SlideShare a Scribd company logo
Internet Connectivity Principles
Internet connectivity
Introduction
Application Layer
Protocols
Application Layer Protocols
• TCP/IP suite consists of a number application layer
protocols.
• For example, HTTP, HTTPS, FTP, Telnet and others.
Application Layer Protocols
• TCP/IP suite consists of a number application layer
protocols.
• For example, HTTP, HTTPS, FTP, Telnet and others.
Application Layer Protocols
HTTP:
• It is a protocol used to access the
data on the World Wide Web
(www).
• The HTTP protocol can be used to
transfer the data in the form of plain
text, hypertext, audio, video, and so
on.
• Its efficiency that allows us to use in
a hypertext environment where
there are rapid jumps from one
• HTTP is like the FTP as it also transfers
the files from one host to another host.
But HTTP is simpler than FTP.
• HTTP is like SMTP as the data is
transferred between client and server.
• SMTP messages are stored and
forwarded while HTTP messages are
delivered immediately.
Application Layer Protocols
Features of HTTP:
• Port number is 80.
• HTTP is the standard protocol for·
requesting a URL defined web-page
resource, and for sending a response
to the web server.
• The connection between client and
server exist only during the current
request and response time only.
• Stateless: HTTP is a stateless protocol as
both the client and server know each
other only during the current request.
• Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.
Application Layer Protocols
Features of HTTP:
• Port number is 80.
• HTTP is the standard protocol for·
requesting a URL defined web-page
resource, and for sending a response
to the web server.
• The connection between client and
server exist only during the current
request and response time only.
• Stateless: HTTP is a stateless protocol as
both the client and server know each
other only during the current request.
• Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.
Application Layer Protocols
Application Layer Protocols
• Status codes add in the response and
caching of a resource provided at a
server (and proxy).
• For example, status code returned as
response when 400 means a bad
request (the request not responding),
• 401 unauthorized request
• 402 means request requires a
• payment before response feasible,
403 means request is for a forbidden
resource and
• 404 means URL resource not found
by the server.
Application Layer Protocols
Uniform Resource Locator
(URL):
• A client that wants to access the
document in an internet needs an
address and to facilitate the access of
documents, the HTTP uses the
concept of Uniform Resource
Locator (URL).
• The URL defines four parts: method,
host computer, port, and path.
Application Layer Protocols
Method: The method is the protocol
used to retrieve the document from a
server. For example, HTTP.
Host: The host is the computer where
the information is stored, Web pages
are mainly stored in the computers and
the computers are given an alias name
that begins with the characters "www".
Application Layer Protocols
Port: The URL can also contain the port
number of the server, but it's an
optional field.
Path: Path is the pathname of the file
where the information is stored. The
path itself contain slashes that separate
the directories from the subdirectories
and files.
Application Layer Protocols
HTTPS:
• HTTPS stands for Hyper Text
Transfer Protocol Secure. It is highly
advanced and secure version of
HTTP.
• It uses the port no. 443 for Data
Communication.
• It allows the secure transactions by
encrypting the entire
communication with SSL. It is a
• HTTP also allows you to create a
secure encrypted connection
between the server and the browser.
• It offers the bi-directional security of
Data. This helps you to protect
potentially sensitive information
from being stolen.
Application Layer Protocols
Advantages of HTTPS:
• In most cases, sites running over
HTTPS will have a redirect in place.
Therefore, even if you type in
HTTP:// it will redirect to an https
over a secured connection
• It allows users to perform secure e-
commerce transaction, such as
online banking.
• SSL technology protects any users
and builds trust
• An independent authority verifies
the identity of the certificate owner.
So, each SSL Certificate contains
unique, authenticated information
about the certificate owner.
Application Layer Protocols
Limitations of HTTPS:
• HTTPS protocol can't stop stealing
confidential information from the
pages cached on the browser
• SSL data can be encrypted only
during transmission on the network.
So, it can't clear the text in the
browser memory
• HTTPS can increase computational
overhead as well as network
overhead of the organization
Application Layer Protocols
FTP:
• FTP is a standard internet protocol
provided by TCP/IP used for
transmitting the files from one host to
another.
• It is mainly used for transferring the
web page files .
• It is also used for downloading the
files to computer from other servers.
Objectives of FTP:
• It provides the sharing of files.
• It is used to encourage the use of
remote computers.
• It transfers the data more reliably and
efficiently.
Application Layer Protocols
Application Layer Protocols
Control Connection:
• The control connection uses very
simple rules for communication.
Through control connection,
• The control connection remains
connected during the entire
interactive FTP session.
Application Layer Protocols
Data Connection:
• The Data Connection uses very
complex rules as data types may
vary.
• The data connection opens when a
command comes for transferring the
files and closes when the file is
transferred.
Application Layer Protocols
Advantages:
• Speed: The FTP is one of the fastest way
to transfer the files.
• Efficient: We do not need to complete
all the operations to get the entire file.
• Security: To access the FTP server, we
need to login with the username and
password.
• Back & forth movement: Send some
information to all and they all send
information back on the same server.
Disadvantages:
• FTP serves two operations, i.e., to
send and receive large files on a
network.
• It also doesn't allow you to run
simultaneous transfers to multiple
receivers.
• Passwords and file contents are sent
in clear text that allows unwanted
eavesdropping.
• It is not compatible with every
Application Layer Protocols
TELNET:
• The main task of the internet is to
provide services to users.
• For example, users want to run different
application programs at the remote site
and transfers a result to the local site.
• This requires a client-server program
such as FTP, SMTP. But this would not
allow us to create a specific program for
each demand.
• The better solution is to provide a
general client-server program that
lets the user access any application
program on a remote computer.
• Therefore, a program that allows a
user to log on to a remote computer.
A
• Popular client-server program Telnet
is used to meet such demands. Telnet
is an abbreviation for Terminal
Application Layer Protocols
There are two types of login:
• Local Login
• Remote Login
Application Layer Protocols
There are two types of login:
• Local Login
• Remote Login
Application Layer Protocols
Advantages:
• Telnet client is versatile
• Can be used cross-platform
• Unlimited access to target resources
Disadvantages:
• Unencrypted data exchange
• Full access makes it easier for hackers
• Only few servers can be reached via
Telnet
Internet Connectivity Principles
Internet connectivity
Introduction
Application Layer
Protocols

More Related Content

What's hot

Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
IPv4
IPv4IPv4
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
rajshreemuthiah
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
FabMinds
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
TCP/ IP
TCP/ IP TCP/ IP
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
Simplilearn
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 

What's hot (20)

Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Ethernet
EthernetEthernet
Ethernet
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Application Layer
Application Layer Application Layer
Application Layer
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
IPv4
IPv4IPv4
IPv4
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
Network switch
Network switchNetwork switch
Network switch
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 

Similar to Application layer protocols

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
Lecture 6- http
Lecture  6- httpLecture  6- http
Lecture 6- http
Saman M. Almufti
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
ShehryarFreelancer
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
smitha273566
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
Abhishek Kharbanda
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
Nidhitransport
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
Gurjot Singh
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
Abshar Fatima
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
AASTHAJAJOO
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.ppt
ssuserf7cd2b
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
ssuser8b4eb21
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
DSPL
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
Srihari
 
Web technology
Web technologyWeb technology
Web technology
Selvin Josy Bai Somu
 
Web technology Unit I Part C
Web technology Unit I  Part CWeb technology Unit I  Part C
Web technology Unit I Part C
SSN College of Engineering, Kalavakkam
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
MansiSingh269494
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
Gouasmia Zakaria
 

Similar to Application layer protocols (20)

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
Lecture 6- http
Lecture  6- httpLecture  6- http
Lecture 6- http
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.ppt
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Web technology
Web technologyWeb technology
Web technology
 
Web technology Unit I Part C
Web technology Unit I  Part CWeb technology Unit I  Part C
Web technology Unit I Part C
 
Web & HTTP
Web & HTTPWeb & HTTP
Web & HTTP
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 

More from FabMinds

Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists | Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists |
FabMinds
 
Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings | Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings |
FabMinds
 
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration | Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
FabMinds
 
Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study | Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study |
FabMinds
 
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions | Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
FabMinds
 
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion | Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
FabMinds
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
FabMinds
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
FabMinds
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
FabMinds
 
introduction for web connectivity (IoT)
introduction for web connectivity (IoT)introduction for web connectivity (IoT)
introduction for web connectivity (IoT)
FabMinds
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
FabMinds
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
FabMinds
 
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
FabMinds
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
FabMinds
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
FabMinds
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5
FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4
FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
FabMinds
 
Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3
FabMinds
 

More from FabMinds (20)

Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists | Python Programming | JNTUA | UNIT 3 | Lists |
Python Programming | JNTUA | UNIT 3 | Lists |
 
Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings | Python Programming | JNTUA | UNIT 3 | Strings |
Python Programming | JNTUA | UNIT 3 | Strings |
 
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration | Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
Python Programming | JNTUA | UNIT 3 | Updating Variables & Iteration |
 
Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study | Python Programming | JNTUA | UNIT 2 | Case Study |
Python Programming | JNTUA | UNIT 2 | Case Study |
 
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions | Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
Python Programming | JNTUA | UNIT 2 | Fruitful Functions |
 
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion | Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
Python Programming | JNTUA | UNIT 2 | Conditionals and Recursion |
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
introduction for web connectivity (IoT)
introduction for web connectivity (IoT)introduction for web connectivity (IoT)
introduction for web connectivity (IoT)
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
 
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | FunctionsPython Introduction | JNTUA | R19 | UNIT 1 | Functions
Python Introduction | JNTUA | R19 | UNIT 1 | Functions
 
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
Python Programming | JNTUK | UNIT 2 | Lecture 6 & 7 | Conditional & Control S...
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5Python Programming | JNTUK | UNIT 1 | Lecture 5
Python Programming | JNTUK | UNIT 1 | Lecture 5
 
Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4Python Programming | JNTUK | UNIT 1 | Lecture 4
Python Programming | JNTUK | UNIT 1 | Lecture 4
 
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
Python Programming | JNTUK | UNIT 1 | Lecture 1 & 2
 
Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3Python Programming | JNTUK | UNIT 1 | Lecture 3
Python Programming | JNTUK | UNIT 1 | Lecture 3
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Application layer protocols

  • 1.
  • 2. Internet Connectivity Principles Internet connectivity Introduction Application Layer Protocols
  • 3. Application Layer Protocols • TCP/IP suite consists of a number application layer protocols. • For example, HTTP, HTTPS, FTP, Telnet and others.
  • 4. Application Layer Protocols • TCP/IP suite consists of a number application layer protocols. • For example, HTTP, HTTPS, FTP, Telnet and others.
  • 5. Application Layer Protocols HTTP: • It is a protocol used to access the data on the World Wide Web (www). • The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on. • Its efficiency that allows us to use in a hypertext environment where there are rapid jumps from one • HTTP is like the FTP as it also transfers the files from one host to another host. But HTTP is simpler than FTP. • HTTP is like SMTP as the data is transferred between client and server. • SMTP messages are stored and forwarded while HTTP messages are delivered immediately.
  • 6. Application Layer Protocols Features of HTTP: • Port number is 80. • HTTP is the standard protocol for· requesting a URL defined web-page resource, and for sending a response to the web server. • The connection between client and server exist only during the current request and response time only. • Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. • Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.
  • 7. Application Layer Protocols Features of HTTP: • Port number is 80. • HTTP is the standard protocol for· requesting a URL defined web-page resource, and for sending a response to the web server. • The connection between client and server exist only during the current request and response time only. • Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. • Due to this nature of the protocol, both the client and server do not retain the information between various requests of the web pages.
  • 9. Application Layer Protocols • Status codes add in the response and caching of a resource provided at a server (and proxy). • For example, status code returned as response when 400 means a bad request (the request not responding), • 401 unauthorized request • 402 means request requires a • payment before response feasible, 403 means request is for a forbidden resource and • 404 means URL resource not found by the server.
  • 10. Application Layer Protocols Uniform Resource Locator (URL): • A client that wants to access the document in an internet needs an address and to facilitate the access of documents, the HTTP uses the concept of Uniform Resource Locator (URL). • The URL defines four parts: method, host computer, port, and path.
  • 11. Application Layer Protocols Method: The method is the protocol used to retrieve the document from a server. For example, HTTP. Host: The host is the computer where the information is stored, Web pages are mainly stored in the computers and the computers are given an alias name that begins with the characters "www".
  • 12. Application Layer Protocols Port: The URL can also contain the port number of the server, but it's an optional field. Path: Path is the pathname of the file where the information is stored. The path itself contain slashes that separate the directories from the subdirectories and files.
  • 13. Application Layer Protocols HTTPS: • HTTPS stands for Hyper Text Transfer Protocol Secure. It is highly advanced and secure version of HTTP. • It uses the port no. 443 for Data Communication. • It allows the secure transactions by encrypting the entire communication with SSL. It is a • HTTP also allows you to create a secure encrypted connection between the server and the browser. • It offers the bi-directional security of Data. This helps you to protect potentially sensitive information from being stolen.
  • 14. Application Layer Protocols Advantages of HTTPS: • In most cases, sites running over HTTPS will have a redirect in place. Therefore, even if you type in HTTP:// it will redirect to an https over a secured connection • It allows users to perform secure e- commerce transaction, such as online banking. • SSL technology protects any users and builds trust • An independent authority verifies the identity of the certificate owner. So, each SSL Certificate contains unique, authenticated information about the certificate owner.
  • 15. Application Layer Protocols Limitations of HTTPS: • HTTPS protocol can't stop stealing confidential information from the pages cached on the browser • SSL data can be encrypted only during transmission on the network. So, it can't clear the text in the browser memory • HTTPS can increase computational overhead as well as network overhead of the organization
  • 16. Application Layer Protocols FTP: • FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another. • It is mainly used for transferring the web page files . • It is also used for downloading the files to computer from other servers. Objectives of FTP: • It provides the sharing of files. • It is used to encourage the use of remote computers. • It transfers the data more reliably and efficiently.
  • 18. Application Layer Protocols Control Connection: • The control connection uses very simple rules for communication. Through control connection, • The control connection remains connected during the entire interactive FTP session.
  • 19. Application Layer Protocols Data Connection: • The Data Connection uses very complex rules as data types may vary. • The data connection opens when a command comes for transferring the files and closes when the file is transferred.
  • 20. Application Layer Protocols Advantages: • Speed: The FTP is one of the fastest way to transfer the files. • Efficient: We do not need to complete all the operations to get the entire file. • Security: To access the FTP server, we need to login with the username and password. • Back & forth movement: Send some information to all and they all send information back on the same server. Disadvantages: • FTP serves two operations, i.e., to send and receive large files on a network. • It also doesn't allow you to run simultaneous transfers to multiple receivers. • Passwords and file contents are sent in clear text that allows unwanted eavesdropping. • It is not compatible with every
  • 21. Application Layer Protocols TELNET: • The main task of the internet is to provide services to users. • For example, users want to run different application programs at the remote site and transfers a result to the local site. • This requires a client-server program such as FTP, SMTP. But this would not allow us to create a specific program for each demand. • The better solution is to provide a general client-server program that lets the user access any application program on a remote computer. • Therefore, a program that allows a user to log on to a remote computer. A • Popular client-server program Telnet is used to meet such demands. Telnet is an abbreviation for Terminal
  • 22. Application Layer Protocols There are two types of login: • Local Login • Remote Login
  • 23. Application Layer Protocols There are two types of login: • Local Login • Remote Login
  • 24. Application Layer Protocols Advantages: • Telnet client is versatile • Can be used cross-platform • Unlimited access to target resources Disadvantages: • Unencrypted data exchange • Full access makes it easier for hackers • Only few servers can be reached via Telnet
  • 25. Internet Connectivity Principles Internet connectivity Introduction Application Layer Protocols