitive information
from being transferred over the network.
• The functionality of SFTP is similar to that of FTP.
• However, SFTP uses SSH to transfer files.
• SFTP requires that the client user must be
authenticated by the server and the data transfer must
take place over a secure channel (SSH).
• It allows a wide range of operations to be performed on
remote files, acting somewhat like a remote file system
protocol.
• SFTP allows operations such as resuming from halted
transfers, directory listings and remote file removal.
ADAD 31
TELNET
ADAD 32
TELNET
• Abbreviation for – Terminal network.
• TCP/IP suite protocol – proposed by ISO.
• Why Telnet – for remote logging.
• Remote Logging – accessing any application at local
site from remote location.
• Client/ server Application Program.
• Enable the establishment of a connection to a
remote system in such a way that the local terminal
appears to be terminal at remote system.
ADAD 33
TELNET – key terms
1. Time sharing – a large computer supports multiple
users.
• Interaction between a computer and a server – through
a terminal – combination of keyboard, monitor and
mouse etc.
2. Logging – as we know timesharing environment.
• Users are the part of the system with some right to
access resources.
• Each authorized user has an identification and a
password.
• User identification – define identity of a user that it is a
part of the system.
ADAD 34
TELNET – key terms
• User logging – with user ID and Password.
• At system – Password checking – to prevent an
unauthorized access.
• Local log-in – user types at terminal or at a workstation
running a terminal emulator – terminal passes character
to the Operating system.
• Remote log-in – need client and server program.
ADAD 35
TELNET – Local Logging
ADAD 36
TELNET – Remote Logging
ADAD 37
TELNET – Mode of Operation
ADAD 38
1. Default mode – Echoing is done by the client.
• User type a character – the client echoes the character
on the screen but does not send it until a whole line is
completed.
2. Character mode – each character typed sent by
the client – to the server.
• Echoing done by server.
• Transmission delayed – because of server echoing.
3. Line Mode – line editing (echoing, character
erasing, line erasing) done by client.
• The client then send the whole line to the server.

More Related Content

What's hot

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
Lana Dujanovic
 
Application layer
Application layerApplication layer
Application layer
Mukesh Chinta
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
Peter R. Egli
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
HTTP
HTTPHTTP
Frame Relay
Frame RelayFrame Relay
HUB Device
HUB Device HUB Device
Frame relay
Frame relayFrame relay
Frame relay
Ayesha Maqsood
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Naveen Kumar R.B.
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 

What's hot (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
HTTP Presentation
HTTP Presentation HTTP Presentation
HTTP Presentation
 
Application layer
Application layerApplication layer
Application layer
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
HTTP
HTTPHTTP
HTTP
 
Tcp
TcpTcp
Tcp
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
HUB Device
HUB Device HUB Device
HUB Device
 
Frame relay
Frame relayFrame relay
Frame relay
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 

Similar to Application Layer and Protocols

Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
smitha273566
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
Vinh Nguyen
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
AASTHAJAJOO
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
inbroker
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
achutachut
 
Lec 1 intro to internet
Lec 1 intro to internetLec 1 intro to internet
Lec 1 intro to internet
Shahid Riaz
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
Kailash Kumar
 
Application layer
Application layerApplication layer
Application layer
Neha Kurale
 
Application layer
Application layerApplication layer
Application layer
Neha Kurale
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
Chandnigupta80
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
Sarah R. Dowlath
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Socket programming
Socket programmingSocket programming
Socket programmingDivya Sharma
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
Rubal Sagwal
 

Similar to Application Layer and Protocols (20)

Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Lec 1 intro to internet
Lec 1 intro to internetLec 1 intro to internet
Lec 1 intro to internet
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Socket programming
Socket programmingSocket programming
Socket programming
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 

More from Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Rubal Sagwal
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Rubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
Rubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
Rubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
Rubal Sagwal
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
Rubal Sagwal
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
Rubal Sagwal
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
Rubal Sagwal
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
Rubal Sagwal
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission Media
Rubal Sagwal
 

More from Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission Media
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Application Layer and Protocols

  • 1. Computer Networks Application Layer Date: Department of Computer Engineering Jain Group of Institution, Bangalore Presented By: Rubal Sagwal Assistant Professor Department of Computer Engineering 1ADAD
  • 2. Contents • DHCP • HTTP • HTTPS • FTP • TFTP • SFTP • Talnet • Email ADAD 2
  • 3. Application Layer DHCP – DNS – HTTP – HTTPS – FTP – TFTP – SFTP ADAD 3
  • 4. DHCP (Dynamic Host Configuration Protocol) • Mapping Physical to Logical Address – sometimes host knows its physical address, but needs to know its logical address. • Cases – • Sometimes host moves from one physical network to another network. • Host wants a temporary IP address. • Why DHCP – because other address resolution protocols are static in nature. • DHCP provide static and dynamic address allocation that can be manual or automatic. ADAD 4
  • 5. Contd.. DHCP • Static Address Allocation: Any client can request a static address from a DHCP server. • A DHCP server has a database that statically binds the physical addresses to IP addresses. • Dynamic Address Allocation: needed – when a host moves from network to network or connected and disconnected from a network. • DHCP has a second database – which has pool of available IP addresses. • Second DB make it dynamic. • When a DHCP client requests a temporary IP address, the DHCP server goes to the pool of available (unused) IP addresses and assigns an IP address for a limited period of time. ADAD 5
  • 6. Contd.. DHCP • Dynamic Address Allocation: • When a DHCP client sends a request to DHCP server – the server first checks its static database. • If an entry with the requested physical address exist in the static data base – the permeant IP address of the client is returned. • If entry doesn’t exist in the static database – the server select an IP address from the available pool – assign the address to the client – adds to dynamic table. ADAD 6
  • 8. Hyper Text Transfer Protocol • Http used – to access data on world wide web. • WWW -> collection of web sites -> collection of web pages -> HTML pages -> Data <- accessed by browser <- client. • Http function with – FTP and SMTP. • Similar to ftp – transfer files and uses the services of TCP. • Http messages are not designed to read by human – read and interpreted by the Http server and client. • Port number over TCP – well known port 80. ADAD 8
  • 10. Request and Status Line of Http ADAD 10 1. Request Type:
  • 11. Contd… Request and Status Line of Http 2. URL 3. Version: Version of Http. 4. Status Code: ADAD 11
  • 12. Contd… Request and Status Line of Http ADAD 12
  • 13. Contd… Request and Status Line of Http 5. Header: 1. General header – general info like date etc. 2. Request header – client configuration. 3. Response header – server’s configuration. 4. Entity header – info about the body of the document. Request message can contain only general, request and entity header. Response message can contain general, response and entity header. ADAD 13
  • 14. Contd… Request and Status Line of Http – General Header ADAD 14
  • 15. Contd… Request and Status Line of Http – Request Header ADAD 15
  • 16. Contd… Request and Status Line of Http – Response Header ADAD 16 6. Body: contain the document to be sent.
  • 17. HTTPS • Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP – the protocol over which data is sent between your browser and the website that you are connected to. • The 'S' at the end of HTTPS stands for 'Secure’. • It means all communications between your browser and the website are encrypted. • HTTPS is often used to protect highly confidential online transactions like online banking and online shopping order forms. ADAD 17
  • 19. How does HTTPS • HTTPS pages typically use one of two secure protocols to encrypt communications - SSL (Secure Sockets Layer) or TLS (Transport Layer Security). • Both the TLS and SSL protocols use what is known as an 'asymmetric' Public Key Infrastructure (PKI) system. • An asymmetric system uses two 'keys' to encrypt communications, a 'public' key and a 'private' key. • Anything encrypted with the public key can only be decrypted by the private key and vice-versa. ADAD 19
  • 20. How does HTTPS • When you request a HTTPS connection to a webpage, the website will initially send its SSL certificate to your browser. • This certificate contains the public key needed to begin the secure session. • Based on this initial exchange, your browser and the website then initiate the 'SSL handshake’. • The SSL handshake involves the generation of shared secrets to establish a uniquely secure connection between yourself and the website. • When a trusted SSL Digital Certificate is used during a HTTPS connection, users will see a padlock icon in the browser address bar. When an Extended Validation Certificate is installed on a web site, the address bar will turn green. ADAD 20
  • 21. File Transfer Protocol TFTP – SFTP ADAD 21
  • 22. File Transfer Protocol • File Transfer – from one computer to another – most common task. • FTP – standard mechanism provided by TCP/IP for copying a file from one host to another. • Why FTP – • Two systems may have different ways to represent text and data. • Two systems may have different directory structures. • Different formats, etc. ADAD 22
  • 23. Contd… FTP • FTP uses well-known TCP ports : • Well-known port 20 – data connection. • Well-known port 21 – control connection. ADAD 23
  • 24. Contd… FTP • Control Connection – remains connected during the entire interactive FTP session. • Data Connection – opened and then closed for each file transferred. • While the control connection is open – the data connection can be opened and closed multiple times. ADAD 24
  • 25. Contd… FTP – Communication over Control Connection ADAD 25 • Uses 7- bit ASCII character set. • Communication is achieved through Command and Response. • Each line is terminated with a two-character end- of-line token.
  • 26. Contd… FTP – Communication over Data Connection ADAD 26 • A file is copied form the server to the client – retrieving a file – done under the supervision of the RETR command. • A file is copied form the client to the server – storing a file – done under the supervision of the STOR command. • A list of directory or file name is to be sent from the server to the client – done under the supervision of the LIST command.
  • 27. Contd… FTP – Communication over Data Connection ADAD 27 • The client must define the type of the file to be transferred, the structure of the data and the transmission mode.
  • 28. Contd… FTP – Communication over Data Connection ADAD 28 • File Type: ASCII file, EBCDIC file or image file. • Data Structure: • File Structure – file is continuous stream of bytes. • Record Structure – file is divided into records. • Page Structure – file is divided into pages. • Transmission mode: • Stream mode – default mode – continuous stream of mode. • Block Mode – in blocks. • Compressed Mode – if a file is big, then we can compress.
  • 29. Trivial File Transfer Protocol (TFTP) • Trivial File Transfer Protocol (TFTP) is a simple protocol used for transferring files. • It uses the User Datagram Protocol (UDP) to transport data from one end to another. • TFTP is mostly used to read and write files/mail to or from a remote server. • Trivial File Transfer Protocol is very simple in design and has limited features as compared to File Transfer Protocol (FTP). • TFTP provides no authentication and security while transferring files. • Data transfer through TFTP is usually initiated through port 69. ADAD 29
  • 30. Secure File Transfer Protocol (SFTP) • Secure File Transfer Protocol (SFTP) – secure version of File Transfer Protocol (FTP). • Facilitates data access and data transfer over a Secure Shell (SSH) data stream. • It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol. • SFTP was designed by the Internet Engineering Task Force (IETF) as an extended version of SSH 2.0, allowing file transfer over SSH and use with Transport Layer Security (TLS) and VPN applications. ADAD 30
  • 31. Secure File Transfer Protocol (SFTP) • Both the commands and data are encrypted in order to prevent passwords and other sensitive information from being transferred over the network. • The functionality of SFTP is similar to that of FTP. • However, SFTP uses SSH to transfer files. • SFTP requires that the client user must be authenticated by the server and the data transfer must take place over a secure channel (SSH). • It allows a wide range of operations to be performed on remote files, acting somewhat like a remote file system protocol. • SFTP allows operations such as resuming from halted transfers, directory listings and remote file removal. ADAD 31
  • 33. TELNET • Abbreviation for – Terminal network. • TCP/IP suite protocol – proposed by ISO. • Why Telnet – for remote logging. • Remote Logging – accessing any application at local site from remote location. • Client/ server Application Program. • Enable the establishment of a connection to a remote system in such a way that the local terminal appears to be terminal at remote system. ADAD 33
  • 34. TELNET – key terms 1. Time sharing – a large computer supports multiple users. • Interaction between a computer and a server – through a terminal – combination of keyboard, monitor and mouse etc. 2. Logging – as we know timesharing environment. • Users are the part of the system with some right to access resources. • Each authorized user has an identification and a password. • User identification – define identity of a user that it is a part of the system. ADAD 34
  • 35. TELNET – key terms • User logging – with user ID and Password. • At system – Password checking – to prevent an unauthorized access. • Local log-in – user types at terminal or at a workstation running a terminal emulator – terminal passes character to the Operating system. • Remote log-in – need client and server program. ADAD 35
  • 36. TELNET – Local Logging ADAD 36
  • 37. TELNET – Remote Logging ADAD 37
  • 38. TELNET – Mode of Operation ADAD 38 1. Default mode – Echoing is done by the client. • User type a character – the client echoes the character on the screen but does not send it until a whole line is completed. 2. Character mode – each character typed sent by the client – to the server. • Echoing done by server. • Transmission delayed – because of server echoing. 3. Line Mode – line editing (echoing, character erasing, line erasing) done by client. • The client then send the whole line to the server.