SlideShare uma empresa Scribd logo
1 de 79
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 5
Application Layer
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Traditional applications
• Electronic Mail
• SMTP – Simple Mail Transfer Protocol
• POP 3
• IMAP
• MIME
• HTTP – Hyper Text Transfer Protocol
• Web Services
• DNS – Domain Name System
• SNMP – Simple Network Management Protocol
Application Layer
Introduction
• Applications – that are given to the END
USER.
• Every application is developed for a purpose
and have its own style of working
Apps available
That’s is not ALL.
Traditional Applications
• Among all the applications our study focuses on 2 main traditional
applications. They are :
Reason for Traditional Applications
• We call these application as traditional application because they existed
since the early days of computer networks.
Before starting the Topic…
• There are 3 general points that have to be made clear.
1. Distinguish between the Application Program and Application Protocols
2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called
simple because it only specifies the procedure, format is taken care by companion
protocol)
3. Each protocol will have a companion protocol which defines the format of the contents.
Distinguish between the Application Program and Application
Protocols
• example
Each protocol reinvents the Simple Remote procedure call (RPC)
mechanism
• Remote Procedure Call (RPC) is a protocol that one program can use to request a
service from a program located in another computer in a network without having
to understand network details. (A procedure call is also sometimes known as a
function call or a subroutine call.)
• RPC uses the client/server model.
RPC Mechanism
• Most of the application programs works on Query – Respond Principle.
• This RPC specifies, which mechanism to be followed to fetch information
from the source.
Each protocol will have a companion protocol
• This companion protocol specifies the format of the information to be
exchanged.
overview
• Application Program:
• Which is available to the end user
without knowing any knowledge
about the network.
• Application Protocol:
• Which specifies the RPC
mechanism to fetch information
available at remotely located
systems.
• Companion Protocol:
• Which specifies the format
of the data that are to be
exchanged.
Electronic Mail
E - Mail
• This is the one of the oldest applications.
• It is mandatory to distinguish between the User Interface – Transfer
Protocols – Companion Protocol
What happens when you press
Send Button
EMAIL CLIENT
MIME
EMAIL CLIENT
E - Mail
• Message Format – MIME
• Message Transfer – SMTP
• Mail Reader – POP / IMAP
Format of an E Mail
Message Format
• Message format is defined by the companion protocols. Two majorly used
protocols are given below.
• RFC 822 - Standard for the format of ARPA Internet text messages
• MIME - Multipurpose Internet Mail Extensions.
RFC 822
• This defines 2 parts
• Header
• Body
• Few headers are obtained by the user.
• Ex:
• TO address
• CC address
• BCC address
• Sub Text
• Few headers are added automatically by the program
• Ex:
• From Address
• Mail Server
• Date and Time
Syntax:
<Header Type> : <Header Value>
MIME
• Multipurpose Internet Mail Extensions.
• This is an supplementary protocol that allows Non ASCII data to be sent through E Mail
• This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
MIME Headers
• MIME mainly consists of 5 header:
• MIME - Version
• Content type
• Content transfer encoding
• Content ID
• Content Description
MIME Headers
Data types and subtypes in MIME
Content Transfer Encoding
Message Transfer
Introduction
• Once the mails are composed they are transferred to the destination using
Mail Transfer Protocols.
• Some of the popular Mail Transfer Protocols are
• SMTP – Simple Mail Transfer Protocol
• POP – Post Office Protocol
• IMAP – Internet Message Access Protocol
SMTP
• The actual mail transfer is done through the Mail Transfer Agents.
• The protocol that defines the MTA Client and Server is called SMTP.
• SMTP is used 2 Times
• Between sender and mail server.
• Between 2 mail servers.
• SMTP simply defines how commands and responses must be sent back
and forth.
SMTP Commands
SMTP Responses
Connection Establishment
Mail Transfer
Connection Termination
Message Reader / Message Access
Introduction
• SMPT is not involved in the third stage because SMTP is a Push Protocol.
• It pushes the message from the client to the server.
• The third stage need the Pull Protocol.
• The client must pull message from the server.
• Two of the popularly used message access agents are POP3 and IMAP
POP 3
• Post Office Protocol Version 3 (POP 3)
• Client POP 3 will be installed in the recipient’s computer and the server POP 3
is installed at the server.
• Message access will be initiated when the user wants to download the mail from
the server.
Modes of POP 3
• POP 3 have 2 modes
• Delete Mode
• In this mode, the mail is deleted from the mailbox after each retrieval.
• Keep Mode
• In this mode, the mail is kept is the personal computer for future access.
Exchange of Commands and Responses in POP 3
IMAP 4
• Internet Mail Access Protocol, Version 4
• IMAP 4 is similar to the POP 3 but with added features.
• The features are:
• A user can check the email header prior to downloading.
• A user can search the content of the email for a specific string
• A user can download partial email due to bandwidth constraints.
• User can create delete or rename mail boxes
• User can create hierarchy of mail boxes.
POP 3 Vs IMAP 4
My Official Account – POP 3 Setting
My Official account - IMAP Settings
MY Personal Account
Video Presentation on E - Mail
End
of
E - Mail
World Wide Web - WWW
Introduction
• The WWW is a repository of information
linked together from points all over the
world.
• The original goal of the web was to find a way to organize and retrieve information about
hyper linked documents.
• WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed
shortly)
WWW Architecture
Clients (Browsers)
1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents.
2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc.,
3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content
CLIENT
(BROWSERS)
 There are variety of browsers available that interprets and displays
a web document.
 Every client consists of three parts
Clients (Browsers)
Server
• The webpage is stored at the server
• Each time the request is received the corresponding document
is sent to the client.
• The server can be more efficient by enabling “Multithreading”
(Answering Multiple requests)
URL – Uniform Resource Locator
• When a page needs to be accessed it must have a address.
• HTTP uses locators to access the webpages available at widely distributed areas.
• URL is a standard for specifying any kind of information on the internet.
• URL defines 4 Important things:
Example URL
HTTP – Hyper Text Transfer Protocol
Introduction
• The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the
world wide web.
• HTTP is the combination of FTP and SMTP.
• It is like FTP because it uses TCP Connection.
• It is like SMTP because data transferred between the server and client looks like
SMTP messages.
HTTP Transaction
• The client initiates the transaction by sending a request message and the
server replies through an response message.
Formats of Request and Response Messages
Request Line and Status Line
Request Type
Status Code
• This field indicates the status of the request through codes.
• Codes in the range of
• 100  informational
• 200  Successful Request
• 300  Redirect the client to another URL
• 400  Error at client
• 500  Error at server
Status Codes and their Phrases
Contd..
Header
• The format of the header is shown in the figure.
• The request header and Response header have different values.
Request Header
Response Header
End
of
HTTP
Web Services
End
of
Web Services
Domain Name System - DNS
End
of
DNS
Simple Network Management Protocol - SNMP
End
of
SNMP

Mais conteúdo relacionado

Mais procurados

Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 

Mais procurados (20)

Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Data link layer
Data link layerData link layer
Data link layer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Transport layer
Transport layer Transport layer
Transport layer
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Rarp
RarpRarp
Rarp
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Snmp
SnmpSnmp
Snmp
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 

Semelhante a Computer networks unit v

Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocolAnagha Ghotkar
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network servicesAtika Zaimi
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.pptMohammed Ilyas
 
Standard client server protocol.pptx
Standard client server protocol.pptxStandard client server protocol.pptx
Standard client server protocol.pptxNavanathDarwante1
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolMaitree Patel
 

Semelhante a Computer networks unit v (20)

Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
E mail flow
E mail flowE mail flow
E mail flow
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Email
EmailEmail
Email
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
The Internet
The InternetThe Internet
The Internet
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
how email works
how email workshow email works
how email works
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Standard client server protocol.pptx
Standard client server protocol.pptxStandard client server protocol.pptx
Standard client server protocol.pptx
 
Email
EmailEmail
Email
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Http
HttpHttp
Http
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 

Mais de JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 

Mais de JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Último

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 

Último (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 

Computer networks unit v

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 5 Application Layer Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Traditional applications • Electronic Mail • SMTP – Simple Mail Transfer Protocol • POP 3 • IMAP • MIME • HTTP – Hyper Text Transfer Protocol • Web Services • DNS – Domain Name System • SNMP – Simple Network Management Protocol
  • 5. Introduction • Applications – that are given to the END USER. • Every application is developed for a purpose and have its own style of working
  • 8. Traditional Applications • Among all the applications our study focuses on 2 main traditional applications. They are :
  • 9. Reason for Traditional Applications • We call these application as traditional application because they existed since the early days of computer networks.
  • 10. Before starting the Topic… • There are 3 general points that have to be made clear. 1. Distinguish between the Application Program and Application Protocols 2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called simple because it only specifies the procedure, format is taken care by companion protocol) 3. Each protocol will have a companion protocol which defines the format of the contents.
  • 11. Distinguish between the Application Program and Application Protocols • example
  • 12. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism • Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details. (A procedure call is also sometimes known as a function call or a subroutine call.) • RPC uses the client/server model.
  • 14. • Most of the application programs works on Query – Respond Principle. • This RPC specifies, which mechanism to be followed to fetch information from the source.
  • 15. Each protocol will have a companion protocol • This companion protocol specifies the format of the information to be exchanged.
  • 16. overview • Application Program: • Which is available to the end user without knowing any knowledge about the network. • Application Protocol: • Which specifies the RPC mechanism to fetch information available at remotely located systems. • Companion Protocol: • Which specifies the format of the data that are to be exchanged.
  • 17.
  • 19. E - Mail • This is the one of the oldest applications. • It is mandatory to distinguish between the User Interface – Transfer Protocols – Companion Protocol
  • 20. What happens when you press Send Button EMAIL CLIENT MIME EMAIL CLIENT
  • 21. E - Mail • Message Format – MIME • Message Transfer – SMTP • Mail Reader – POP / IMAP
  • 22. Format of an E Mail
  • 23. Message Format • Message format is defined by the companion protocols. Two majorly used protocols are given below. • RFC 822 - Standard for the format of ARPA Internet text messages • MIME - Multipurpose Internet Mail Extensions.
  • 24. RFC 822 • This defines 2 parts • Header • Body
  • 25. • Few headers are obtained by the user. • Ex: • TO address • CC address • BCC address • Sub Text • Few headers are added automatically by the program • Ex: • From Address • Mail Server • Date and Time Syntax: <Header Type> : <Header Value>
  • 26. MIME • Multipurpose Internet Mail Extensions. • This is an supplementary protocol that allows Non ASCII data to be sent through E Mail • This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
  • 27. MIME Headers • MIME mainly consists of 5 header: • MIME - Version • Content type • Content transfer encoding • Content ID • Content Description
  • 29. Data types and subtypes in MIME
  • 31.
  • 33. Introduction • Once the mails are composed they are transferred to the destination using Mail Transfer Protocols. • Some of the popular Mail Transfer Protocols are • SMTP – Simple Mail Transfer Protocol • POP – Post Office Protocol • IMAP – Internet Message Access Protocol
  • 34. SMTP • The actual mail transfer is done through the Mail Transfer Agents. • The protocol that defines the MTA Client and Server is called SMTP. • SMTP is used 2 Times • Between sender and mail server. • Between 2 mail servers.
  • 35. • SMTP simply defines how commands and responses must be sent back and forth.
  • 41. Message Reader / Message Access
  • 42. Introduction • SMPT is not involved in the third stage because SMTP is a Push Protocol. • It pushes the message from the client to the server. • The third stage need the Pull Protocol. • The client must pull message from the server. • Two of the popularly used message access agents are POP3 and IMAP
  • 43. POP 3 • Post Office Protocol Version 3 (POP 3) • Client POP 3 will be installed in the recipient’s computer and the server POP 3 is installed at the server. • Message access will be initiated when the user wants to download the mail from the server.
  • 44. Modes of POP 3 • POP 3 have 2 modes • Delete Mode • In this mode, the mail is deleted from the mailbox after each retrieval. • Keep Mode • In this mode, the mail is kept is the personal computer for future access.
  • 45. Exchange of Commands and Responses in POP 3
  • 46. IMAP 4 • Internet Mail Access Protocol, Version 4 • IMAP 4 is similar to the POP 3 but with added features. • The features are: • A user can check the email header prior to downloading. • A user can search the content of the email for a specific string • A user can download partial email due to bandwidth constraints. • User can create delete or rename mail boxes • User can create hierarchy of mail boxes.
  • 47. POP 3 Vs IMAP 4
  • 48. My Official Account – POP 3 Setting
  • 49. My Official account - IMAP Settings
  • 53. World Wide Web - WWW
  • 54. Introduction • The WWW is a repository of information linked together from points all over the world. • The original goal of the web was to find a way to organize and retrieve information about hyper linked documents. • WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed shortly)
  • 56. Clients (Browsers) 1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents. 2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc., 3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content CLIENT (BROWSERS)  There are variety of browsers available that interprets and displays a web document.  Every client consists of three parts
  • 58. Server • The webpage is stored at the server • Each time the request is received the corresponding document is sent to the client. • The server can be more efficient by enabling “Multithreading” (Answering Multiple requests)
  • 59. URL – Uniform Resource Locator • When a page needs to be accessed it must have a address. • HTTP uses locators to access the webpages available at widely distributed areas. • URL is a standard for specifying any kind of information on the internet. • URL defines 4 Important things:
  • 61. HTTP – Hyper Text Transfer Protocol
  • 62. Introduction • The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the world wide web. • HTTP is the combination of FTP and SMTP. • It is like FTP because it uses TCP Connection. • It is like SMTP because data transferred between the server and client looks like SMTP messages.
  • 63. HTTP Transaction • The client initiates the transaction by sending a request message and the server replies through an response message.
  • 64. Formats of Request and Response Messages
  • 65. Request Line and Status Line
  • 67. Status Code • This field indicates the status of the request through codes. • Codes in the range of • 100  informational • 200  Successful Request • 300  Redirect the client to another URL • 400  Error at client • 500  Error at server
  • 68. Status Codes and their Phrases
  • 70. Header • The format of the header is shown in the figure. • The request header and Response header have different values.
  • 78. Simple Network Management Protocol - SNMP