Professional Documents
Culture Documents
Computer Networks: Application Layer
Computer Networks: Application Layer
Computer Networks: Application Layer
NETWORKS
APPLICATION LAYER
-KRATI CHORDIA(18BCE10142)
APPLICATION LAYER
• E-mail
• web
• text messaging
• remote login
• P2P file sharing multi-user network games streaming stored video (YouTube,
Netflix)
• voice over IP (Skype)
• • real-time video conferencing social networking search
WEB
• Server
• Always on host
• Permanent IP address
• Data centers for scaling
• Clients
• Communicate with server
• May be intermittently connected
• May have dynamic IP addresses
• Do not communicate directly with each other
FILE TRANSFER
PROTOCOL(FTP)
FILE TRANSFER PROTOCOL (FTP)
• File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for
copying a file from one host to another.
• The problems of different name conventions, different ways to represent text
and data, different directory structures is resolved using FTP in a simple and
elegant manner.
• FTP establishes two connections between the hosts. One connection is used
for data transfer, the other for control information (commands and responses).
• Separation of commands and data transfer makes FTP more efficient.
FILE TRANSFER PROTOCOL (FTP)
• The client has three components: user interface, client control process,
and the client data transfer process.
• The server has two components: the server control process and the
server data transfer process.
• The control connection is made between the control processes.
• The data connection is made between the data transfer processes.
FILE TRANSFER PROTOCOL (FTP)
FILE TRANSFER PROTOCOL (FTP)
E-MAIL
E-MAIL
• When the sender and the receiver of an e-mail are on the same
system, we need only two user agents.
4 SCENARIOS OF E-MAIL- SCENARIO 2
• When the sender is connected to the mail server via a LAN or a WAN,
we need two VAs and two parts of MTAs (client and server).
4 SCENARIOS OF E-MAIL- SCENARIO 4
• The DNS client program sends a request to a DNS server to map the e-
mail address to the corresponding IP address.
• To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the
connection of a host to the Internet. However, people prefer to use names instead of
numeric addresses. Therefore, we need a system that can map a name to an address or an
address to a name.
DOMAIN NAME SYSTEM(DNS)
• When the Internet was small, mapping was done by using a host file.
• The host file had only two columns: name and address.
• Every host could store the host file on its disk and update it periodically from a master
host file.
• When a program or a user wanted to map a name to an address, the host consulted the
host file and found the mapping.
• Today, however, it is impossible to have one single host file to relate every address with a
name and vice versa. The host file would be too large to store in every host. In addition, it
would be impossible to update all the host files every time there was a change.
DOMAIN NAME SYSTEM(DNS)
• One solution would be to store the entire host file in a single computer and allow access
to this centralized information to every computer that needs mapping. But we know that
this would create a huge amount of traffic on the Internet.
• Another solution, the one used today, is to divide this huge amount of information into
smaller parts and store each part on a different computer.
• In this method, the host that needs mapping can contact the closest computer holding the
needed information. This method is used by the Domain Name System (DNS).
NAME SPACE
• LABEL:
• Each node in the tree has a label, which is a string with a maximum of 63
characters.
• The root label is a null string (empty string).
• DNS requires that children of a node (nodes that branch from the same node)
have different labels, which guarantees the uniqueness of the domain
names.
• Domain Name
• Each node in the tree has a domain name.
• A full domain name is a sequence of labels separated by dots (.).
• The domain names are always read from the node up to the root.
• The last label is the label of the root (null). This means that a full domain
name always ends in a null label, which means the last character is a dot
because the null string is nothing.
DOMAIN
• very inefficient and also unreliable to have just one computer store the
information contained in the domain name.
• HEIRARCHY OF NAME SERVERS
• ZONES
HIERARCHY OF NAME SPACE
• Generic Domains
• Country Domains
• Inverse Domains
GENERIC DOMAINS
COUNTRY DOMAINS
• Manager
• Agent
• Network Management System(NMS)
SNMP ARCHITECTURE
• SMI defines rules for naming objects, defining object types, and
showing how to encode object types and data
• Agent will receives request on UDP port no. 181 and manager will send
request on UDP port no.
• 161 Manager receives notifications from agent on port no. 162 that
called trap event.
SNMP VERSIONS
• SNMPv1
• Has poor security
• SNMPv2
• V2 has improved security, confidentiality. It introduces GetBulkRequest and
Inform Request
SNMP PDU