SlideShare ist ein Scribd-Unternehmen logo
1 von 24
C O M PUTER NETWO RKS




  Applications



   Mr. Shylesh B C
Text Book
Computer and Communication Networks
                      By Nader F. Mir
                 Pearson Edition, 2007



     Chapters 9.1 to 9.6, 18.1,18.2
Contents
– Application-layer overview
– Domain Name System (DNS)
– Remote login protocols
– Electronic mail (e-mail)
– File transfer and FTP
– World Wide Web (WWW) and HTTP
– Overview of IP telephony
– VoIP signaling protocols
Application-layer overview
• The application layer is built on the transport
  layer and provides network services to user
  applications
• The application layer defines and performs such
  applications as
  – electronic mail (e-mail), remote access to computers,
    file transfers, newsgroups, and the Web, as well as
    streaming video, Internet radio and telephony, P2P
    file sharing, multi user networked games, streaming
    stored video clips, and real-time video conferencing.
Web communication between two
       end systems
Domain Name System (DNS)
• One of the most important components of the application
  layer is the Domain Name System (DNS) server.
• DNS is a distributed hierarchical and global directory that
  translates machine or domain names to numerical IP
  addresses.
• DNS can be thought as a distributed database system
  used to map host names to IP addresses, and vice
  versa.
• DNS is an application-layer protocol, and every Internet
  service provider whether for an organization, a university
  campus, or even a residence has a DNS server.
Hierarchy of domain name space,
   labels, and domain names
Hierarchy of DNS domain name
            servers
Name/Address Mapping

                       Recursive mapping




Iterative mapping
Remote login protocols
• A client/server model can create a
  mechanism that allows a user to establish
  a session on the remote machine and then
  run its applications.
• This application is known as remote login.
• Two remote login protocols are
  – TELNET
  – SSH.
TELNET Protocol
• TELNET (terminal network) is a TCP/IP
  standard for establishing a connection to a
  remote system.
• TELNET allows a user to log in to a
  remote machine across the Internet by
  first making a TCP connection and then
  pass the detail of the application from the
  user to the remote machine.
Secure Shell (SSH) Protocol
• Secure Shell (SSH), another remote login
  protocol, is based on UNIX programs.
  SSH uses TCP for communications.
• It is more powerful and flexible than
  TELNET and allows the user to more
  easily execute a single command on a
  remote client.
Electronic mail (e-mail)
• It is Simple Mail Transfer Protocol (SMTP) and
  E-mail
• The Simple Mail Transfer Protocol (SMTP) plays
  a major role in transferring Internet electronic
  mail.
• This protocol transfers electronic mail (e-mail )
  from the mail server of a source to the mail
  servers of destinations.
• SMTP is older than the Hypertext Transfer
  Protocol (HTTP), the Web communication
  protocol, and imposes certain restrictions, such
  as limits on the size of e-mail content.
Two users exchanging e-mail
      through SMTP
File transfer and FTP
• File transfer is another computer
  networking application.
• It is always essential that files and
  information geographically distributed over
  different locations be shared among the
  members of a working group.
• Two file transfer protocols are
  – FTP
  – SCP.
File Transfer Protocol (FTP)
• File Transfer Protocol (FTP) is part of the
  TCP/IP suite and is very similar to
  TELNET.
• Both FTP and TELNET are built on the
  client/server paradigm, and both allow a
  user to establish a remote connection.
• However, TELNET provides a broader
  access to a user, whereas FTP allows
  access only to certain files.
Secure Copy Protocol (SCP)
• The Secure Copy Protocol (SCP) is similar to
  TELNET but is secure.
• Incorporated in the SCP structure are a number of
  encryption and authentication features that are
  similar to those in SSH.
• Also similar is the exchange of commands
  between local and remote hosts.
• SCP commands automatically prompt the user for
  the password information when it is time to
  access a remote machine.
• SCP cannot handle file transfer between
  machines of significantly different architectures.
World Wide Web (WWW) & HTTP
• The World Wide Web (WWW), or simply
  Web, is a global network of servers linked
  by a common protocol allowing access to
  all connected hypertext resources.
• When a client host requests an object, a
  Web server responds by sending the
  requested object through browsing tools.
• A browser is a user agent displaying the
  requested Web page.
• The Hyper Text Transfer Protocol (HTTP)
  transfers that page at the application layer.
• HTTP uses TCP rather than UDP, since
  reliability of delivery is important for Web pages
  with text.
• The TCP connection-establishment delay in
  HTTP is one of the main contributing delay
  factors associated with downloading Web
  documents.
• HTTP is based on the client/server idea, having
  a client and a server program, both of which can
  be executed on different end systems.
• The communication is carried out through an
  exchange of HTTP messages.
Web Caching (Proxy Server)
Overview of IP telephony
• An IP telephone can be used to make telephone calls
  over IP networks.
• Voice over IP (VoIP), or IP telephony, uses packet-
  switched networks to carry voice traffic in addition to data
  traffic.
• The basic scheme of IP telephony starts with pulse code
  modulation. The encoded data is transmitted as packets
  over packet-switched networks.
• At a receiver, the data is decoded and converted back to
  analog form.
• The packet size must be properly chosen to prevent large
  delays.
• The IP telephone system must also be able to handle the
  signaling function of the call setup, mapping of phone
  number to IP address, and proper call termination.
Voice over IP system
VoIP signaling protocols
• The IP telephone system must be able to handle
  signaling for call setup, conversion of phone
  number to IP address mapping, and proper call
  termination.
• Signaling is required for call setup, call
  management, and call termination.
• In the standard telephone network, signaling
  involves identifying the user's location given a
  phone number, finding a route between a calling
  and a called party, and handling the issue of call
  forwarding and other call features.
THANK YOU



 www.shylesh.freevar.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Application layer
Application layerApplication layer
Application layer
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
Application Layer
Application Layer Application Layer
Application Layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Computer Networks : WWW , TELNET and SSH
Computer Networks  : WWW , TELNET and SSHComputer Networks  : WWW , TELNET and SSH
Computer Networks : WWW , TELNET and SSH
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTP
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Application layer
Application layerApplication layer
Application layer
 
Unit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITUnit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - IT
 

Ähnlich wie Computer Networks

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptxArnavPlayz
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptxMelvinShaji12
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxbmit1
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definationstangemjoy
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
CS-324-6-3 (2).pdf
CS-324-6-3 (2).pdfCS-324-6-3 (2).pdf
CS-324-6-3 (2).pdfRizulthakur2
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
CS-324-6-3 (1).pdf
CS-324-6-3 (1).pdfCS-324-6-3 (1).pdf
CS-324-6-3 (1).pdfRizulthakur2
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
 

Ähnlich wie Computer Networks (20)

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Iso model
Iso modelIso model
Iso model
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
CS-324-6-3 (2).pdf
CS-324-6-3 (2).pdfCS-324-6-3 (2).pdf
CS-324-6-3 (2).pdf
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
CS-324-6-3 (1).pdf
CS-324-6-3 (1).pdfCS-324-6-3 (1).pdf
CS-324-6-3 (1).pdf
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
Networking
NetworkingNetworking
Networking
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 

Kürzlich hochgeladen

Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...baharayali
 
Emails, Facebook, WhatsApp and the Dhamma (English and Chinese).pdf
Emails, Facebook, WhatsApp and the Dhamma  (English and Chinese).pdfEmails, Facebook, WhatsApp and the Dhamma  (English and Chinese).pdf
Emails, Facebook, WhatsApp and the Dhamma (English and Chinese).pdfOH TEIK BIN
 
Genesis 1:10 || Meditate the Scripture daily verse by verse
Genesis 1:10  ||  Meditate the Scripture daily verse by verseGenesis 1:10  ||  Meditate the Scripture daily verse by verse
Genesis 1:10 || Meditate the Scripture daily verse by versemaricelcanoynuay
 
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...makhmalhalaaay
 
Genesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bitGenesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bitmaricelcanoynuay
 
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...Amil Baba Naveed Bangali
 
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...mustardseed108
 
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...baharayali
 
Genesis 1:7 || Meditate the Scripture daily verse by verse
Genesis 1:7  ||  Meditate the Scripture daily verse by verseGenesis 1:7  ||  Meditate the Scripture daily verse by verse
Genesis 1:7 || Meditate the Scripture daily verse by versemaricelcanoynuay
 
VADODARA CALL GIRL AVAILABLE 7568201473 call me
VADODARA CALL GIRL AVAILABLE 7568201473 call meVADODARA CALL GIRL AVAILABLE 7568201473 call me
VADODARA CALL GIRL AVAILABLE 7568201473 call meshivanisharma5244
 
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...baharayali
 
Jude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptxJude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptxStephen Palm
 
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksThe_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksNetwork Bible Fellowship
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
A Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxxA Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxxssuser83613b
 
Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...
Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...
Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...baharayali
 

Kürzlich hochgeladen (20)

Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
 
Emails, Facebook, WhatsApp and the Dhamma (English and Chinese).pdf
Emails, Facebook, WhatsApp and the Dhamma  (English and Chinese).pdfEmails, Facebook, WhatsApp and the Dhamma  (English and Chinese).pdf
Emails, Facebook, WhatsApp and the Dhamma (English and Chinese).pdf
 
Genesis 1:10 || Meditate the Scripture daily verse by verse
Genesis 1:10  ||  Meditate the Scripture daily verse by verseGenesis 1:10  ||  Meditate the Scripture daily verse by verse
Genesis 1:10 || Meditate the Scripture daily verse by verse
 
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
Professional Amil baba, Kala jadu specialist in Multan and Kala ilam speciali...
 
Genesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bitGenesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bit
 
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
NO1 Trending Black Magic Specialist Expert Amil baba in Lahore Islamabad Rawa...
 
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
 
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
 
Genesis 1:7 || Meditate the Scripture daily verse by verse
Genesis 1:7  ||  Meditate the Scripture daily verse by verseGenesis 1:7  ||  Meditate the Scripture daily verse by verse
Genesis 1:7 || Meditate the Scripture daily verse by verse
 
Zulu - The Epistle of Ignatius to Polycarp.pdf
Zulu - The Epistle of Ignatius to Polycarp.pdfZulu - The Epistle of Ignatius to Polycarp.pdf
Zulu - The Epistle of Ignatius to Polycarp.pdf
 
VADODARA CALL GIRL AVAILABLE 7568201473 call me
VADODARA CALL GIRL AVAILABLE 7568201473 call meVADODARA CALL GIRL AVAILABLE 7568201473 call me
VADODARA CALL GIRL AVAILABLE 7568201473 call me
 
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
Famous Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in ka...
 
Jude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptxJude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptx
 
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksThe_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
 
St. Louise de Marillac and Care of the Sick Poor
St. Louise de Marillac and Care of the Sick PoorSt. Louise de Marillac and Care of the Sick Poor
St. Louise de Marillac and Care of the Sick Poor
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Famous No -1 amil baba in Hyderabad ! Best No _ Astrologer in Pakistan, UK, A...
Famous No -1 amil baba in Hyderabad ! Best No _ Astrologer in Pakistan, UK, A...Famous No -1 amil baba in Hyderabad ! Best No _ Astrologer in Pakistan, UK, A...
Famous No -1 amil baba in Hyderabad ! Best No _ Astrologer in Pakistan, UK, A...
 
St. Louise de Marillac and Abandoned Children
St. Louise de Marillac and Abandoned ChildrenSt. Louise de Marillac and Abandoned Children
St. Louise de Marillac and Abandoned Children
 
A Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxxA Spiritual Guide To Truth v10.pdf xxxxxxx
A Spiritual Guide To Truth v10.pdf xxxxxxx
 
Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...
Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...
Real Kala Jadu, Black magic specialist in Lahore and Kala ilam expert in kara...
 

Computer Networks

  • 1. C O M PUTER NETWO RKS Applications Mr. Shylesh B C
  • 2. Text Book Computer and Communication Networks By Nader F. Mir Pearson Edition, 2007 Chapters 9.1 to 9.6, 18.1,18.2
  • 3. Contents – Application-layer overview – Domain Name System (DNS) – Remote login protocols – Electronic mail (e-mail) – File transfer and FTP – World Wide Web (WWW) and HTTP – Overview of IP telephony – VoIP signaling protocols
  • 4. Application-layer overview • The application layer is built on the transport layer and provides network services to user applications • The application layer defines and performs such applications as – electronic mail (e-mail), remote access to computers, file transfers, newsgroups, and the Web, as well as streaming video, Internet radio and telephony, P2P file sharing, multi user networked games, streaming stored video clips, and real-time video conferencing.
  • 5. Web communication between two end systems
  • 6. Domain Name System (DNS) • One of the most important components of the application layer is the Domain Name System (DNS) server. • DNS is a distributed hierarchical and global directory that translates machine or domain names to numerical IP addresses. • DNS can be thought as a distributed database system used to map host names to IP addresses, and vice versa. • DNS is an application-layer protocol, and every Internet service provider whether for an organization, a university campus, or even a residence has a DNS server.
  • 7. Hierarchy of domain name space, labels, and domain names
  • 8. Hierarchy of DNS domain name servers
  • 9. Name/Address Mapping Recursive mapping Iterative mapping
  • 10. Remote login protocols • A client/server model can create a mechanism that allows a user to establish a session on the remote machine and then run its applications. • This application is known as remote login. • Two remote login protocols are – TELNET – SSH.
  • 11. TELNET Protocol • TELNET (terminal network) is a TCP/IP standard for establishing a connection to a remote system. • TELNET allows a user to log in to a remote machine across the Internet by first making a TCP connection and then pass the detail of the application from the user to the remote machine.
  • 12. Secure Shell (SSH) Protocol • Secure Shell (SSH), another remote login protocol, is based on UNIX programs. SSH uses TCP for communications. • It is more powerful and flexible than TELNET and allows the user to more easily execute a single command on a remote client.
  • 13. Electronic mail (e-mail) • It is Simple Mail Transfer Protocol (SMTP) and E-mail • The Simple Mail Transfer Protocol (SMTP) plays a major role in transferring Internet electronic mail. • This protocol transfers electronic mail (e-mail ) from the mail server of a source to the mail servers of destinations. • SMTP is older than the Hypertext Transfer Protocol (HTTP), the Web communication protocol, and imposes certain restrictions, such as limits on the size of e-mail content.
  • 14. Two users exchanging e-mail through SMTP
  • 15. File transfer and FTP • File transfer is another computer networking application. • It is always essential that files and information geographically distributed over different locations be shared among the members of a working group. • Two file transfer protocols are – FTP – SCP.
  • 16. File Transfer Protocol (FTP) • File Transfer Protocol (FTP) is part of the TCP/IP suite and is very similar to TELNET. • Both FTP and TELNET are built on the client/server paradigm, and both allow a user to establish a remote connection. • However, TELNET provides a broader access to a user, whereas FTP allows access only to certain files.
  • 17. Secure Copy Protocol (SCP) • The Secure Copy Protocol (SCP) is similar to TELNET but is secure. • Incorporated in the SCP structure are a number of encryption and authentication features that are similar to those in SSH. • Also similar is the exchange of commands between local and remote hosts. • SCP commands automatically prompt the user for the password information when it is time to access a remote machine. • SCP cannot handle file transfer between machines of significantly different architectures.
  • 18. World Wide Web (WWW) & HTTP • The World Wide Web (WWW), or simply Web, is a global network of servers linked by a common protocol allowing access to all connected hypertext resources. • When a client host requests an object, a Web server responds by sending the requested object through browsing tools. • A browser is a user agent displaying the requested Web page. • The Hyper Text Transfer Protocol (HTTP) transfers that page at the application layer.
  • 19. • HTTP uses TCP rather than UDP, since reliability of delivery is important for Web pages with text. • The TCP connection-establishment delay in HTTP is one of the main contributing delay factors associated with downloading Web documents. • HTTP is based on the client/server idea, having a client and a server program, both of which can be executed on different end systems. • The communication is carried out through an exchange of HTTP messages.
  • 21. Overview of IP telephony • An IP telephone can be used to make telephone calls over IP networks. • Voice over IP (VoIP), or IP telephony, uses packet- switched networks to carry voice traffic in addition to data traffic. • The basic scheme of IP telephony starts with pulse code modulation. The encoded data is transmitted as packets over packet-switched networks. • At a receiver, the data is decoded and converted back to analog form. • The packet size must be properly chosen to prevent large delays. • The IP telephone system must also be able to handle the signaling function of the call setup, mapping of phone number to IP address, and proper call termination.
  • 22. Voice over IP system
  • 23. VoIP signaling protocols • The IP telephone system must be able to handle signaling for call setup, conversion of phone number to IP address mapping, and proper call termination. • Signaling is required for call setup, call management, and call termination. • In the standard telephone network, signaling involves identifying the user's location given a phone number, finding a route between a calling and a called party, and handling the issue of call forwarding and other call features.