SlideShare ist ein Scribd-Unternehmen logo
1 von 34
THE APPLICATION LAYER
Prepared By: Reshma Dayma
DNS- Domain Name System
 Every host in internet can be accessed using IP address, but it very difficult for humans
to remember IP address of each host, he needs to contact.
 As a solution, host are gives names, humans can access host using name.
 Naming scheme is hierarchical, domain based naming scheme.
 To manage large number of named, internet authority have managed it like postal
system. In postal system, each address consist of country, state, city, street etc.
 Names of host are also according some hierarchy.
 Conceptually, internet is divided into top 200 domain, similarly like country in postal
system.
 Each domain is partitioned into subdomains and these are further partitioned. This is
similar to states in country, and cities in state.
 This naming system can be represented by tree.
Domain Name Space
A portion of the Internet domain name space.
Domain Name System
 Getting a second level domain, such as name-of-company.com is easy.
 It just requires registration of the name with the authority of the top level domain.
 Domains are named by path from it to root in upward direction.
 Domain names are case insensitive. Each component can contain up to 63 character
and full path name must not exceed 255 characters.
 Each domain can create sub domain within it.
 Domain can contain single host or multiple host within it.
Domain Name Server
 Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses.
 This is necessary because, although domain names are easy for people to remember,
computers or machines, access websites based on IP addresses.
 Each domain can have different types of records of it, these are called resource
records.
 Recourse record is five tuple record.
domain-name time-to-live class type value
1. domain-name: is name of domain to whom given record belongs.
2. time-to-live: gives indication how stable information is.
3. class: class of information. For internet information, class is IN.
4. type: type of information.
5. value: value of record.
Resource Record
The principal DNS resource record types
Resource Records
Name Server
 A single name server can contain entire DNS database, but in practical, this server would be
overloaded.
 To avoid this problem, DNS name space is divided into zones.
 A zone contains some part of DNS tree and name server holding information about zone.
Name Server
 A zone will have a primary server and secondary server.
 Primary server gets information about zone from disk, secondary server gets information about zone
from primary servers.
 When ever host requires DNS record, it will call a program called “resolver” and pass it the host name
for which IP address is required.
 Resolver first pass query to local name server, if host name falls under boundary of that local server, it
will reply with record. This record is called “Authoritative Record”.
 If the local name server does not have data of given host name, it will ask another name server. This
method is called recursive query.
Recursive Query
Iterative Query
E mail
 Mail system is consist of TWO subsystem.
user agent: allows people to read and write mail.
Message Transfer agent: moves message from source to destination.
 User agent is program that provides command base or menu base interface.
 Message transfer agent are daemons, that run in background.
 services provided by Email system
1. Composition: process of creating and answering.
2. Transfer: Moving message from sender to receiver.
3. Reporting: report to sender about status of sent message
4. Displaying: displays the messages to the user
5. Disposition: allows to save or throw message.
Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
User Agent
 User agent is a program that accepts commands for composing, receiving, replying to message.
 When user agent starts up, it first of check mailbox of user for incoming email. Then it displays
messages in mailbox.
 Message Format: messages consist of header field, blank line and message body.
header according to RFC 822 standard is given below.
User Agent
Some other fields used in the RFC 822 message header.
User Agent
 Earlier, mail used to be written only in English and expressed in ASCII format.
Due to growth of internet, mails are required to support other type of data also.
Solution is called MIME(Multipurpose Internet Mail Extensions).
 MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.
 MIME messages can sent using normal program and protocol, only sending and receiving user
agent needs to change so that they can support other language.
 MIME header is attached after mail header, this header contains information about data and how
that data can be interpreted.
Message headers added by MIME.
Message Transfer agent
 Message transfer agent deliver message from sender to receiver.
 It complete task by establishing transport connection, transfer the data then
release connection.
 SMTP: The Simple Mail Transfer Protocol
 To send and receiver mail, SMTP is followed. Message transfer agent that is
using SMTP is listening at port 25. so TCP connection is established at port 25
of destination machine.
 These message transfer daemon accepts incoming message, copies into
appropriate mailbox.
 If message can not be delivered then error report is sent to sender.
Message Transfer agent
Architecture of the email system
Message Transfer
Message Transfer
Message Transfer
 Until now, it is assumed that receiver message agent is always ready to accept but it is not
normal.
 Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of
customer and stores in mailbox on ISP machine.
 When user agent comes on line, it will fetch mail from ISP’s machine.
 To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.
 POP3 begins when user starts mail reader. It establishes TCP connection with message agent
on ISP on port POP3.
 Once connection is established, POP3 performs three steps in sequence.
1. authentication
2. Transaction
3. Update
Message Transfer
Message transfer
Using POP3 to fetch Three Messages
WWW
 World wide web is an architectural framework for accessing linked documents spread out all over
the internet.
 The web began in 1989 at CERN, European center for nuclear research.
 In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for
further development of web.
 From users point of view, web is vast collection of documents called web pages.
 Each page may contain link to another page.
 Pages are viewed with a program called browser, browser fetches a page, interpret command in
it and displays page according to format.
 String of text that is linked to another page is called hyperlink.
WWW
Architecture of the Web.
WWW
The Client Side:
 Browser program at client side display the page and catches mouse clicks. When any item is
selected, browser follows hyperlink and page is fetched.
 In hyperlink, pages are name using URL( Uniform Resource Locator).
http://www.abcd.com/product.html
 URL has three parts,
1. Name of protocol (here http) used access resource.
2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com)
3. name of file containing the resource. (here product.html)
WWW
 When user clicks on hyperlink, browser carries out following series of steps to
fetch the page.
1. Browser determines the URL
2. Browser asks DNS for the IP address of the server
3. DNS replies
4. The browser makes a TCP connection
5. Sends HTTP request for the page
6. Server sends the page as HTTP response
7. The TCP connection is released
8. The browser displays the page
 Web pages are written in standard language like HTML, so all browser can
understand it.
WWW
 Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can
interpret all the data. To overcome problem, two solutions are possible.
1. plug in
2. helper application
(a) A browser plug-in. (b) A helper application.
WWW
The Server Side:
 The steps that server or web server performs when request from client are listed below
1. Accept a TCP connection from client
2. Get path to page, name of file requested.
3. Get the file (from disk).
4. Send contents of the file to the client.
5. Release the TCP connection.
 One problem is for every file, disk access is required. Solution is to maintain cache of n most
recently used files.
 Modern server also performs authentication and access control task, it will first perform
authentication and access control, then it will fetch file from disk.
WWW
A multithreaded Web server with a front end
and processing modules.
HTTP
 The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer
Protocol).
 It specifies what messages Client may send to server and what response they got back in
return.
 Usual way to for browser to contact server is establish TCP connection with server, send
request, get the reply and release connection.
 HTTP 1.1, supports persistent connections, with them it is possible to send and receive
multiple request, reply using single TCP connection.
 Client request pages and other action on pages using various request method.
HTTP
The built-in HTTP request methods.
HTTP
 Every request gets response consist of status line and other information.
 Status line contains three digit Status code.
The status code response groups
HTTP
 Message header:
The http methods may be followed by additional lines with more information. They are called
request headers.
 Responses from server may also additional information, they are called response headers.
 There are several types of request and response header for various purpose.
 “User-agent” header allows client to inform server about its browser, OS and other properties.
 “host” header contains servers DNS name.
HTTP
Some HTTP message headers.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Domain name system
Domain name systemDomain name system
Domain name system
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dns
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Dns
DnsDns
Dns
 
Dns resource record
Dns resource recordDns resource record
Dns resource record
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Introduction to HDFS
Introduction to HDFSIntroduction to HDFS
Introduction to HDFS
 
Chapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.pptChapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.ppt
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
DNS
DNSDNS
DNS
 
Recovery in Multi database Systems
Recovery in Multi database SystemsRecovery in Multi database Systems
Recovery in Multi database Systems
 
Application layer
Application layerApplication layer
Application layer
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Dns presentation
Dns presentationDns presentation
Dns presentation
 
File Transfer Protocol(FTP)
File Transfer Protocol(FTP)File Transfer Protocol(FTP)
File Transfer Protocol(FTP)
 
DHCP
DHCPDHCP
DHCP
 

Andere mochten auch

Application layer jain
Application layer jainApplication layer jain
Application layer jainchempa
 
Application layer
Application layerApplication layer
Application layerSagar jethi
 
Object Oriented Concept
Object Oriented ConceptObject Oriented Concept
Object Oriented Conceptsmj
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocolDr. Amitava Nag
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)Fatbardh Hysa
 
The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 

Andere mochten auch (12)

Wap & WML
Wap & WMLWap & WML
Wap & WML
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Application layer jain
Application layer jainApplication layer jain
Application layer jain
 
Application layer
Application layerApplication layer
Application layer
 
Object Oriented Concept
Object Oriented ConceptObject Oriented Concept
Object Oriented Concept
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Transport layer
Transport layer Transport layer
Transport layer
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Application Layer
Application Layer Application Layer
Application Layer
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 

Ähnlich wie Application layer

telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp emailswatihans
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptxMarwaAnany1
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationPushkar Mishra
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptxZahouAmel1
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.pptGirT2
 
Application layer
Application layer Application layer
Application layer anonymous
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdfEidTahir
 
Application layer
Application layerApplication layer
Application layerSisir Ghosh
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 

Ähnlich wie Application layer (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp email
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.ppt
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Chapter3
Chapter3Chapter3
Chapter3
 
Application layer
Application layer Application layer
Application layer
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdf
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Appl layer
Appl layerAppl layer
Appl layer
 
Application layer
Application layerApplication layer
Application layer
 

Kürzlich hochgeladen

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 

Kürzlich hochgeladen (20)

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Application layer

  • 2. DNS- Domain Name System  Every host in internet can be accessed using IP address, but it very difficult for humans to remember IP address of each host, he needs to contact.  As a solution, host are gives names, humans can access host using name.  Naming scheme is hierarchical, domain based naming scheme.  To manage large number of named, internet authority have managed it like postal system. In postal system, each address consist of country, state, city, street etc.  Names of host are also according some hierarchy.  Conceptually, internet is divided into top 200 domain, similarly like country in postal system.  Each domain is partitioned into subdomains and these are further partitioned. This is similar to states in country, and cities in state.  This naming system can be represented by tree.
  • 3. Domain Name Space A portion of the Internet domain name space.
  • 4. Domain Name System  Getting a second level domain, such as name-of-company.com is easy.  It just requires registration of the name with the authority of the top level domain.  Domains are named by path from it to root in upward direction.  Domain names are case insensitive. Each component can contain up to 63 character and full path name must not exceed 255 characters.  Each domain can create sub domain within it.  Domain can contain single host or multiple host within it.
  • 5. Domain Name Server  Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.  This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.  Each domain can have different types of records of it, these are called resource records.  Recourse record is five tuple record. domain-name time-to-live class type value 1. domain-name: is name of domain to whom given record belongs. 2. time-to-live: gives indication how stable information is. 3. class: class of information. For internet information, class is IN. 4. type: type of information. 5. value: value of record.
  • 6. Resource Record The principal DNS resource record types
  • 8. Name Server  A single name server can contain entire DNS database, but in practical, this server would be overloaded.  To avoid this problem, DNS name space is divided into zones.  A zone contains some part of DNS tree and name server holding information about zone.
  • 9. Name Server  A zone will have a primary server and secondary server.  Primary server gets information about zone from disk, secondary server gets information about zone from primary servers.  When ever host requires DNS record, it will call a program called “resolver” and pass it the host name for which IP address is required.  Resolver first pass query to local name server, if host name falls under boundary of that local server, it will reply with record. This record is called “Authoritative Record”.  If the local name server does not have data of given host name, it will ask another name server. This method is called recursive query.
  • 12. E mail  Mail system is consist of TWO subsystem. user agent: allows people to read and write mail. Message Transfer agent: moves message from source to destination.  User agent is program that provides command base or menu base interface.  Message transfer agent are daemons, that run in background.  services provided by Email system 1. Composition: process of creating and answering. 2. Transfer: Moving message from sender to receiver. 3. Reporting: report to sender about status of sent message 4. Displaying: displays the messages to the user 5. Disposition: allows to save or throw message. Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
  • 13. User Agent  User agent is a program that accepts commands for composing, receiving, replying to message.  When user agent starts up, it first of check mailbox of user for incoming email. Then it displays messages in mailbox.  Message Format: messages consist of header field, blank line and message body. header according to RFC 822 standard is given below.
  • 14. User Agent Some other fields used in the RFC 822 message header.
  • 15. User Agent  Earlier, mail used to be written only in English and expressed in ASCII format. Due to growth of internet, mails are required to support other type of data also. Solution is called MIME(Multipurpose Internet Mail Extensions).  MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.  MIME messages can sent using normal program and protocol, only sending and receiving user agent needs to change so that they can support other language.  MIME header is attached after mail header, this header contains information about data and how that data can be interpreted. Message headers added by MIME.
  • 16. Message Transfer agent  Message transfer agent deliver message from sender to receiver.  It complete task by establishing transport connection, transfer the data then release connection.  SMTP: The Simple Mail Transfer Protocol  To send and receiver mail, SMTP is followed. Message transfer agent that is using SMTP is listening at port 25. so TCP connection is established at port 25 of destination machine.  These message transfer daemon accepts incoming message, copies into appropriate mailbox.  If message can not be delivered then error report is sent to sender.
  • 17. Message Transfer agent Architecture of the email system
  • 20. Message Transfer  Until now, it is assumed that receiver message agent is always ready to accept but it is not normal.  Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of customer and stores in mailbox on ISP machine.  When user agent comes on line, it will fetch mail from ISP’s machine.  To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.  POP3 begins when user starts mail reader. It establishes TCP connection with message agent on ISP on port POP3.  Once connection is established, POP3 performs three steps in sequence. 1. authentication 2. Transaction 3. Update
  • 22. Message transfer Using POP3 to fetch Three Messages
  • 23. WWW  World wide web is an architectural framework for accessing linked documents spread out all over the internet.  The web began in 1989 at CERN, European center for nuclear research.  In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for further development of web.  From users point of view, web is vast collection of documents called web pages.  Each page may contain link to another page.  Pages are viewed with a program called browser, browser fetches a page, interpret command in it and displays page according to format.  String of text that is linked to another page is called hyperlink.
  • 25. WWW The Client Side:  Browser program at client side display the page and catches mouse clicks. When any item is selected, browser follows hyperlink and page is fetched.  In hyperlink, pages are name using URL( Uniform Resource Locator). http://www.abcd.com/product.html  URL has three parts, 1. Name of protocol (here http) used access resource. 2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com) 3. name of file containing the resource. (here product.html)
  • 26. WWW  When user clicks on hyperlink, browser carries out following series of steps to fetch the page. 1. Browser determines the URL 2. Browser asks DNS for the IP address of the server 3. DNS replies 4. The browser makes a TCP connection 5. Sends HTTP request for the page 6. Server sends the page as HTTP response 7. The TCP connection is released 8. The browser displays the page  Web pages are written in standard language like HTML, so all browser can understand it.
  • 27. WWW  Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can interpret all the data. To overcome problem, two solutions are possible. 1. plug in 2. helper application (a) A browser plug-in. (b) A helper application.
  • 28. WWW The Server Side:  The steps that server or web server performs when request from client are listed below 1. Accept a TCP connection from client 2. Get path to page, name of file requested. 3. Get the file (from disk). 4. Send contents of the file to the client. 5. Release the TCP connection.  One problem is for every file, disk access is required. Solution is to maintain cache of n most recently used files.  Modern server also performs authentication and access control task, it will first perform authentication and access control, then it will fetch file from disk.
  • 29. WWW A multithreaded Web server with a front end and processing modules.
  • 30. HTTP  The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer Protocol).  It specifies what messages Client may send to server and what response they got back in return.  Usual way to for browser to contact server is establish TCP connection with server, send request, get the reply and release connection.  HTTP 1.1, supports persistent connections, with them it is possible to send and receive multiple request, reply using single TCP connection.  Client request pages and other action on pages using various request method.
  • 31. HTTP The built-in HTTP request methods.
  • 32. HTTP  Every request gets response consist of status line and other information.  Status line contains three digit Status code. The status code response groups
  • 33. HTTP  Message header: The http methods may be followed by additional lines with more information. They are called request headers.  Responses from server may also additional information, they are called response headers.  There are several types of request and response header for various purpose.  “User-agent” header allows client to inform server about its browser, OS and other properties.  “host” header contains servers DNS name.