Unit V
Unit V
Application Layer
B. SAI BABA,VIT,BVRM
Syllabus
★ The Application Layer:
○ Domain name system
○ Electronic mail
○ World Wide Web: architectural overview
○ Dynamic web document
★ Application Layer Protocols
○ Http Protocol
○ Simple Mail Transfer Protocol
○ Simple Network Management Protocol
○ File Transfer Protocol
○ Telnet
B. SAI BABA,VIT,BVRM
- Name Servers
B. SAI BABA,VIT,BVRM
★ Every host is identified by the IP address but remembering numbers is very difficult for
people.
★ So DNS is used to convert the domain name of the websites to their numerical IP address.
B. SAI BABA,VIT,BVRM
DNS Resolver?
● To map a host_name onto an IP address, an application program calls a library procedure
called the resolver, passing it the name as a parameter.
B. SAI BABA,VIT,BVRM
Figure 7-1
B. SAI BABA,VIT,BVRM
Types of Domain:
1. Generic domains
2. Country domain
B. SAI BABA,VIT,BVRM
● Generic domains:
○ .com(commercial),
○ .edu(educational),
○ .mil(military),
○ .org(nonprofit organization),
○ .net(similar to commercial) all these are generic domains.
● Country domain:
○ .au (Australia)
○ .in (India)
○ .us (United States)
○ .uk (United Kingdom)
○ .nl ( Netherlands)
○ .jp (Japan)
B. SAI BABA,VIT,BVRM
Name Servers
B. SAI BABA,VIT,BVRM
1.User enter
example.com
in the
address bar
7.
6.
1. Users open a web browser, enter example.com in the address bar, and presses Enter button.
2. The request, for example.com is routed to a DNS resolver, which manages by the user's
Internet service provider.
3. The DNS resolver forwards the request, for example.com to a root DNS server.
4. The DNS resolver again forwards the request, for example.com, this time to one of the
TLD(Top Level Domain)name servers for .com domains. The name server for .com
domains responds to the request with the 2 or 4 name servers associated with the
example.com domain.
5. The DNS resolver chooses an example.com, the authoritative name server, and forwards
the request for example.com to that name server.
6. The website's name server looks in the example.com hosted zone for the example.com a
record, to get the associated value, such as the IP address for a web server, 34.72.102.28, and
returns the IP address to the DNS resolver.
B. SAI BABA,VIT,BVRM
7. Finally, The DNS resolver for the ISP has the IP address that the user needs. The resolver
returns that value to the web browser. The DNS resolver can store the IP address, for
example.com.
8. The web browser sends a request, for example.com using the IP address that it got from the
DNS resolver. This is where the actual content is.
9. The web server or other resource at 34.72.102.28 returns the web page, for example.com to the
web browser, and the web browser displays the page.
B. SAI BABA,VIT,BVRM
Electronic mail(e-mail)
B. SAI BABA,VIT,BVRM
★ Electronic mail, or more commonly email, is a method of exchanging messages over the
internet.
★ Electronic mail allows a message to include text, audio, and video. It also allows one
message to be sent to one or more recipients.
★ Faster and cheaper than paper mail, email has been a popular application since the early days
of the Internet.
★ E-mail systems support 5 basic functions:-
○ Composition
○ Transfer
○ Reporting
○ Displaying
○ Disposition
B. SAI BABA,VIT,BVRM
(a) Composition:
● It refers to the process of creating messages and answers. Any text editor is used for body of
the message.
● While the system itself can provide assistance with addressing and numerous header fields
attached to each message.
(b) Reporting:
● It has to do with telling the originator what happened to the message that is, whether it was
delivered, rejected (or) lost.
(c) Transfer: It refers to moving messages from originator to the recipient.
(d) Displaying: Incoming messages are to be displayed so that people can read their email.
(e) Disposition: It concerns what the recipient dose with the message after receiving it.
B. SAI BABA,VIT,BVRM
CC (Carbon Copy):
2. Message Body:
Text Content: This is the main part of the message where the sender writes the actual text. It
can include plain text or formatted text (HTML).
★ SMTP (Simple Mail Transfer Protocol) is an application layer used in sending and
receiving email.
★ SMTP is used most commonly by email clients, including Gmail, Outlook, Apple Mail and
Yahoo Mail.
SMTP Fundamentals
★ The client who wants to send the mail opens a TCP connection to the SMTP server and then
sends the mail across the connection. The SMTP server is an always-on listening mode. As
soon as it listens for a TCP connection from any client, the SMTP process initiates a
connection through port 25. After successfully establishing a TCP connection the client
process sends the mail instantly.
★ If a message cannot be delivered, an error report containing the first part of the
undeliverable message is returned to the sender.
B. SAI BABA,VIT,BVRM
SMTP Model
Mail Submission Agent(MSA) Client
(MTA)
User at
User Agent Sent mail’s queue Message
Terminal
Transfer Agent
Sender TCP
Connection
SMTP mails,replies &
commands
TCP PORT 25
(MTA)
User at
User Agent User mail box Message
Terminal
Transfer Agent
Components of SMTP
1. User Agent (MUA)
2. Mail Submission Agent (MSA)
3. Mail Transfer Agent (MTA)
4. Mail Delivery Agent (MDA)
“ World Wide Web, which is also known as a Web, is a collection of websites or web pages
stored in web servers and connected to local computers through the internet. These websites
contain text pages, digital images, audios, videos, etc. “
B. SAI BABA,VIT,BVRM
Architectural Overview
Web page:
● The Web consists of a vast, worldwide collection of content in the form of Web pages, often
just called pages for short. Each
Hypertext:
● In the context of the web, hypertext is text that contains links (hyperlinks) to other web pages.
These links are usually displayed as underlined or differently colored text and are clickable.
● The idea of having one page point to another, now called hypertext.
Web browser:
● Pages are generally viewed with a program called a browser. Firefox, Internet Explorer, and
Chrome are examples of popular browsers.
● The browser fetches the page requested, interprets the content, and displays the page,
properly formatted, on the screen.
B. SAI BABA,VIT,BVRM
B. SAI BABA,VIT,BVRM
● The basic model behind the display of pages is also shown in Fig. 7-18.
● The browser is displaying a Web page on the client machine.
● Each page is fetched by sending a request to one or more servers, which respond with the
contents of the page.
● The request-response protocol for fetching pages is a simple text-based protocol ,
called HTTP(Hypertext Transfer Protocol)that runs over TCP.
● Each page is assigned a URL (Uniform Resource Locator) that effectively serves as the
page’s worldwide name.
● URLs have three parts: (Eg: http://www.cs.washington.edu/index.html)
a. The protocol (http),
b. The DNS name of the machine on which the page is located,
(www.cs.washington.edu)
c. The path uniquely indicating the specific page (index.html)
B. SAI BABA,VIT,BVRM
Client Side:
1. The browser determines the URL (by seeing what was selected).
2. The browser asks DNS for the IP address of the server www.cs.washington.edu.
3. DNS replies with 128.208.3.88.
4. The browser makes a TCP connection to 128.208.3.88 on port 80, the well-known port for
the HTTP protocol.
5. It sends over an HTTP request asking for the page /index.html.
6. The www.cs.washington.edu server sends the page as an HTTP response, for example, by
sending the file /index.html
B. SAI BABA,VIT,BVRM
2. Get the path to the page, which is the name of the file requested.
● HTTP (HyperText Transfer Protocol), the protocol that is used to transport all this
● It specifies what messages clients may send to servers and what responses they get back in
return.
B. SAI BABA,VIT,BVRM
1. Non-Persistent Connection
2. Persistent Connection
3. Pipelined Connection
B. SAI BABA,VIT,BVRM
3. Pipelined Connection:
● HTTP pipelining is a feature that allows multiple HTTP HTTP Request
HTTP
requests to be sent to the server without waiting for Response
● SNMP is a widely used protocol that is enabled on a wide range of operating systems,
including Windows Server, Linux servers, and network devices such as routers and
switches.
● SNMP is an essential part of network management and plays a crucial role in ensuring the
reliability and performance of networked systems.
● On a target system, SNMP enumeration is used to list user accounts, passwords, groups,
system names, and devices.
B. SAI BABA,VIT,BVRM
Understand SNMP
SNMP consists of 3 items:
1. SNMP Manager (sometimes called Network Management System – NMS): a software runs
on the device of the network administrator (in most case, a computer) to monitor the
network.
2. SNMP Agent: a software runs on network devices that we want to monitor (router, switch,
server…).
3. Management Information Base (MIB): is the collection of managed objects. This
components makes sure that the data exchange between the manager and the agent remains
structured. In other words, MIB contains a set of questions that the SNMP Manager can ask
the Agent (and the Agent can understand them).
MIB is commonly shared between the Agent and Manager.
B. SAI BABA,VIT,BVRM
MIB
For example, in the topology above you want to monitor a router, a server and a Multilayer Switch. You
can run SNMP Agent on all of them. Then on a PC you install a SNMP Manager software to receive
monitoring information. SNMP is the protocol running between the Manager and Agent. SNMP
communication between Manager and Agent takes place in form of messages. The monitoring process
must be done via a MIB which is a standardized database and it contains parameters/objects to describe
these networking devices (like IP addresses, interfaces, CPU utilization, …). Therefore the monitoring
process now becomes the process of GET and SET the information from the MIB.
B. SAI BABA,VIT,BVRM
SNMP Messages
SNMP Messages are used to communicate between the SNMP Manager and Agents.
SNMP supports five basic SNMP messages:
1. SNMP GET
2. SNMP GET-NEXT
3. SNMP GET-RESPONSE
4. SNMP SET
5. SNMP TRAP
B. SAI BABA,VIT,BVRM
FTP
SFTP
TFTP
B. SAI BABA,VIT,BVRM
TELNET
B. SAI BABA,VIT,BVRM
What is Telnet?
● It is Command-line tool(Test-Oriented) to access the remote system.
● TErminaL NETwork, which is developed in 1969.
● TELNET follows Client-server architecture.
● Uses PORT 23
● It is Fast protocol
● Cross-platform
○ We can use TELNET in any operating system like Windows,Linux,Mac.etc.
Disadvantages :
● Not Secure (i.e Whatever the information transmitted from client and server is in the
form of clear text)
B. SAI BABA,VIT,BVRM
● TELNET is basically the short form for TErminal NETwork.It is basically a TCP/IP protocol
that is used for virtual terminal services and was mainly proposed by International
Organization for Standards(ISO).
● It is a general-purpose client/server application program.
● This program enables the establishment of the connection to the remote system in such a way
that the local system starts to appear as a terminal at the remote system.
● It is a standard TCP/IP protocol that is used for virtual terminal service.
● In simple words, we can say that the telnet allows the user to log on to a remote
computer. After logging on the user can use the services of the remote computer and
then can transfer the results back to the local computer.
● The TELNET was mainly designed at the time when most operating systems operate in the
time-sharing environment. And in this type of environment, a large computer can support
multiple users.
● Usually, the interaction between the computer and user occurs via terminal(It is a combination
of keyboard, mouse, and monitor).
● TELNET makes the use of only one TCP/IP connection.
B. SAI BABA,VIT,BVRM
Logging
● The logging process can be further categorized into two parts:
○ Local Login
○ Remote Login
● Local Login: Whenever a user logs into its local system, it is known as local login.
Local Login
B. SAI BABA,VIT,BVRM
2. Remote Login:
● Remote Login is a process in which users can log in to a remote site i.e. computer and use
services that are available on the remote computer.
● With the help of remote login, a user is able to understand the result of transferring the result
of processing from the remote computer to the local computer.
B. SAI BABA,VIT,BVRM
3 5
6 8
2
4
1