Unit-5 Updated
Unit-5 Updated
APPLICATION LAYER
Unit: 5
Computer Network
(ACSE0602) Bhawna Khullar
(Assistant Professor)
B Tech (CSE) 6th Sem ECE
Department
Department of
Electronics and Communication Engineering
• Text Books:
1. B. A. Forouzan, “Data Communications and Networking”, 5th Edition,
TMH, 2017.
• Reference Books:
1. S. Tanenbaum, “Computer Networks”, 4th Edition, Pearson, 2013.
2. W. Stallings, “Data and Computer Communication”, 8th Edition, Pearson,
2007.
CO2
Understand the basic concepts of link layer properties to detect error and
develop the solution for error control and flow control
CO3 Design, calculate, and apply subnet masks and addresses to fulfil networking
requirements and calculate distance among routers in subne
CO4 Understand the duties of transport layer, Session layer with connection
management of TCP protocol
CO5
Discuss the different protocols used at application layer
1. Engineering knowledge
2. Problem analysis
3. Design/development of solutions
4. Conduct investigations of complex problems
5. Modern tool usage
6. The engineer and society
7. Environment and sustainability
8. Ethics
9. Individual and team work
10. Communication
11. Project management and finance
12. Life-long learning
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO-1 3 2 2 2 2 2 3
CO-2 3 3 2 3
CO-3 3 3 3 3 2 2 2 3
CO-4 3 2 2 2 3
CO-5 3 3 2 2 3 2 3
CO-6 3 2 2 2 2 2 2 2 2 3
Course Outcome
Program Specific
Outcomes CO1 CO2 CO3 CO4 C05
2 2 2 2 2
PSO1
2 2 2 2
PSO2 2
2 2 2 3 2
PSO3
AVERAGE 2 2 2 2.3 2
PEO 3:To have an effective communication skills, professional attitude, ethical values and
a desire to learn specific knowledge in emerging trends, technologies for research,
innovation and product development and contribution to society.
PEO 4: To have life-long learning for up-skilling and re-skilling for successful
professional career as engineer, scientist, entrepreneur and bureaucrat for betterment of
society.
Bhawna Khullar ACSE0602 Computer Networks 5
06/28/2024 12
Result Analysis
Point-to-Point Protocol
Presentation
layer
Network
Translation Security Authentication compression
Encryption
/Decryption
Objective: Study about basic concept of Network security and Cryptography and different
types of encryption algorithms
• The DNS protocol allows for the dynamic translation of a domain name into
the correct IP address.
• The DNS protocol communications using a single format called a message.
• The DNS protocol uses a hierarchical system, with the root at the top
and branches below. The naming structure is broken down into
small, manageable zones.
• Each DNS server is only responsible for managing name-to-IP mappings
for that small portion of the DNS structure.
• Requests for zones not stored in a specific DNS server are forwarded to
other servers for translation.
• Top-level domains represent either the
type of domain or the country of origin.
Examples of top-level domains are:
o .com - a business or industry
o .org - a non-profit organization
o .au - Australia
o .co - Colombia
3. DNS implements a distributed database to store the name of all the hosts
available on the internet.
• A DHCP client goes through the following basic steps to request an IP:
o The client broadcasts a DHCPDISCOVER.
o A DHCP server replies with a DHCPOFFER message
o The client sends a DHCPREQUEST message to the server it wants to
use (in case of multiple offers).
• A client may also choose to request an address that it had
previously been allocated by the server.
• The server returns a DHCPACK
message to confirm the lease has
been finalized.
The World Wide Web (WWW) operates primarily at the application layer of the Internet
protocol suite. This layer is responsible for providing network services directly to end-
users or applications. Here's how the WWW operates within the application layer:
HTTP Protocol
Web Browsers
Web Servers
Hyperlinks
• HTTP
o Is a request/response protocol.
o Has three common message types: GET, POST,
PUT.
o Is not secure. Messages can be intercepted.
• HTTPS uses authentication and
encryption to secure data.
• FTP was developed to allow the transfer of files over the network.
• An FTP client is an application that runs on a client computer used
to push and pull data from an FTP server.
• FTP requires two connections between the client and the server:
one connection for commands and replies and another connection
for the actual file transfer.
• The client initiates and establishes the
first connection to the server for
control traffic on TCP port 21.
• The client then establishes the second
connection to the server for the
actual data transfer on TCP port 20.
• The client can download (pull) data
from
the server or upload (push) data to
the server.
• E-mail Header
The first five lines of an E-mail message is called E-mail header. The
header part comprises of following fields:
From
Date
To
Subject
CC
BCC
IMAP: IMAP stands for Internet Mail Access Protocol. It was first
proposed in 1986. There exist five versions of IMAP as follows:
• Original IMAP
• IMAP2
• IMAP3
• IMAP2bis
• IMAP4
Key Points:
• IMAP allows the client program to manipulate the e-mail message
on the server without downloading them on the local computer.
• The e-mail is hold and maintained by the remote server.
POP:
• POP stands for Post Office Protocol. It is generally used to support a
single client. There are several versions of POP but the POP 3 is the
current standard.
Key Points
• POP is an application layer internet standard protocol.
• Since POP supports offline access to the messages, thus requires less
internet usage time.
• POP does not allow search facility.
• In order to access the messaged, it is necessary to download them.
• It allows only one mailbox to be created on server.
• It is not suitable for accessing non mail data
Bhawna Khullar ACSE0602 Computer
06/28/2024 48
Networks 5
E-mail System(CO5)
Email working follows the client server approach. In this client is the
mailer i.e. the mail application or mail program and server is a device
that manages emails.
Following example will take you through the basic steps involved in
sending and receiving emails and will give you a better understanding
of working of email system:
• Suppose person A wants to send an email message to person B.
• Person A composes the messages using a mailer program i.e. mail
client and then select Send option.
• The message is routed to Simple Mail Transfer Protocol to person B’s
mail server.
• The mail server stores the email message on disk in an area
designated for person B.
Bhawna Khullar ACSE0602 Computer
06/28/2024 50
Networks 5
Remote login
Remote login, also known as remote access, allows users to access and
interact with a computer or network from a remote location. This
functionality operates primarily at the application layer of the OSI
model. Here's how remote login works at the application layer:
• Protocols
• Client-Server Communication
• Authentication
• Session Establishment
• Data Transmission
• Encryption
• Session Termination
Bhawna Khullar ACSE0602 Computer
06/28/2024 51
Networks 5
Attacks with relation to security goals
Traffic analysis :
Traffic analysis is the process of intercepting and examining messages
in order to deduce information from patterns in communication, which
can be performed even when the messages are encrypted.
Eg. Military Intelligence
Replaying:
Replay attacks are the network attacks in which an attacker spies the
conversation between the sender and receiver and takes the
authenticated information e.g. sharing key and then contact to the
receiver with that key.
A repudiation attack occurs when the user denies the fact that he or she
has performed a certain action or has initiated a transaction. ... The
attacker plans to gain easy access to a computer system and gain control
Decryption : converting cipher msg to original msg (at the receiver side)
Plaintext Plaintext
e n emy a t t a c k s t o n i g h t z e n emy a t t a c k s t o n i g h t z
e n e m y e n e m y
a t t a c a t t a c
k s t o n k s t o n
i g h t z i g h t z
E E M Y N E E M Y N
T A A C T T A A C T
T K O N S T K O N S
H I T Z G H I T Z G
Read column by column Write column by column
E T T H E AK I MAO T Y C N Z N T S G E T T H E AK I MAO T Y C N Z N T S G
Ciphertext Ciphertext
Transmission
06/28/2024 Bhawna Khullar ACSE0602 Co 62
mputer Networks 5
Asymmetric-key
In asymmetric-key cryptography, the secret is personal (unshared); each
person creates and keeps his or her own secret.
In a community of n people, n (n - 1)/2 shared secrets are needed for symmetric key
cryptography; only n personal secrets are needed in asymmetric-key cryptography.
Asymmetric key cryptography uses two separate keys: one private and one public.
Objective: Study about basic concept Application layer and its function
An application layer allows a user to log on to a remote host. The user's computer
talks to the software terminal, which in turn, talks to the host. The remote host
thinks that it is communicating with one of its own terminals, so it allows the user
to log on.
3.Addressing:
4.Mail Services:
Objective: Study about basic concept of Client Server & Peer to Peer model and it uses
• The client initiates the exchange by requesting data from the server.
• The server responds by sending one or more
streams of data to the client.
• Application layer protocols describe the format
of the requests and responses between clients
and servers.
• The contents of the data exchange will depend
of the application in use.
• Email is an example of a Client-Server
interaction.
• Mechanism of FTP
The above figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process, and data
transfer process. The server has two components: the server control
process and the server data transfer process
Bhawna Khullar ACSE0602 Computer Networks
06/28/2024 71
5
FTP (File transfer Protocol)(CO5)
FTP Clients
• FTP client is a program that implements a file transfer protocol
which allows you to transfer files between two hosts on the internet.
• It allows a user to connect to a remote host and upload or download
the files.
• It has a set of commands that we can use to connect to a host,
transfer the files between you and your host and close the
connection.
• The FTP program is also available as a built-in component in a Web
browser. This GUI based FTP client makes the file transfer very
easy and also does not require to remember the FTP commands
Objectives of FTP
•It provides the sharing of files.
•It is used to encourage the use of remote computers.
•It transfers the data more reliably and efficiently
Advantages of FTP:
•Speed: One of the biggest advantages of FTP is speed. The FTP is one of
the fastest way to transfer the files from one computer to another
computer.
•Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
Security: To access the FTP server, we need to login with the username
and password. Therefore, we can say that FTP is more secure
Disadvantages of FTP:
• The standard requirement of the industry is that all the FTP
transmissions should be encrypted. However, not all the FTP
providers are equal and not all the providers offer encryption. So, we
will have to look out for the FTP providers that provide encryption.
• FTP serves two operations, i.e., to send and receive large files on a
network. However, the size limit of the file is 2GB that can be sent.
It also doesn't allow you to run simultaneous transfers to multiple
receivers.
• Passwords and file contents are sent in clear text that allows
unwanted eavesdropping. So, it is quite possible that attackers can
carry out the brute force attack by trying to guess the FTP password.
• It is not compatible with every system
• Developed in the early 1970’s – among the oldest of the application layer
protocols and services in the TCP/IP protocol suite.
• Allows users to follow text-based terminal devices over the network using
software.
• A connection is known as a ‘virtual terminal (vty)’ session.
• Can be run from the command prompt on a PC.
• You can use the device as if you were sitting there with all the rights and
priorities that you username will offer you.
• TELNET requires a login name and password, it is vulnerable to hacking
because it sends all data including the password in plaintext (not encrypted).
A hacker can eavesdrop and obtain the logging name and password.
Because of this security issue, the use of TELNET has diminished in favor
of another protocol, Secure Shell (SSH).
1. Transport layer aggregates data from different applications into a single stream
before passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
6. Transport layer aggregates data from different applications into a single stream before
passing it to:
A. network layer
B. data link layer
C. application layer
D. physical layer
Bhawna Khullar ACSE0602
06/28/2024 Computer Networks 5 80
Weekly Assignment
2. Define TCP.
The Data Connection uses very complex rules as data types may
vary.
https://www.youtube.com/watch?v=VdHFk39GEZ0
3. What is the difference between a user agent (UA) and a mail transfer
agent? (MTA)?
https://www.youtube.com/watch?v=nP-p4R5Y55I
https://www.youtube.com/watch?v=6jKGSthvIjY
Decryption : converting cipher msg to original msg (at the receiver side)
Plaintext Plaintext
e n emy a t t a c k s t o n i g h t z e n emy a t t a c k s t o n i g h t z
e n e m y e n e m y
a t t a c a t t a c
k s t o n k s t o n
i g h t z i g h t z
E E M Y N E E M Y N
T A A C T T A A C T
T K O N S T K O N S
H I T Z G H I T Z G
Read column by column Write column by column
E T T H E AK I MAO T Y C N Z N T S G E T T H E AK I MAO T Y C N Z N T S G
Ciphertext Ciphertext
Transmission
06/28/2024 Bhawna Khullar ACSE0602 Co 93
mputer Networks 5
Cryptography(CO5)
Cryptanalysis:
• The process of attempting to discover X or K or both is known as
cryptanalysis. The strategy used by the cryptanalysis depends on
the nature of the encryption scheme and the information available
to the cryptanalyst. There are various types of cryptanalytic attacks
based on the amount of information known to the cryptanalyst.
Cryptographic Attacks
• Passive Attacks
• Active attacks
• Symmetric Cryptography
Symmetric encryption is a technique which allows the use of only
one key for performing both the encryption and the decryption of
the message shared over the internet. It is also known as the
conventional method used for encryption.
• Asymmetric Cryptography:
Asymmetric encryption is an encryption technique that uses a pair of
key (private key and public key) for encryption and decryption.
Asymmetric encryption uses the public key for the encryption of the
message and the private key for the decryption of the message. The
public key is freely available to anyone who is interested in sending
the message.
• The number of objects in a Web page which consists of 4 jpeg images and HTML text
is ________
a) 4
b) 1
c) 5
d) 7
https://www.youtube.com/watch?v=y4KoiJmr8gE
https://www.youtube.com/watch?v=pnoWCK82apU
• Active Attacks
An active attack is a network exploit in which attacker attempts to
make changes to data on the target or data en route to the target.
• Passive Attacks
A passive attack is a network attack in which a system is monitored
and sometimes scanned for open ports and vulnerabilities, but does
not affect system resources.
https://www.youtube.com/watch?v=y4KoiJmr8gE
https://www.youtube.com/watch?v=pnoWCK82apU
• https://www.youtube.com/watch?v=lCy_KUfhBbw
• https://www.youtube.com/watch?v=fTPbiedSGMw
• https://www.youtube.com/watch?v=y4KoiJmr8gE
• https://www.youtube.com/watch?v=pnoWCK82apU
• https://www.youtube.com/watch?v=VdHFk39GEZ0
14. Which of the following among the below mentioned protocols provides a
mechanism of acquiring an IP address?
a) BOOTP
b) DHCP
c) Both a & b
d) None of the above
Answer:b
Bhawna Khullar ACSE0602
06/28/2024 Computer Networks 5 123
MCQs
• The number of objects in a Web page which consists of 4 jpeg images and
HTML text is ________
• https://firstranker.com/fr.php/frdA290120A17171122/downlo
ad-aktu-b-tech-6th-sem-2018-2019-KCS603-computer-networ
k-question-paper
• ACSE0602 CN.docx (sharepoint.com)