THE APPLICATION LAYER
DNS- Domain Name System
 Every host in internet can be accessed using IP address, but it very difficult for humans
to remember IP address of each host, he needs to contact.
 As a solution, host are gives names, humans can access host using name.
 Naming scheme is hierarchical, domain based naming scheme.
 To manage large number of named, internet authority have managed it like postal
system. In postal system, each address consist of country, state, city, street etc.
 Names of host are also according some hierarchy.
 Conceptually, internet is divided into top 200 domain, similarly like country in postal
system.
 Each domain is partitioned into subdomains and these are further partitioned. This is
similar to states in country, and cities in state.
 This naming system can be represented by tree.
Domain Name Space
A portion of the Internet domain name space.
Domain Name System
 Getting a second level domain, such as name-of-company.com is easy.
 It just requires registration of the name with the authority of the top level domain.
 Domains are named by path from it to root in upward direction.
 Domain names are case insensitive. Each component can contain up to 63 character
and full path name must not exceed 255 characters.
 Each domain can create sub domain within it.
 Domain can contain single host or multiple host within it.
Domain Name Server
 Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They
maintain a directory of domain names and translate them to Internet Protocol (IP)
addresses.
 This is necessary because, although domain names are easy for people to remember,
computers or machines, access websites based on IP addresses.
 Each domain can have different types of records of it, these are called resource
records.
 Recourse record is five tuple record.
domain-name time-to-live class type value
1. domain-name: is name of domain to whom given record belongs.
2. time-to-live: gives indication how stable information is.
3. class: class of information. For internet information, class is IN.
4. type: type of information.
5. value: value of record.
Resource Record
The principal DNS resource record types
Resource Records
Name Server
 A single name server can contain entire DNS database, but in practical, this server would be
overloaded.
 To avoid this problem, DNS name space is divided into zones.
 A zone contains some part of DNS tree and name server holding information about zone.
Name Server
 A zone will have a primary server and secondary server.
 Primary server gets information about zone from disk, secondary server gets information about zone
from primary servers.
 When ever host requires DNS record, it will call a program called “resolver” and pass it the host name
for which IP address is required.
 Resolver first pass query to local name server, if host name falls under boundary of that local server, it
will reply with record. This record is called “Authoritative Record”.
 If the local name server does not have data of given host name, it will ask another name server. This
method is called recursive query.
Recursive Query
Iterative Query
E mail
 Mail system is consist of TWO subsystem.
user agent: allows people to read and write mail.
Message Transfer agent: moves message from source to destination.
 User agent is program that provides command base or menu base interface.
 Message transfer agent are daemons, that run in background.
 services provided by Email system
1. Composition: process of creating and answering.
2. Transfer: Moving message from sender to receiver.
3. Reporting: report to sender about status of sent message
4. Displaying: displays the messages to the user
5. Disposition: allows to save or throw message.
Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
User Agent
 User agent is a program that accepts commands for composing, receiving, replying to message.
 When user agent starts up, it first of check mailbox of user for incoming email. Then it displays
messages in mailbox.
 Message Format: messages consist of header field, blank line and message body.
header according to RFC 822 standard is given below.
User Agent
Some other fields used in the RFC 822 message header.
User Agent
 Earlier, mail used to be written only in English and expressed in ASCII format.
Due to growth of internet, mails are required to support other type of data also.
Solution is called MIME(Multipurpose Internet Mail Extensions).
 MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.
 MIME messages can sent using normal program and protocol, only sending and receiving user
agent needs to change so that they can support other language.
 MIME header is attached after mail header, this header contains information about data and how
that data can be interpreted.
Message headers added by MIME.
Message Transfer agent
 Message transfer agent deliver message from sender to receiver.
 It complete task by establishing transport connection, transfer the data then
release connection.
 SMTP: The Simple Mail Transfer Protocol
 To send and receiver mail, SMTP is followed. Message transfer agent that is
using SMTP is listening at port 25. so TCP connection is established at port 25
of destination machine.
 These message transfer daemon accepts incoming message, copies into
appropriate mailbox.
 If message can not be delivered then error report is sent to sender.
Message Transfer agent
Architecture of the email system
Message Transfer
Message Transfer
Message Transfer
 Until now, it is assumed that receiver message agent is always ready to accept but it is not
normal.
 Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of
customer and stores in mailbox on ISP machine.
 When user agent comes on line, it will fetch mail from ISP’s machine.
 To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.
 POP3 begins when user starts mail reader. It establishes TCP connection with message agent
on ISP on port POP3.
 Once connection is established, POP3 performs three steps in sequence.
1. authentication
2. Transaction
3. Update
Message Transfer
Message transfer
Using POP3 to fetch Three Messages
WWW
 World wide web is an architectural framework for accessing linked documents spread out all over
the internet.
 The web began in 1989 at CERN, European center for nuclear research.
 In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for
further development of web.
 From users point of view, web is vast collection of documents called web pages.
 Each page may contain link to another page.
 Pages are viewed with a program called browser, browser fetches a page, interpret command in
it and displays page according to format.
 String of text that is linked to another page is called hyperlink.
WWW
Architecture of the Web.
WWW
The Client Side:
 Browser program at client side display the page and catches mouse clicks. When any item is
selected, browser follows hyperlink and page is fetched.
 In hyperlink, pages are name using URL( Uniform Resource Locator).
http://www.abcd.com/product.html
 URL has three parts,
1. Name of protocol (here http) used access resource.
2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com)
3. name of file containing the resource. (here product.html)
WWW
 When user clicks on hyperlink, browser carries out following series of steps to
fetch the page.
1. Browser determines the URL
2. Browser asks DNS for the IP address of the server
3. DNS replies
4. The browser makes a TCP connection
5. Sends HTTP request for the page
6. Server sends the page as HTTP response
7. The TCP connection is released
8. The browser displays the page
 Web pages are written in standard language like HTML, so all browser can
understand it.
WWW
 Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can
interpret all the data. To overcome problem, two solutions are possible.
1. plug in
2. helper application
(a) A browser plug-in. (b) A helper application.
WWW
The Server Side:
 The steps that server or web server performs when request from client are listed below
1. Accept a TCP connection from client
2. Get path to page, name of file requested.
3. Get the file (from disk).
4. Send contents of the file to the client.
5. Release the TCP connection.
 One problem is for every file, disk access is required. Solution is to maintain cache of n most
recently used files.
 Modern server also performs authentication and access control task, it will first perform
authentication and access control, then it will fetch file from disk.
WWW
A multithreaded Web server with a front end
and processing modules.
HTTP
 The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer
Protocol).
 It specifies what messages Client may send to server and what response they got back in
return.
 Usual way to for browser to contact server is establish TCP connection with server, send
request, get the reply and release connection.
 HTTP 1.1, supports persistent connections, with them it is possible to send and receive
multiple request, reply using single TCP connection.
 Client request pages and other action on pages using various request method.
HTTP
The built-in HTTP request methods.
HTTP
 Every request gets response consist of status line and other information.
 Status line contains three digit Status code.
The status code response groups
HTTP
 Message header:
The http methods may be followed by additional lines with more information. They are called
request headers.
 Responses from server may also additional information, they are called response headers.
 There are several types of request and response header for various purpose.
 “User-agent” header allows client to inform server about its browser, OS and other properties.
 “host” header contains servers DNS name.
HTTP
Some HTTP message headers.

More Related Content

PPT
Transportlayer tanenbaum
PPTX
Congestion control and quality of services
PPTX
Logical addressing
PPT
Connection( less & oriented)
PPT
Osi model
PDF
The Transport Layer
PPT
Application Layer
PPTX
Wlan wireless network
Transportlayer tanenbaum
Congestion control and quality of services
Logical addressing
Connection( less & oriented)
Osi model
The Transport Layer
Application Layer
Wlan wireless network

What's hot (20)

PPT
Switching techniques
PPTX
Techniques of achieving google quality of service
PDF
Mod05lec25(resource mgmt ii)
PPT
Icmp V4 And Icmp V6
PPTX
CSGR(cluster switch gateway routing)
PPT
Chapter 4-The Medium Access Control Sublayer.ppt
PPT
Logical Clocks (Distributed computing)
PPT
Unit 5 Application Layer
PDF
Hybrid wireless protocols
PPT
icmp protocol.ppt
PPTX
distributed Computing system model
PPTX
Slides for protocol layering and network applications
PPT
Chapter2-PhysicalLayer.ppt
PPTX
The mac layer
PPT
ATM Networking Concept
PDF
IEEE standards 802.3.&802.11
PPTX
Media Access Control
PPTX
TCP/IP Introduction
PDF
Introducao redes
PPTX
Unicast multicast & broadcast
Switching techniques
Techniques of achieving google quality of service
Mod05lec25(resource mgmt ii)
Icmp V4 And Icmp V6
CSGR(cluster switch gateway routing)
Chapter 4-The Medium Access Control Sublayer.ppt
Logical Clocks (Distributed computing)
Unit 5 Application Layer
Hybrid wireless protocols
icmp protocol.ppt
distributed Computing system model
Slides for protocol layering and network applications
Chapter2-PhysicalLayer.ppt
The mac layer
ATM Networking Concept
IEEE standards 802.3.&802.11
Media Access Control
TCP/IP Introduction
Introducao redes
Unicast multicast & broadcast
Ad

Viewers also liked (9)

PPTX
Application Layer
PDF
The Application Layer
PDF
SSH - Secure Shell
PPT
Secure shell ppt
PPT
HTTP Basics
PPT
Electronic mail
PPTX
HyperText Transfer Protocol (HTTP)
PPT
Email ppt
PDF
LinkedIn SlideShare: Knowledge, Well-Presented
Application Layer
The Application Layer
SSH - Secure Shell
Secure shell ppt
HTTP Basics
Electronic mail
HyperText Transfer Protocol (HTTP)
Email ppt
LinkedIn SlideShare: Knowledge, Well-Presented
Ad

Similar to Application layer (20)

PPTX
Application layer
PPT
Chapter Six Application Layer.ppt
PPT
Application layer protocols
PPT
Application layer protocols
PPT
Jaimin chp-7 - application layer- 2011 batch
PPTX
Web Programming HTML.pptx
PPTX
Computer networks unit v
PPTX
computer network and data communication and networkig fibre optical cable and...
PPT
the network layers for the understanding
PPT
WebEssentials-client server, communication
PPTX
Unit 5 Applifffffffffffcation Layer.pptx
PPTX
Overview of Application Layer in OSI Model
PDF
Computer networks Application Layer basics
PPT
Application layer
PPTX
applayer.pptx
PPTX
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
DOCX
telnet ftp email
PDF
CS6551 COMPUTER NETWORKS
PPTX
Application layer
PPTX
15 Application layer.pptx
Application layer
Chapter Six Application Layer.ppt
Application layer protocols
Application layer protocols
Jaimin chp-7 - application layer- 2011 batch
Web Programming HTML.pptx
Computer networks unit v
computer network and data communication and networkig fibre optical cable and...
the network layers for the understanding
WebEssentials-client server, communication
Unit 5 Applifffffffffffcation Layer.pptx
Overview of Application Layer in OSI Model
Computer networks Application Layer basics
Application layer
applayer.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
telnet ftp email
CS6551 COMPUTER NETWORKS
Application layer
15 Application layer.pptx

Recently uploaded (20)

PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Feature types and data preprocessing steps
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Design Guidelines and solutions for Plastics parts
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
III.4.1.2_The_Space_Environment.p pdffdf
Feature types and data preprocessing steps
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Abrasive, erosive and cavitation wear.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Current and future trends in Computer Vision.pptx
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Amdahl’s law is explained in the above power point presentations
Fundamentals of safety and accident prevention -final (1).pptx
Module 8- Technological and Communication Skills.pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Design Guidelines and solutions for Plastics parts
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
August -2025_Top10 Read_Articles_ijait.pdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Management Information system : MIS-e-Business Systems.pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS

Application layer

  • 2. DNS- Domain Name System  Every host in internet can be accessed using IP address, but it very difficult for humans to remember IP address of each host, he needs to contact.  As a solution, host are gives names, humans can access host using name.  Naming scheme is hierarchical, domain based naming scheme.  To manage large number of named, internet authority have managed it like postal system. In postal system, each address consist of country, state, city, street etc.  Names of host are also according some hierarchy.  Conceptually, internet is divided into top 200 domain, similarly like country in postal system.  Each domain is partitioned into subdomains and these are further partitioned. This is similar to states in country, and cities in state.  This naming system can be represented by tree.
  • 3. Domain Name Space A portion of the Internet domain name space.
  • 4. Domain Name System  Getting a second level domain, such as name-of-company.com is easy.  It just requires registration of the name with the authority of the top level domain.  Domains are named by path from it to root in upward direction.  Domain names are case insensitive. Each component can contain up to 63 character and full path name must not exceed 255 characters.  Each domain can create sub domain within it.  Domain can contain single host or multiple host within it.
  • 5. Domain Name Server  Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.  This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.  Each domain can have different types of records of it, these are called resource records.  Recourse record is five tuple record. domain-name time-to-live class type value 1. domain-name: is name of domain to whom given record belongs. 2. time-to-live: gives indication how stable information is. 3. class: class of information. For internet information, class is IN. 4. type: type of information. 5. value: value of record.
  • 6. Resource Record The principal DNS resource record types
  • 8. Name Server  A single name server can contain entire DNS database, but in practical, this server would be overloaded.  To avoid this problem, DNS name space is divided into zones.  A zone contains some part of DNS tree and name server holding information about zone.
  • 9. Name Server  A zone will have a primary server and secondary server.  Primary server gets information about zone from disk, secondary server gets information about zone from primary servers.  When ever host requires DNS record, it will call a program called “resolver” and pass it the host name for which IP address is required.  Resolver first pass query to local name server, if host name falls under boundary of that local server, it will reply with record. This record is called “Authoritative Record”.  If the local name server does not have data of given host name, it will ask another name server. This method is called recursive query.
  • 12. E mail  Mail system is consist of TWO subsystem. user agent: allows people to read and write mail. Message Transfer agent: moves message from source to destination.  User agent is program that provides command base or menu base interface.  Message transfer agent are daemons, that run in background.  services provided by Email system 1. Composition: process of creating and answering. 2. Transfer: Moving message from sender to receiver. 3. Reporting: report to sender about status of sent message 4. Displaying: displays the messages to the user 5. Disposition: allows to save or throw message. Other facilities are mailboxes: to store incoming mail, mailing list: a list of email addresses etc.
  • 13. User Agent  User agent is a program that accepts commands for composing, receiving, replying to message.  When user agent starts up, it first of check mailbox of user for incoming email. Then it displays messages in mailbox.  Message Format: messages consist of header field, blank line and message body. header according to RFC 822 standard is given below.
  • 14. User Agent Some other fields used in the RFC 822 message header.
  • 15. User Agent  Earlier, mail used to be written only in English and expressed in ASCII format. Due to growth of internet, mails are required to support other type of data also. Solution is called MIME(Multipurpose Internet Mail Extensions).  MIME uses RFC 822 format, but it defines encoding rules for non ASCII messages.  MIME messages can sent using normal program and protocol, only sending and receiving user agent needs to change so that they can support other language.  MIME header is attached after mail header, this header contains information about data and how that data can be interpreted. Message headers added by MIME.
  • 16. Message Transfer agent  Message transfer agent deliver message from sender to receiver.  It complete task by establishing transport connection, transfer the data then release connection.  SMTP: The Simple Mail Transfer Protocol  To send and receiver mail, SMTP is followed. Message transfer agent that is using SMTP is listening at port 25. so TCP connection is established at port 25 of destination machine.  These message transfer daemon accepts incoming message, copies into appropriate mailbox.  If message can not be delivered then error report is sent to sender.
  • 17. Message Transfer agent Architecture of the email system
  • 20. Message Transfer  Until now, it is assumed that receiver message agent is always ready to accept but it is not normal.  Solution of this problem is that, message transfer agent on ISP accepts mail on behalf of customer and stores in mailbox on ISP machine.  When user agent comes on line, it will fetch mail from ISP’s machine.  To get mail from ISP machine, POP3(Post Office Protocol VERSION 3) is used.  POP3 begins when user starts mail reader. It establishes TCP connection with message agent on ISP on port POP3.  Once connection is established, POP3 performs three steps in sequence. 1. authentication 2. Transaction 3. Update
  • 22. Message transfer Using POP3 to fetch Three Messages
  • 23. WWW  World wide web is an architectural framework for accessing linked documents spread out all over the internet.  The web began in 1989 at CERN, European center for nuclear research.  In 1994, M.I.T. and CERN signed agreement setting up World Wide Web Consortium (W3C) for further development of web.  From users point of view, web is vast collection of documents called web pages.  Each page may contain link to another page.  Pages are viewed with a program called browser, browser fetches a page, interpret command in it and displays page according to format.  String of text that is linked to another page is called hyperlink.
  • 25. WWW The Client Side:  Browser program at client side display the page and catches mouse clicks. When any item is selected, browser follows hyperlink and page is fetched.  In hyperlink, pages are name using URL( Uniform Resource Locator). http://www.abcd.com/product.html  URL has three parts, 1. Name of protocol (here http) used access resource. 2. DNS name of the machine where resource is located. ( here DNS name is www.abcd.com) 3. name of file containing the resource. (here product.html)
  • 26. WWW  When user clicks on hyperlink, browser carries out following series of steps to fetch the page. 1. Browser determines the URL 2. Browser asks DNS for the IP address of the server 3. DNS replies 4. The browser makes a TCP connection 5. Sends HTTP request for the page 6. Server sends the page as HTTP response 7. The TCP connection is released 8. The browser displays the page  Web pages are written in standard language like HTML, so all browser can understand it.
  • 27. WWW  Not all pages contains HTML, a page may contain PDF, song or video. Not all browser can interpret all the data. To overcome problem, two solutions are possible. 1. plug in 2. helper application (a) A browser plug-in. (b) A helper application.
  • 28. WWW The Server Side:  The steps that server or web server performs when request from client are listed below 1. Accept a TCP connection from client 2. Get path to page, name of file requested. 3. Get the file (from disk). 4. Send contents of the file to the client. 5. Release the TCP connection.  One problem is for every file, disk access is required. Solution is to maintain cache of n most recently used files.  Modern server also performs authentication and access control task, it will first perform authentication and access control, then it will fetch file from disk.
  • 29. WWW A multithreaded Web server with a front end and processing modules.
  • 30. HTTP  The protocol that is used to transfer pages in world wide web is HTTP (Hypertext Transfer Protocol).  It specifies what messages Client may send to server and what response they got back in return.  Usual way to for browser to contact server is establish TCP connection with server, send request, get the reply and release connection.  HTTP 1.1, supports persistent connections, with them it is possible to send and receive multiple request, reply using single TCP connection.  Client request pages and other action on pages using various request method.
  • 31. HTTP The built-in HTTP request methods.
  • 32. HTTP  Every request gets response consist of status line and other information.  Status line contains three digit Status code. The status code response groups
  • 33. HTTP  Message header: The http methods may be followed by additional lines with more information. They are called request headers.  Responses from server may also additional information, they are called response headers.  There are several types of request and response header for various purpose.  “User-agent” header allows client to inform server about its browser, OS and other properties.  “host” header contains servers DNS name.