SlideShare a Scribd company logo
1 of 34
THE APPLICATION LAYER
DNS- Domain Name System
 Every host in internet can be accessed using IP address, but it very difficult for humans
to remember IP address of each host, he needs to contact.
 As a solution, host are gives names, humans can access host using name.
 Naming scheme is hierarchical, domain based naming scheme.
 To manage large number of named, internet authority have managed it like postal
system. In postal system, each address consist of country, state, city, street etc.
 Names of host are also according some hierarchy.
 Conceptually, internet is divided into top 200 domain, similarly like country in postal
system.
 Each domain is partitioned into subdomains and these are further partitioned. This is
similar to states in country, and cities in state.
 This naming system can be represented by tree.
Domain Name Space
A portion of the Internet domain name space.
Domain Name System
 Getting a second level domain, such as name-of-company.com is easy.
 It just requires registration of the name with the authority of the top level domain.
 Domains are named by path from it to root in upward direction.
 Domain names are case insensitive. Each component can contain up to 63 character
and full path name must not exceed 255 characters.
 Each domain can create sub domain within it.
 Domain can contain single host or multiple host within it.
Domain Name Server
 Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses.
 This is necessary because, although domain names are easy for people to remember,
computers or machines, access websites based on IP addresses.
 Each domain can have different types of records of it, these are called resource
records.
 Recourse record is five tuple record.
domain-name time-to-live class type value
1. domain-name: is name of domain to whom given record belongs.
2. time-to-live: gives indication how stable information is.
3. class: class of information. For internet information, class is IN.
4. type: type of information.
5. value: value of record.
Resource Record
The principal DNS resource record types
Resource Records
Name Server
 A single name server can contain entire DNS database, but in practical, this server would be
overloaded.
 To avoid this problem, DNS name space is divided into zones.
 A zone contains some part of DNS tree and name server holding information about zone.
Name Server
 A zone will have a primary server and secondary server.
 Primary server gets information about zone from disk, secondary server gets information about zone
from primary servers.
 When ever host requires DNS record, it will call a program called “resolver” and pass it the host name
for which IP address is required.
 Resolver first pass query to local name server, if host name falls under boundary of that local server, it
will reply with record. This record is called “Authoritative Record”.
 If the local name server does not have data of given host name, it will ask another name server. This
method is called recursive query.
Recursive Query
Iterative Query
E mail
 Mail system is consist of TWO subsystem.
user agent: allows people to read and write mail.
Message Transfer agent: moves message from source to destination.
 User agent is program that provides command base or menu base interface.
 Message transfer agent are daemons, that run in background.
 services provided by Email system
1. Composition: process of creating and answering.
2. Transfer: Moving message from sender to receiver.
3. Reporting: report to sender about status of sent message
4. Displaying: displays the messages to the user
5. Disposition: allows to save or throw message.
Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
User Agent
 User agent is a program that accepts commands for composing, receiving, replying to message.
 When user agent starts up, it first of check mailbox of user for incoming email. Then it displays
messages in mailbox.
 Message Format: messages consist of header field, blank line and message body.
header according to RFC 822 standard is given below.
User Agent
Some other fields used in the RFC 822 message header.
User Agent
 Earlier, mail used to be written only in English and expressed in ASCII format.
Due to growth of internet, mails are required to support other type of data also.
Solution is called MIME(Multipurpose Internet Mail Extensions).
 MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.
 MIME messages can sent using normal program and protocol, only sending and receiving user
agent needs to change so that they can support other language.
 MIME header is attached after mail header, this header contains information about data and how
that data can be interpreted.
Message headers added by MIME.
Message Transfer agent
 Message transfer agent deliver message from sender to receiver.
 It complete task by establishing transport connection, transfer the data then
release connection.
 SMTP: The Simple Mail Transfer Protocol
 To send and receiver mail, SMTP is followed. Message transfer agent that is
using SMTP is listening at port 25. so TCP connection is established at port 25
of destination machine.
 These message transfer daemon accepts incoming message, copies into
appropriate mailbox.
 If message can not be delivered then error report is sent to sender.
Message Transfer agent
Architecture of the email system
Message Transfer
Message Transfer
Message Transfer
 Until now, it is assumed that receiver message agent is always ready to accept but it is not
normal.
 Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of
customer and stores in mailbox on ISP machine.
 When user agent comes on line, it will fetch mail from ISP’s machine.
 To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.
 POP3 begins when user starts mail reader. It establishes TCP connection with message agent
on ISP on port POP3.
 Once connection is established, POP3 performs three steps in sequence.
1. authentication
2. Transaction
3. Update
Message Transfer
Message transfer
Using POP3 to fetch Three Messages
WWW
 World wide web is an architectural framework for accessing linked documents spread out all over
the internet.
 The web began in 1989 at CERN, European center for nuclear research.
 In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for
further development of web.
 From users point of view, web is vast collection of documents called web pages.
 Each page may contain link to another page.
 Pages are viewed with a program called browser, browser fetches a page, interpret command in
it and displays page according to format.
 String of text that is linked to another page is called hyperlink.
WWW
Architecture of the Web.
WWW
The Client Side:
 Browser program at client side display the page and catches mouse clicks. When any item is
selected, browser follows hyperlink and page is fetched.
 In hyperlink, pages are name using URL( Uniform Resource Locator).
http://www.abcd.com/product.html
 URL has three parts,
1. Name of protocol (here http) used access resource.
2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com)
3. name of file containing the resource. (here product.html)
WWW
 When user clicks on hyperlink, browser carries out following series of steps to
fetch the page.
1. Browser determines the URL
2. Browser asks DNS for the IP address of the server
3. DNS replies
4. The browser makes a TCP connection
5. Sends HTTP request for the page
6. Server sends the page as HTTP response
7. The TCP connection is released
8. The browser displays the page
 Web pages are written in standard language like HTML, so all browser can
understand it.
WWW
 Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can
interpret all the data. To overcome problem, two solutions are possible.
1. plug in
2. helper application
(a) A browser plug-in. (b) A helper application.
WWW
The Server Side:
 The steps that server or web server performs when request from client are listed below
1. Accept a TCP connection from client
2. Get path to page, name of file requested.
3. Get the file (from disk).
4. Send contents of the file to the client.
5. Release the TCP connection.
 One problem is for every file, disk access is required. Solution is to maintain cache of n most
recently used files.
 Modern server also performs authentication and access control task, it will first perform
authentication and access control, then it will fetch file from disk.
WWW
A multithreaded Web server with a front end
and processing modules.
HTTP
 The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer
Protocol).
 It specifies what messages Client may send to server and what response they got back in
return.
 Usual way to for browser to contact server is establish TCP connection with server, send
request, get the reply and release connection.
 HTTP 1.1, supports persistent connections, with them it is possible to send and receive
multiple request, reply using single TCP connection.
 Client request pages and other action on pages using various request method.
HTTP
The built-in HTTP request methods.
HTTP
 Every request gets response consist of status line and other information.
 Status line contains three digit Status code.
The status code response groups
HTTP
 Message header:
The http methods may be followed by additional lines with more information. They are called
request headers.
 Responses from server may also additional information, they are called response headers.
 There are several types of request and response header for various purpose.
 “User-agent” header allows client to inform server about its browser, OS and other properties.
 “host” header contains servers DNS name.
HTTP
Some HTTP message headers.

More Related Content

What's hot

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 

What's hot (20)

Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
introduction about TCP/IP
introduction about TCP/IPintroduction about TCP/IP
introduction about TCP/IP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Dns
DnsDns
Dns
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
transport layer
transport layertransport layer
transport layer
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 

Viewers also liked

Email ppt
Email pptEmail ppt
Email ppt
melgade
 

Viewers also liked (9)

Application Layer
Application Layer Application Layer
Application Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Email ppt
Email pptEmail ppt
Email ppt
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Application layer

4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
ZahouAmel1
 
Application layer
Application layerApplication layer
Application layer
Sisir Ghosh
 

Similar to Application layer (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
telnet ftp email
telnet ftp emailtelnet ftp email
telnet ftp email
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Chapter Six Application Layer.ppt
Chapter Six Application Layer.pptChapter Six Application Layer.ppt
Chapter Six Application Layer.ppt
 
Chapter3
Chapter3Chapter3
Chapter3
 
Application layer
Application layer Application layer
Application layer
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdf
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
unit 1(chapter1).pdf
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Appl layer
Appl layerAppl layer
Appl layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 

More from reshmadayma (6)

Network layer new
Network layer newNetwork layer new
Network layer new
 
Transport layer
Transport layerTransport layer
Transport layer
 
Application layer
Application layerApplication layer
Application layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Transport layer
Transport layerTransport layer
Transport layer
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Application layer

  • 2. DNS- Domain Name System  Every host in internet can be accessed using IP address, but it very difficult for humans to remember IP address of each host, he needs to contact.  As a solution, host are gives names, humans can access host using name.  Naming scheme is hierarchical, domain based naming scheme.  To manage large number of named, internet authority have managed it like postal system. In postal system, each address consist of country, state, city, street etc.  Names of host are also according some hierarchy.  Conceptually, internet is divided into top 200 domain, similarly like country in postal system.  Each domain is partitioned into subdomains and these are further partitioned. This is similar to states in country, and cities in state.  This naming system can be represented by tree.
  • 3. Domain Name Space A portion of the Internet domain name space.
  • 4. Domain Name System  Getting a second level domain, such as name-of-company.com is easy.  It just requires registration of the name with the authority of the top level domain.  Domains are named by path from it to root in upward direction.  Domain names are case insensitive. Each component can contain up to 63 character and full path name must not exceed 255 characters.  Each domain can create sub domain within it.  Domain can contain single host or multiple host within it.
  • 5. Domain Name Server  Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.  This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.  Each domain can have different types of records of it, these are called resource records.  Recourse record is five tuple record. domain-name time-to-live class type value 1. domain-name: is name of domain to whom given record belongs. 2. time-to-live: gives indication how stable information is. 3. class: class of information. For internet information, class is IN. 4. type: type of information. 5. value: value of record.
  • 6. Resource Record The principal DNS resource record types
  • 8. Name Server  A single name server can contain entire DNS database, but in practical, this server would be overloaded.  To avoid this problem, DNS name space is divided into zones.  A zone contains some part of DNS tree and name server holding information about zone.
  • 9. Name Server  A zone will have a primary server and secondary server.  Primary server gets information about zone from disk, secondary server gets information about zone from primary servers.  When ever host requires DNS record, it will call a program called “resolver” and pass it the host name for which IP address is required.  Resolver first pass query to local name server, if host name falls under boundary of that local server, it will reply with record. This record is called “Authoritative Record”.  If the local name server does not have data of given host name, it will ask another name server. This method is called recursive query.
  • 12. E mail  Mail system is consist of TWO subsystem. user agent: allows people to read and write mail. Message Transfer agent: moves message from source to destination.  User agent is program that provides command base or menu base interface.  Message transfer agent are daemons, that run in background.  services provided by Email system 1. Composition: process of creating and answering. 2. Transfer: Moving message from sender to receiver. 3. Reporting: report to sender about status of sent message 4. Displaying: displays the messages to the user 5. Disposition: allows to save or throw message. Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
  • 13. User Agent  User agent is a program that accepts commands for composing, receiving, replying to message.  When user agent starts up, it first of check mailbox of user for incoming email. Then it displays messages in mailbox.  Message Format: messages consist of header field, blank line and message body. header according to RFC 822 standard is given below.
  • 14. User Agent Some other fields used in the RFC 822 message header.
  • 15. User Agent  Earlier, mail used to be written only in English and expressed in ASCII format. Due to growth of internet, mails are required to support other type of data also. Solution is called MIME(Multipurpose Internet Mail Extensions).  MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.  MIME messages can sent using normal program and protocol, only sending and receiving user agent needs to change so that they can support other language.  MIME header is attached after mail header, this header contains information about data and how that data can be interpreted. Message headers added by MIME.
  • 16. Message Transfer agent  Message transfer agent deliver message from sender to receiver.  It complete task by establishing transport connection, transfer the data then release connection.  SMTP: The Simple Mail Transfer Protocol  To send and receiver mail, SMTP is followed. Message transfer agent that is using SMTP is listening at port 25. so TCP connection is established at port 25 of destination machine.  These message transfer daemon accepts incoming message, copies into appropriate mailbox.  If message can not be delivered then error report is sent to sender.
  • 17. Message Transfer agent Architecture of the email system
  • 20. Message Transfer  Until now, it is assumed that receiver message agent is always ready to accept but it is not normal.  Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of customer and stores in mailbox on ISP machine.  When user agent comes on line, it will fetch mail from ISP’s machine.  To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.  POP3 begins when user starts mail reader. It establishes TCP connection with message agent on ISP on port POP3.  Once connection is established, POP3 performs three steps in sequence. 1. authentication 2. Transaction 3. Update
  • 22. Message transfer Using POP3 to fetch Three Messages
  • 23. WWW  World wide web is an architectural framework for accessing linked documents spread out all over the internet.  The web began in 1989 at CERN, European center for nuclear research.  In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for further development of web.  From users point of view, web is vast collection of documents called web pages.  Each page may contain link to another page.  Pages are viewed with a program called browser, browser fetches a page, interpret command in it and displays page according to format.  String of text that is linked to another page is called hyperlink.
  • 25. WWW The Client Side:  Browser program at client side display the page and catches mouse clicks. When any item is selected, browser follows hyperlink and page is fetched.  In hyperlink, pages are name using URL( Uniform Resource Locator). http://www.abcd.com/product.html  URL has three parts, 1. Name of protocol (here http) used access resource. 2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com) 3. name of file containing the resource. (here product.html)
  • 26. WWW  When user clicks on hyperlink, browser carries out following series of steps to fetch the page. 1. Browser determines the URL 2. Browser asks DNS for the IP address of the server 3. DNS replies 4. The browser makes a TCP connection 5. Sends HTTP request for the page 6. Server sends the page as HTTP response 7. The TCP connection is released 8. The browser displays the page  Web pages are written in standard language like HTML, so all browser can understand it.
  • 27. WWW  Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can interpret all the data. To overcome problem, two solutions are possible. 1. plug in 2. helper application (a) A browser plug-in. (b) A helper application.
  • 28. WWW The Server Side:  The steps that server or web server performs when request from client are listed below 1. Accept a TCP connection from client 2. Get path to page, name of file requested. 3. Get the file (from disk). 4. Send contents of the file to the client. 5. Release the TCP connection.  One problem is for every file, disk access is required. Solution is to maintain cache of n most recently used files.  Modern server also performs authentication and access control task, it will first perform authentication and access control, then it will fetch file from disk.
  • 29. WWW A multithreaded Web server with a front end and processing modules.
  • 30. HTTP  The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer Protocol).  It specifies what messages Client may send to server and what response they got back in return.  Usual way to for browser to contact server is establish TCP connection with server, send request, get the reply and release connection.  HTTP 1.1, supports persistent connections, with them it is possible to send and receive multiple request, reply using single TCP connection.  Client request pages and other action on pages using various request method.
  • 31. HTTP The built-in HTTP request methods.
  • 32. HTTP  Every request gets response consist of status line and other information.  Status line contains three digit Status code. The status code response groups
  • 33. HTTP  Message header: The http methods may be followed by additional lines with more information. They are called request headers.  Responses from server may also additional information, they are called response headers.  There are several types of request and response header for various purpose.  “User-agent” header allows client to inform server about its browser, OS and other properties.  “host” header contains servers DNS name.