SlideShare a Scribd company logo
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 5
Application Layer
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Traditional applications
• Electronic Mail
• SMTP – Simple Mail Transfer Protocol
• POP 3
• IMAP
• MIME
• HTTP – Hyper Text Transfer Protocol
• Web Services
• DNS – Domain Name System
• SNMP – Simple Network Management Protocol
Application Layer
Introduction
• Applications – that are given to the END
USER.
• Every application is developed for a purpose
and have its own style of working
Apps available
That’s is not ALL.
Traditional Applications
• Among all the applications our study focuses on 2 main traditional
applications. They are :
Reason for Traditional Applications
• We call these application as traditional application because they existed
since the early days of computer networks.
Before starting the Topic…
• There are 3 general points that have to be made clear.
1. Distinguish between the Application Program and Application Protocols
2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called
simple because it only specifies the procedure, format is taken care by companion
protocol)
3. Each protocol will have a companion protocol which defines the format of the contents.
Distinguish between the Application Program and Application
Protocols
• example
Each protocol reinvents the Simple Remote procedure call (RPC)
mechanism
• Remote Procedure Call (RPC) is a protocol that one program can use to request a
service from a program located in another computer in a network without having
to understand network details. (A procedure call is also sometimes known as a
function call or a subroutine call.)
• RPC uses the client/server model.
RPC Mechanism
• Most of the application programs works on Query – Respond Principle.
• This RPC specifies, which mechanism to be followed to fetch information
from the source.
Each protocol will have a companion protocol
• This companion protocol specifies the format of the information to be
exchanged.
overview
• Application Program:
• Which is available to the end user
without knowing any knowledge
about the network.
• Application Protocol:
• Which specifies the RPC
mechanism to fetch information
available at remotely located
systems.
• Companion Protocol:
• Which specifies the format
of the data that are to be
exchanged.
Computer networks    unit v
Electronic Mail
E - Mail
• This is the one of the oldest applications.
• It is mandatory to distinguish between the User Interface – Transfer
Protocols – Companion Protocol
What happens when you press
Send Button
EMAIL CLIENT
MIME
EMAIL CLIENT
E - Mail
• Message Format – MIME
• Message Transfer – SMTP
• Mail Reader – POP / IMAP
Format of an E Mail
Message Format
• Message format is defined by the companion protocols. Two majorly used
protocols are given below.
• RFC 822 - Standard for the format of ARPA Internet text messages
• MIME - Multipurpose Internet Mail Extensions.
RFC 822
• This defines 2 parts
• Header
• Body
• Few headers are obtained by the user.
• Ex:
• TO address
• CC address
• BCC address
• Sub Text
• Few headers are added automatically by the program
• Ex:
• From Address
• Mail Server
• Date and Time
Syntax:
<Header Type> : <Header Value>
MIME
• Multipurpose Internet Mail Extensions.
• This is an supplementary protocol that allows Non ASCII data to be sent through E Mail
• This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
MIME Headers
• MIME mainly consists of 5 header:
• MIME - Version
• Content type
• Content transfer encoding
• Content ID
• Content Description
MIME Headers
Data types and subtypes in MIME
Content Transfer Encoding
Computer networks    unit v
Message Transfer
Introduction
• Once the mails are composed they are transferred to the destination using
Mail Transfer Protocols.
• Some of the popular Mail Transfer Protocols are
• SMTP – Simple Mail Transfer Protocol
• POP – Post Office Protocol
• IMAP – Internet Message Access Protocol
SMTP
• The actual mail transfer is done through the Mail Transfer Agents.
• The protocol that defines the MTA Client and Server is called SMTP.
• SMTP is used 2 Times
• Between sender and mail server.
• Between 2 mail servers.
• SMTP simply defines how commands and responses must be sent back
and forth.
SMTP Commands
SMTP Responses
Connection Establishment
Mail Transfer
Connection Termination
Message Reader / Message Access
Introduction
• SMPT is not involved in the third stage because SMTP is a Push Protocol.
• It pushes the message from the client to the server.
• The third stage need the Pull Protocol.
• The client must pull message from the server.
• Two of the popularly used message access agents are POP3 and IMAP
POP 3
• Post Office Protocol Version 3 (POP 3)
• Client POP 3 will be installed in the recipient’s computer and the server POP 3
is installed at the server.
• Message access will be initiated when the user wants to download the mail from
the server.
Modes of POP 3
• POP 3 have 2 modes
• Delete Mode
• In this mode, the mail is deleted from the mailbox after each retrieval.
• Keep Mode
• In this mode, the mail is kept is the personal computer for future access.
Exchange of Commands and Responses in POP 3
IMAP 4
• Internet Mail Access Protocol, Version 4
• IMAP 4 is similar to the POP 3 but with added features.
• The features are:
• A user can check the email header prior to downloading.
• A user can search the content of the email for a specific string
• A user can download partial email due to bandwidth constraints.
• User can create delete or rename mail boxes
• User can create hierarchy of mail boxes.
POP 3 Vs IMAP 4
My Official Account – POP 3 Setting
My Official account - IMAP Settings
MY Personal Account
Video Presentation on E - Mail
End
of
E - Mail
World Wide Web - WWW
Introduction
• The WWW is a repository of information
linked together from points all over the
world.
• The original goal of the web was to find a way to organize and retrieve information about
hyper linked documents.
• WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed
shortly)
WWW Architecture
Clients (Browsers)
1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents.
2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc.,
3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content
CLIENT
(BROWSERS)
 There are variety of browsers available that interprets and displays
a web document.
 Every client consists of three parts
Clients (Browsers)
Server
• The webpage is stored at the server
• Each time the request is received the corresponding document
is sent to the client.
• The server can be more efficient by enabling “Multithreading”
(Answering Multiple requests)
URL – Uniform Resource Locator
• When a page needs to be accessed it must have a address.
• HTTP uses locators to access the webpages available at widely distributed areas.
• URL is a standard for specifying any kind of information on the internet.
• URL defines 4 Important things:
Example URL
HTTP – Hyper Text Transfer Protocol
Introduction
• The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the
world wide web.
• HTTP is the combination of FTP and SMTP.
• It is like FTP because it uses TCP Connection.
• It is like SMTP because data transferred between the server and client looks like
SMTP messages.
HTTP Transaction
• The client initiates the transaction by sending a request message and the
server replies through an response message.
Formats of Request and Response Messages
Request Line and Status Line
Request Type
Status Code
• This field indicates the status of the request through codes.
• Codes in the range of
• 100  informational
• 200  Successful Request
• 300  Redirect the client to another URL
• 400  Error at client
• 500  Error at server
Status Codes and their Phrases
Contd..
Header
• The format of the header is shown in the figure.
• The request header and Response header have different values.
Request Header
Response Header
End
of
HTTP
Web Services
End
of
Web Services
Domain Name System - DNS
End
of
DNS
Simple Network Management Protocol - SNMP
End
of
SNMP

More Related Content

PPT
PDF
MG6088 SOFTWARE PROJECT MANAGEMENT
PPT
Unit 8
PDF
Stop and-wait protocol
PPT
Coda file system
PPTX
WIRELESS TRANSMISSION
PPTX
Signals and Antennas in mobile computing
MG6088 SOFTWARE PROJECT MANAGEMENT
Unit 8
Stop and-wait protocol
Coda file system
WIRELESS TRANSMISSION
Signals and Antennas in mobile computing

What's hot (20)

PPTX
Shortest path algorithm
PDF
Multiplexing
PPTX
ELEMENTS OF TRANSPORT PROTOCOL
PPTX
Routing protocols
PPT
TCP/IP Network ppt
PPT
Type Checking(Compiler Design) #ShareThisIfYouLike
PPT
PPT
IPV4 Frame Format
PPTX
Presentation Routing algorithm
PPTX
Direct linking loaders
PPTX
Routing algorithm
PDF
Transport layer services
PPTX
Protocols and the TCP/IP Protocol Suite
PPT
Mime
PDF
8 memory management strategies
PPT
Socket Programming
PPTX
File Transfer Protocol - FTP
PPT
Domain name system
PPSX
Physical layer ppt
PPTX
Point To Point Protocol
Shortest path algorithm
Multiplexing
ELEMENTS OF TRANSPORT PROTOCOL
Routing protocols
TCP/IP Network ppt
Type Checking(Compiler Design) #ShareThisIfYouLike
IPV4 Frame Format
Presentation Routing algorithm
Direct linking loaders
Routing algorithm
Transport layer services
Protocols and the TCP/IP Protocol Suite
Mime
8 memory management strategies
Socket Programming
File Transfer Protocol - FTP
Domain name system
Physical layer ppt
Point To Point Protocol
Ad

Similar to Computer networks unit v (20)

PPT
Tcpip services and applications
PDF
Unit 3 - Protocols and Client-Server Applications - IT
PPTX
Application Layer Protocols in computer network.pptx
PPTX
Module 5 Application and presentation Layer .pptx
PPTX
Overview of Application Layer in OSI Model
PPTX
Computer networks
PPTX
E mail flow
PPT
retrieving the mail
PPTX
PPTX
Simple mail transfer protocol
PPTX
Topic 2.4 network services
PPTX
CN Unit-5.pptx dns jdlj;lvk;ckx; gfvfdcffdf
PPTX
15 Application layer.pptx
PPTX
The Internet
PPT
Clients and Servers.ppt
PPT
how email works
PPTX
OSI Application layer. tcp/ip application layer
PPTX
Module 1 part 2.pptx with clear notes and explanation
PPTX
Vishal patel.pptx
PPTX
Compute rNetwork.pptx
Tcpip services and applications
Unit 3 - Protocols and Client-Server Applications - IT
Application Layer Protocols in computer network.pptx
Module 5 Application and presentation Layer .pptx
Overview of Application Layer in OSI Model
Computer networks
E mail flow
retrieving the mail
Simple mail transfer protocol
Topic 2.4 network services
CN Unit-5.pptx dns jdlj;lvk;ckx; gfvfdcffdf
15 Application layer.pptx
The Internet
Clients and Servers.ppt
how email works
OSI Application layer. tcp/ip application layer
Module 1 part 2.pptx with clear notes and explanation
Vishal patel.pptx
Compute rNetwork.pptx
Ad

More from JAIGANESH SEKAR (20)

PDF
Ec8551 communication networks mcq question bank
PDF
2.3b access control random access methods - part 3 - csma ca
PDF
2.10b network layer services i pv4 - variable length subnetting
PDF
2.10a network layer services i pv4 - fixed length subnetting
PDF
2.10 network layer services i pv4
PDF
2.9 network layer services packet switching
PDF
2.8 bluetooth ieee 802.15
PDF
2.7 wlan ieee 802.11
PDF
2.6 ethernet ieee 802.3
PDF
2.5 access control channelization methods
PDF
2.4 access control controlled access methods
PDF
2.3a access control random access methods - part 2 - csma cd
PDF
2.3 access control random access methods - part 1
PDF
2.2 flow control
PDF
2.1 framing
PDF
9. data link layer error correction codes - hamming code
PDF
8. data link layer error detection and correction codes - crc
PDF
7. data link layer error detection and correction codes - parity and checksum
PDF
6. data link layer physical addressing
PDF
5. protocol layering
Ec8551 communication networks mcq question bank
2.3b access control random access methods - part 3 - csma ca
2.10b network layer services i pv4 - variable length subnetting
2.10a network layer services i pv4 - fixed length subnetting
2.10 network layer services i pv4
2.9 network layer services packet switching
2.8 bluetooth ieee 802.15
2.7 wlan ieee 802.11
2.6 ethernet ieee 802.3
2.5 access control channelization methods
2.4 access control controlled access methods
2.3a access control random access methods - part 2 - csma cd
2.3 access control random access methods - part 1
2.2 flow control
2.1 framing
9. data link layer error correction codes - hamming code
8. data link layer error detection and correction codes - crc
7. data link layer error detection and correction codes - parity and checksum
6. data link layer physical addressing
5. protocol layering

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Welding lecture in detail for understanding
PDF
Well-logging-methods_new................
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
additive manufacturing of ss316l using mig welding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Welding lecture in detail for understanding
Well-logging-methods_new................
Mechanical Engineering MATERIALS Selection
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
UNIT 4 Total Quality Management .pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
UNIT-1 - COAL BASED THERMAL POWER PLANTS
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Structs to JSON How Go Powers REST APIs.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf

Computer networks unit v

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 5 Application Layer Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Traditional applications • Electronic Mail • SMTP – Simple Mail Transfer Protocol • POP 3 • IMAP • MIME • HTTP – Hyper Text Transfer Protocol • Web Services • DNS – Domain Name System • SNMP – Simple Network Management Protocol
  • 5. Introduction • Applications – that are given to the END USER. • Every application is developed for a purpose and have its own style of working
  • 8. Traditional Applications • Among all the applications our study focuses on 2 main traditional applications. They are :
  • 9. Reason for Traditional Applications • We call these application as traditional application because they existed since the early days of computer networks.
  • 10. Before starting the Topic… • There are 3 general points that have to be made clear. 1. Distinguish between the Application Program and Application Protocols 2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called simple because it only specifies the procedure, format is taken care by companion protocol) 3. Each protocol will have a companion protocol which defines the format of the contents.
  • 11. Distinguish between the Application Program and Application Protocols • example
  • 12. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism • Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details. (A procedure call is also sometimes known as a function call or a subroutine call.) • RPC uses the client/server model.
  • 14. • Most of the application programs works on Query – Respond Principle. • This RPC specifies, which mechanism to be followed to fetch information from the source.
  • 15. Each protocol will have a companion protocol • This companion protocol specifies the format of the information to be exchanged.
  • 16. overview • Application Program: • Which is available to the end user without knowing any knowledge about the network. • Application Protocol: • Which specifies the RPC mechanism to fetch information available at remotely located systems. • Companion Protocol: • Which specifies the format of the data that are to be exchanged.
  • 19. E - Mail • This is the one of the oldest applications. • It is mandatory to distinguish between the User Interface – Transfer Protocols – Companion Protocol
  • 20. What happens when you press Send Button EMAIL CLIENT MIME EMAIL CLIENT
  • 21. E - Mail • Message Format – MIME • Message Transfer – SMTP • Mail Reader – POP / IMAP
  • 22. Format of an E Mail
  • 23. Message Format • Message format is defined by the companion protocols. Two majorly used protocols are given below. • RFC 822 - Standard for the format of ARPA Internet text messages • MIME - Multipurpose Internet Mail Extensions.
  • 24. RFC 822 • This defines 2 parts • Header • Body
  • 25. • Few headers are obtained by the user. • Ex: • TO address • CC address • BCC address • Sub Text • Few headers are added automatically by the program • Ex: • From Address • Mail Server • Date and Time Syntax: <Header Type> : <Header Value>
  • 26. MIME • Multipurpose Internet Mail Extensions. • This is an supplementary protocol that allows Non ASCII data to be sent through E Mail • This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
  • 27. MIME Headers • MIME mainly consists of 5 header: • MIME - Version • Content type • Content transfer encoding • Content ID • Content Description
  • 29. Data types and subtypes in MIME
  • 33. Introduction • Once the mails are composed they are transferred to the destination using Mail Transfer Protocols. • Some of the popular Mail Transfer Protocols are • SMTP – Simple Mail Transfer Protocol • POP – Post Office Protocol • IMAP – Internet Message Access Protocol
  • 34. SMTP • The actual mail transfer is done through the Mail Transfer Agents. • The protocol that defines the MTA Client and Server is called SMTP. • SMTP is used 2 Times • Between sender and mail server. • Between 2 mail servers.
  • 35. • SMTP simply defines how commands and responses must be sent back and forth.
  • 41. Message Reader / Message Access
  • 42. Introduction • SMPT is not involved in the third stage because SMTP is a Push Protocol. • It pushes the message from the client to the server. • The third stage need the Pull Protocol. • The client must pull message from the server. • Two of the popularly used message access agents are POP3 and IMAP
  • 43. POP 3 • Post Office Protocol Version 3 (POP 3) • Client POP 3 will be installed in the recipient’s computer and the server POP 3 is installed at the server. • Message access will be initiated when the user wants to download the mail from the server.
  • 44. Modes of POP 3 • POP 3 have 2 modes • Delete Mode • In this mode, the mail is deleted from the mailbox after each retrieval. • Keep Mode • In this mode, the mail is kept is the personal computer for future access.
  • 45. Exchange of Commands and Responses in POP 3
  • 46. IMAP 4 • Internet Mail Access Protocol, Version 4 • IMAP 4 is similar to the POP 3 but with added features. • The features are: • A user can check the email header prior to downloading. • A user can search the content of the email for a specific string • A user can download partial email due to bandwidth constraints. • User can create delete or rename mail boxes • User can create hierarchy of mail boxes.
  • 47. POP 3 Vs IMAP 4
  • 48. My Official Account – POP 3 Setting
  • 49. My Official account - IMAP Settings
  • 53. World Wide Web - WWW
  • 54. Introduction • The WWW is a repository of information linked together from points all over the world. • The original goal of the web was to find a way to organize and retrieve information about hyper linked documents. • WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed shortly)
  • 56. Clients (Browsers) 1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents. 2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc., 3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content CLIENT (BROWSERS)  There are variety of browsers available that interprets and displays a web document.  Every client consists of three parts
  • 58. Server • The webpage is stored at the server • Each time the request is received the corresponding document is sent to the client. • The server can be more efficient by enabling “Multithreading” (Answering Multiple requests)
  • 59. URL – Uniform Resource Locator • When a page needs to be accessed it must have a address. • HTTP uses locators to access the webpages available at widely distributed areas. • URL is a standard for specifying any kind of information on the internet. • URL defines 4 Important things:
  • 61. HTTP – Hyper Text Transfer Protocol
  • 62. Introduction • The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the world wide web. • HTTP is the combination of FTP and SMTP. • It is like FTP because it uses TCP Connection. • It is like SMTP because data transferred between the server and client looks like SMTP messages.
  • 63. HTTP Transaction • The client initiates the transaction by sending a request message and the server replies through an response message.
  • 64. Formats of Request and Response Messages
  • 65. Request Line and Status Line
  • 67. Status Code • This field indicates the status of the request through codes. • Codes in the range of • 100  informational • 200  Successful Request • 300  Redirect the client to another URL • 400  Error at client • 500  Error at server
  • 68. Status Codes and their Phrases
  • 70. Header • The format of the header is shown in the figure. • The request header and Response header have different values.
  • 78. Simple Network Management Protocol - SNMP