SlideShare a Scribd company logo
APPLICATION LAYER
Shashikant V. Athawale
Assistant Professor
Department of Computer Engineering,
AISSMS COE ,Pune
AGENDA
 OSI Model Block Diagram
 OSI Encapsulation Process
 Application Protocol Design
 Application Layer Protocols
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol)
 Summary
 References
2
OSI MODEL BLOCK DIAGRAM
3
Application-Layer Protocols
AGENDA
 OSI Model Block Diagram
 OSI Encapsulation Process
 Application Protocol Design
 Application Layer Protocols
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol)
 Summary
 References
4
OSI ENCAPSULATION PROCESS
5
Application-Layer Protocols
AGENDA
 OSI Model Block Diagram
 OSI Encapsulation Process
 Application Protocol Design
 Application Layer Protocols
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol)
 Summary
 References
6
APPLICATION PROTOCOL DESIGN
 Think of different people/teams, working on the client and server
programs.
– Different programming languages.
– Diverse hardware, operating systems.
 Be unambiguous, precise.
– Consider potential error conditions.
 Allow for future extensions.
– Leave room for additional data, meta-data.
 Do not replicate services provided by lower layer protocols
– e.g., checksum 7
Application-Layer Protocols
AGENDA
 OSI Model Block Diagram
 OSI Encapsulation Process
 Application Protocol Design
 Application Layer Protocols
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol)
 Summary
 References
8
APPLICATION LAYER PROTOCOLS
 An application layer protocol defines how an application processes
(clients and servers), running on different end systems, pass
messages to each other.
 In particular, an application layer protocol defines:
– The types of messages, e.g., request messages and response
messages.
– The syntax of the various message types, i.e., the fields in the
message and
 how the fields are delineated.
– The semantics of the fields, i.e., the meaning of the information that
the
 field is supposed to contain;
– Rules for determining when and how a process sends messages
and responds to messages. 9
Application-Layer Protocols
CONTINUE..
 Many Internet application-layer protocols are fully specified in
Request.
 For Comments documents (RFCs) and are therefore in the public
domain.
– For example, the HTTP 1.1 specification is included in RFC 2068,
which was
 finalized and made public January 1997.
– If a browser (HTTP client) developer follows the rules of the HTTP
1.1 RFC,
 the browser will be able to retrieve Web pages from any Web server
that has also has followed the rules of the HTTP 1.1 RFC.
10
Application-Layer Protocols
CONTINUE..
Application layer protocols as follows:
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol)
11
Application-Layer Protocols
1. HTTP
 Hypertext Transfer Protocol is used to transfer files that make up
the web pages of the World Wide Web.
 HTTP: TCP port 80.
 Was originally developed to publish and retrieve HTML pages.
 used for distributed, collaborative information systems.
 HTTP is used across the world wide web for data transfer and is one
of the most used application protocols.
 HTTP specifies a request/response protocol.
 When a client, typically a web browser, sends a request message to
a server, the HTTP protocol defines the message types the client
uses to request the web page and the message types the server
uses to respond.
 The three common message types are:
o GET
o POST
o PUT
12
Application-Layer Protocols
CONTINUE..
 GET is a client request for data. A web browser sends the GET
message to request pages from a web server.
 POST and PUT are used to send messages that upload data to the
web server.
 HTTP protocol using GET.
13
Application-Layer Protocols
2. DNS
 HOSTNAMES:
 IP Addresses are great for computers
– IP address includes information used for routing.
 IP addresses are tough for humans to remember.
 IP addresses are impossible to guess.
– ever guessed at the name of a WWW site?
 The Domain Name System:
 The domain name system is usually used to translate a host
name into an IP address .
 Domain names comprise a hierarchy so that names are unique,
yet easy to remember.
14
Application-Layer Protocols
CONTINUE..
 DNS Hierarchy
edu com org jp
rpi albany
15
Application-Layer Protocols
CONTINUE..
 Host name structure:
• Each host name is made up of a sequence of labels separated by
periods.
– Each label can be up to 63 characters
– The total name can be at most 255characters.
• Examples:
– whitehouse.gov
– barney.the.purple.dinosaur.com
– monica.cs.rpi.edu
 Domain Name
• The domain name for a host is the sequence of labels that lead from
the host (leaf node in the naming tree) to the top of the worldwide
naming tree.
• A domain is a subtree of the world wide naming tree.
16
Application-Layer Protocols
CONTINUE..
 Top level domains:
• edu, gov, com, net, org, mil, …
• Countries each have a top level domain(2 letter domain name).
• New top level domains include:
.aero .biz .coop .info .name .pro
 DNS Organization
• Distributed Database
– The organization that owns a domain name is responsible for
running a DNS server that can provide the mapping between
hostnames within the domain to IP addresses.
– So - some machine run by RPI is responsible for everything within
the rpi.edu domain.
17
Application-Layer Protocols
CONTINUE..
 DNS Clients:
• A DNS client is called a resolver.
• A call to getByName(host)is handled by a resolver (typically part of
the client).
• Most Unix workstations have the file /etc/resolv.conf that contains
the local domain and the addresses of DNS servers for that domain.
 Nslookup:
• nslookup is an interactive resolver that allows the user to
communicate directly with a DNS server.
• nslookup is usually available on Unix workstations.
18
Application-Layer Protocols
CONTINUE..
 DNS Servers:
• Servers handle requests for their domain directly.
• Servers handle requests for other domains by contacting remote
DNS server(s).
• Servers cache external mappings.
o DNS Message Format:
19
Application-Layer Protocols
CONTINUE..
 DNS Message Header:
20
Application-Layer Protocols
3. FTP
 promote sharing of files.
 encourage indirect use of remote computers.
 shield user from variations in file storage.
 transfer data reliably and efficiently.
 “FTP, although usable directly by a user at a terminal, is designed
mainly for use by programs”.
 To successfully transfer files, FTP requires two connections between
the client and the server: one for commands and replies, and the
other for the actual file transfer.
 The client establishes the first connection to the server on TCP port
21. This connection is used for control traffic, consisting of client
commands and server replies.
 The client establishes the second connection to the server over TCP
port 20. This connection is for the actual file transfer and is created
every time a file is transferred.
21
Application-Layer Protocols
CONTINUE..
 The client can download (pull) a file from the server or upload (push)
a file to the server.
 FTP Process
22
Application-Layer Protocols
4. TELNET
 TELNET is a protocol that provides “a general, bi-directional, eight-bit
byte oriented communications facility”.
 telnet is a program that supports the TELNET protocol over TCP.
 Many application protocols are built upon the TELNET protocol.
 TELNET service:
23
Application-Layer Protocols
CONTINUE..
 The TELNET Protocol
o TCP connection
o data and control over the same connection.
o Network Virtual Terminal
o negotiated options
24
Application-Layer Protocols
CONTINUE..
 Network Virtual Terminal
o intermediate representation of a generic terminal.
o provides a standard language for communication of terminal control
functions.
25
Application-Layer Protocols
CONTINUE..
 Negotiated Options:
o All NVTs support a minimal set of capabilities.
o Some terminals have more capabilities than the minimal set.
o The 2 endpoints negotiate a set of mutually acceptable options
(character set, echo mode, etc).
o The protocol for requesting optional features is well defined and
includes rules for eliminating possible negotiation “loops”.
o The set of options is not part of the TELNET protocol, so that new
terminal features can be incorporated without changing the TELNET
protocol.
26
Application-Layer Protocols
CONTINUE..
 Control Functions:
o TELNET includes support for a series of control functions commonly
supported by servers.
o This provides a uniform mechanism for communication of (the
supported) control functions.
o Interrupt Process (IP)
– suspend/abort process.
o Abort Output (AO)
– process can complete, but send no more output to user’s terminal.
o Are You There (AYT)
– check to see if system is still running.
o Erase Character (EC)
– delete last character sent
– typically used to edit keyboard input.
o Erase Line (EL)
– delete all input in current line. 27
Application-Layer Protocols
5. DHCP
 DHCP enables clients on a network to obtain IP addresses and other
information from a DHCP server.
 DHCP allows a host to obtain an IP address dynamically when it
connects to the network.
 The DHCP server is contacted by sending a request, and an IP
address is requested.
 The DHCP server chooses an address from a configured range of
addresses called a pool and assigns it to the host client for a set
period.
 different ways of having DHCP servers arranged in next diagram
28
Application-Layer Protocols
CONTINUE..
29
Application-Layer Protocols
7. SMTP
 Protocol originated in 1982 (RFC821, Jon Postel)
 Standard message format (RFC822,2822, D. Crocker)
 Goal: To transfer mail reliably and efficiently
30
Application-Layer Protocols
CONTINUE..
 SMTP clients and servers have two
main components:
 User Agents – Prepares the
message, encloses it in an envelope.
(ex. Thunderbird, Eudora)
 Mail Transfer Agent – Transfers the
mail across the internet (ex.
Sendmail, Exim)
 Analogous to the postal system in
many ways
31
Application-Layer Protocols
CONTINUE..
 SMTP also allows the use of
Relays allowing other MTAs
to relay the mail.
 Mail Gateways are used to
relay mail prepared by a
protocol other than SMTP and
convert it to SMTP.
32
Application-Layer Protocols
CONTINUE..
 Connection establishment:
33
Application-Layer Protocols
CONTINUE..
 Message Progress:
34
Application-Layer Protocols
CONTINUE..
 Connection Termination:
35
TCP Connection Termination
Application-Layer Protocols
CONTINUE..
Limitations in SMTP:
 Only uses NVT 7 bit ASCII format
 How to represent other data types?
 No authentication mechanisms
 Messages are sent un-encrypted
 Susceptible to misuse (Spamming,
faking sender address)
36
Application-Layer Protocols
SUMMARY
 OSI model has 7 layers.
 In particular, an application layer protocol defines:
– The types of messages, e.g., request messages and response
messages.
 Application layer has 6 protocols:
1. HTTP(Hypertext Transfer Protocol)
2. DNS(Domain Name System)
3. FTP(File Transfer Protocol)
4. TELNET
5. DHCP(Dynamic Host Configuration Protocol)
6. SMTP(Simple Mail Transfer Protocol) 37
REFERENCES
Web Sites:
 http://www.faqs.org/rfcs/rfc821.html (RFC 821).
 http://www.faqs.org/rfcs/rfc2821.html (RFC 2821)
 http://www.tcpipguide.com/free/t_SMTPSpecialFeaturesCapa
bilitiesandExtensions.html
 http://cns.utoronto.ca/usg/technotes/smtp-intro.html
 http://computer.howstuffworks.com/email5.htm
Books:
 Programmer's Guide to Internet Mail by John Rhoton
 TCP/IP Illustrated Volume 1 by Richard Stevens
38
39
THANK YOU…!!!

More Related Content

What's hot

Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
Dr. C.V. Suresh Babu
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
Najam Khattak
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
TCP/ IP
TCP/ IP TCP/ IP
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
Harish Chand
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 

What's hot (20)

Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Data link layer
Data link layer Data link layer
Data link layer
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Ethernet
EthernetEthernet
Ethernet
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Tcp
TcpTcp
Tcp
 

Viewers also liked

Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Ram Dutt Shukla
 
Application layer
Application layerApplication layer
Application layer
Mukesh Chinta
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Application Layer
Application LayerApplication Layer
Application Layer
ushabarad142
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
Yaser Rahmati
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
Sachii Dosti
 

Viewers also liked (8)

Transport layer
Transport layer Transport layer
Transport layer
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application layer
Application layerApplication layer
Application layer
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 

Similar to Application Layer

application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
aravind Guru
 
Application layer
Application layerApplication layer
Application layer
Neha Kurale
 
Application layer
Application layerApplication layer
Application layer
Neha Kurale
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
ssuser1774d3
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
Sarah R. Dowlath
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
kebeAman
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
AxelXrest
 
6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda
UsamaMushtaq15
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
VISWANATHAN R V
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
An Introduction to HTTP
An Introduction to HTTPAn Introduction to HTTP
An Introduction to HTTP
Keerthana Krishnan
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
MD. Naimur Rahman
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
SindhuVelmukull
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
Srihari
 

Similar to Application Layer (20)

application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
 
Chapter2 Application
Chapter2 ApplicationChapter2 Application
Chapter2 Application
 
6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda6. Chapter_2_1_newversion1.pptxasasasdasdasda
6. Chapter_2_1_newversion1.pptxasasasdasdasda
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
Avani
AvaniAvani
Avani
 
An Introduction to HTTP
An Introduction to HTTPAn Introduction to HTTP
An Introduction to HTTP
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 

More from Dr Shashikant Athawale

multi threaded and distributed algorithms
multi threaded and distributed algorithms multi threaded and distributed algorithms
multi threaded and distributed algorithms
Dr Shashikant Athawale
 
Amortized analysis
Amortized analysisAmortized analysis
Amortized analysis
Dr Shashikant Athawale
 
Complexity theory
Complexity theory Complexity theory
Complexity theory
Dr Shashikant Athawale
 
Divide and Conquer
Divide and ConquerDivide and Conquer
Divide and Conquer
Dr Shashikant Athawale
 
Model and Design
Model and Design Model and Design
Model and Design
Dr Shashikant Athawale
 
Fundamental of Algorithms
Fundamental of Algorithms Fundamental of Algorithms
Fundamental of Algorithms
Dr Shashikant Athawale
 
CUDA Architecture
CUDA ArchitectureCUDA Architecture
CUDA Architecture
Dr Shashikant Athawale
 
Parallel Algorithms- Sorting and Graph
Parallel Algorithms- Sorting and GraphParallel Algorithms- Sorting and Graph
Parallel Algorithms- Sorting and Graph
Dr Shashikant Athawale
 
Analytical Models of Parallel Programs
Analytical Models of Parallel ProgramsAnalytical Models of Parallel Programs
Analytical Models of Parallel Programs
Dr Shashikant Athawale
 
Basic Communication
Basic CommunicationBasic Communication
Basic Communication
Dr Shashikant Athawale
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
Dr Shashikant Athawale
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
Dr Shashikant Athawale
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
Dr Shashikant Athawale
 
Parallel algorithms
Parallel algorithms Parallel algorithms
Parallel algorithms
Dr Shashikant Athawale
 
Greedy method
Greedy method Greedy method
Greedy method
Dr Shashikant Athawale
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
Dr Shashikant Athawale
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
Dr Shashikant Athawale
 
Asymptotic notation
Asymptotic notationAsymptotic notation
Asymptotic notation
Dr Shashikant Athawale
 
String matching algorithms
String matching algorithmsString matching algorithms
String matching algorithms
Dr Shashikant Athawale
 
Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
Dr Shashikant Athawale
 

More from Dr Shashikant Athawale (20)

multi threaded and distributed algorithms
multi threaded and distributed algorithms multi threaded and distributed algorithms
multi threaded and distributed algorithms
 
Amortized analysis
Amortized analysisAmortized analysis
Amortized analysis
 
Complexity theory
Complexity theory Complexity theory
Complexity theory
 
Divide and Conquer
Divide and ConquerDivide and Conquer
Divide and Conquer
 
Model and Design
Model and Design Model and Design
Model and Design
 
Fundamental of Algorithms
Fundamental of Algorithms Fundamental of Algorithms
Fundamental of Algorithms
 
CUDA Architecture
CUDA ArchitectureCUDA Architecture
CUDA Architecture
 
Parallel Algorithms- Sorting and Graph
Parallel Algorithms- Sorting and GraphParallel Algorithms- Sorting and Graph
Parallel Algorithms- Sorting and Graph
 
Analytical Models of Parallel Programs
Analytical Models of Parallel ProgramsAnalytical Models of Parallel Programs
Analytical Models of Parallel Programs
 
Basic Communication
Basic CommunicationBasic Communication
Basic Communication
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Parallel algorithms
Parallel algorithms Parallel algorithms
Parallel algorithms
 
Greedy method
Greedy method Greedy method
Greedy method
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Asymptotic notation
Asymptotic notationAsymptotic notation
Asymptotic notation
 
String matching algorithms
String matching algorithmsString matching algorithms
String matching algorithms
 
Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 

Application Layer

  • 1. APPLICATION LAYER Shashikant V. Athawale Assistant Professor Department of Computer Engineering, AISSMS COE ,Pune
  • 2. AGENDA  OSI Model Block Diagram  OSI Encapsulation Process  Application Protocol Design  Application Layer Protocols 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol)  Summary  References 2
  • 3. OSI MODEL BLOCK DIAGRAM 3 Application-Layer Protocols
  • 4. AGENDA  OSI Model Block Diagram  OSI Encapsulation Process  Application Protocol Design  Application Layer Protocols 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol)  Summary  References 4
  • 6. AGENDA  OSI Model Block Diagram  OSI Encapsulation Process  Application Protocol Design  Application Layer Protocols 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol)  Summary  References 6
  • 7. APPLICATION PROTOCOL DESIGN  Think of different people/teams, working on the client and server programs. – Different programming languages. – Diverse hardware, operating systems.  Be unambiguous, precise. – Consider potential error conditions.  Allow for future extensions. – Leave room for additional data, meta-data.  Do not replicate services provided by lower layer protocols – e.g., checksum 7 Application-Layer Protocols
  • 8. AGENDA  OSI Model Block Diagram  OSI Encapsulation Process  Application Protocol Design  Application Layer Protocols 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol)  Summary  References 8
  • 9. APPLICATION LAYER PROTOCOLS  An application layer protocol defines how an application processes (clients and servers), running on different end systems, pass messages to each other.  In particular, an application layer protocol defines: – The types of messages, e.g., request messages and response messages. – The syntax of the various message types, i.e., the fields in the message and  how the fields are delineated. – The semantics of the fields, i.e., the meaning of the information that the  field is supposed to contain; – Rules for determining when and how a process sends messages and responds to messages. 9 Application-Layer Protocols
  • 10. CONTINUE..  Many Internet application-layer protocols are fully specified in Request.  For Comments documents (RFCs) and are therefore in the public domain. – For example, the HTTP 1.1 specification is included in RFC 2068, which was  finalized and made public January 1997. – If a browser (HTTP client) developer follows the rules of the HTTP 1.1 RFC,  the browser will be able to retrieve Web pages from any Web server that has also has followed the rules of the HTTP 1.1 RFC. 10 Application-Layer Protocols
  • 11. CONTINUE.. Application layer protocols as follows: 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol) 11 Application-Layer Protocols
  • 12. 1. HTTP  Hypertext Transfer Protocol is used to transfer files that make up the web pages of the World Wide Web.  HTTP: TCP port 80.  Was originally developed to publish and retrieve HTML pages.  used for distributed, collaborative information systems.  HTTP is used across the world wide web for data transfer and is one of the most used application protocols.  HTTP specifies a request/response protocol.  When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and the message types the server uses to respond.  The three common message types are: o GET o POST o PUT 12 Application-Layer Protocols
  • 13. CONTINUE..  GET is a client request for data. A web browser sends the GET message to request pages from a web server.  POST and PUT are used to send messages that upload data to the web server.  HTTP protocol using GET. 13 Application-Layer Protocols
  • 14. 2. DNS  HOSTNAMES:  IP Addresses are great for computers – IP address includes information used for routing.  IP addresses are tough for humans to remember.  IP addresses are impossible to guess. – ever guessed at the name of a WWW site?  The Domain Name System:  The domain name system is usually used to translate a host name into an IP address .  Domain names comprise a hierarchy so that names are unique, yet easy to remember. 14 Application-Layer Protocols
  • 15. CONTINUE..  DNS Hierarchy edu com org jp rpi albany 15 Application-Layer Protocols
  • 16. CONTINUE..  Host name structure: • Each host name is made up of a sequence of labels separated by periods. – Each label can be up to 63 characters – The total name can be at most 255characters. • Examples: – whitehouse.gov – barney.the.purple.dinosaur.com – monica.cs.rpi.edu  Domain Name • The domain name for a host is the sequence of labels that lead from the host (leaf node in the naming tree) to the top of the worldwide naming tree. • A domain is a subtree of the world wide naming tree. 16 Application-Layer Protocols
  • 17. CONTINUE..  Top level domains: • edu, gov, com, net, org, mil, … • Countries each have a top level domain(2 letter domain name). • New top level domains include: .aero .biz .coop .info .name .pro  DNS Organization • Distributed Database – The organization that owns a domain name is responsible for running a DNS server that can provide the mapping between hostnames within the domain to IP addresses. – So - some machine run by RPI is responsible for everything within the rpi.edu domain. 17 Application-Layer Protocols
  • 18. CONTINUE..  DNS Clients: • A DNS client is called a resolver. • A call to getByName(host)is handled by a resolver (typically part of the client). • Most Unix workstations have the file /etc/resolv.conf that contains the local domain and the addresses of DNS servers for that domain.  Nslookup: • nslookup is an interactive resolver that allows the user to communicate directly with a DNS server. • nslookup is usually available on Unix workstations. 18 Application-Layer Protocols
  • 19. CONTINUE..  DNS Servers: • Servers handle requests for their domain directly. • Servers handle requests for other domains by contacting remote DNS server(s). • Servers cache external mappings. o DNS Message Format: 19 Application-Layer Protocols
  • 20. CONTINUE..  DNS Message Header: 20 Application-Layer Protocols
  • 21. 3. FTP  promote sharing of files.  encourage indirect use of remote computers.  shield user from variations in file storage.  transfer data reliably and efficiently.  “FTP, although usable directly by a user at a terminal, is designed mainly for use by programs”.  To successfully transfer files, FTP requires two connections between the client and the server: one for commands and replies, and the other for the actual file transfer.  The client establishes the first connection to the server on TCP port 21. This connection is used for control traffic, consisting of client commands and server replies.  The client establishes the second connection to the server over TCP port 20. This connection is for the actual file transfer and is created every time a file is transferred. 21 Application-Layer Protocols
  • 22. CONTINUE..  The client can download (pull) a file from the server or upload (push) a file to the server.  FTP Process 22 Application-Layer Protocols
  • 23. 4. TELNET  TELNET is a protocol that provides “a general, bi-directional, eight-bit byte oriented communications facility”.  telnet is a program that supports the TELNET protocol over TCP.  Many application protocols are built upon the TELNET protocol.  TELNET service: 23 Application-Layer Protocols
  • 24. CONTINUE..  The TELNET Protocol o TCP connection o data and control over the same connection. o Network Virtual Terminal o negotiated options 24 Application-Layer Protocols
  • 25. CONTINUE..  Network Virtual Terminal o intermediate representation of a generic terminal. o provides a standard language for communication of terminal control functions. 25 Application-Layer Protocols
  • 26. CONTINUE..  Negotiated Options: o All NVTs support a minimal set of capabilities. o Some terminals have more capabilities than the minimal set. o The 2 endpoints negotiate a set of mutually acceptable options (character set, echo mode, etc). o The protocol for requesting optional features is well defined and includes rules for eliminating possible negotiation “loops”. o The set of options is not part of the TELNET protocol, so that new terminal features can be incorporated without changing the TELNET protocol. 26 Application-Layer Protocols
  • 27. CONTINUE..  Control Functions: o TELNET includes support for a series of control functions commonly supported by servers. o This provides a uniform mechanism for communication of (the supported) control functions. o Interrupt Process (IP) – suspend/abort process. o Abort Output (AO) – process can complete, but send no more output to user’s terminal. o Are You There (AYT) – check to see if system is still running. o Erase Character (EC) – delete last character sent – typically used to edit keyboard input. o Erase Line (EL) – delete all input in current line. 27 Application-Layer Protocols
  • 28. 5. DHCP  DHCP enables clients on a network to obtain IP addresses and other information from a DHCP server.  DHCP allows a host to obtain an IP address dynamically when it connects to the network.  The DHCP server is contacted by sending a request, and an IP address is requested.  The DHCP server chooses an address from a configured range of addresses called a pool and assigns it to the host client for a set period.  different ways of having DHCP servers arranged in next diagram 28 Application-Layer Protocols
  • 30. 7. SMTP  Protocol originated in 1982 (RFC821, Jon Postel)  Standard message format (RFC822,2822, D. Crocker)  Goal: To transfer mail reliably and efficiently 30 Application-Layer Protocols
  • 31. CONTINUE..  SMTP clients and servers have two main components:  User Agents – Prepares the message, encloses it in an envelope. (ex. Thunderbird, Eudora)  Mail Transfer Agent – Transfers the mail across the internet (ex. Sendmail, Exim)  Analogous to the postal system in many ways 31 Application-Layer Protocols
  • 32. CONTINUE..  SMTP also allows the use of Relays allowing other MTAs to relay the mail.  Mail Gateways are used to relay mail prepared by a protocol other than SMTP and convert it to SMTP. 32 Application-Layer Protocols
  • 35. CONTINUE..  Connection Termination: 35 TCP Connection Termination Application-Layer Protocols
  • 36. CONTINUE.. Limitations in SMTP:  Only uses NVT 7 bit ASCII format  How to represent other data types?  No authentication mechanisms  Messages are sent un-encrypted  Susceptible to misuse (Spamming, faking sender address) 36 Application-Layer Protocols
  • 37. SUMMARY  OSI model has 7 layers.  In particular, an application layer protocol defines: – The types of messages, e.g., request messages and response messages.  Application layer has 6 protocols: 1. HTTP(Hypertext Transfer Protocol) 2. DNS(Domain Name System) 3. FTP(File Transfer Protocol) 4. TELNET 5. DHCP(Dynamic Host Configuration Protocol) 6. SMTP(Simple Mail Transfer Protocol) 37
  • 38. REFERENCES Web Sites:  http://www.faqs.org/rfcs/rfc821.html (RFC 821).  http://www.faqs.org/rfcs/rfc2821.html (RFC 2821)  http://www.tcpipguide.com/free/t_SMTPSpecialFeaturesCapa bilitiesandExtensions.html  http://cns.utoronto.ca/usg/technotes/smtp-intro.html  http://computer.howstuffworks.com/email5.htm Books:  Programmer's Guide to Internet Mail by John Rhoton  TCP/IP Illustrated Volume 1 by Richard Stevens 38