Module 5 (UPDATED)
Module 5 (UPDATED)
Application The application layer programs are based on client and servers.
layer This layer also serves as a window for the application services to
access the network and for displaying the received information
to the user. Ex: Application – Browsers, Skype Messenger etc.
Course Name & Course Code Department of Computer Science & Engineering 4
Functions of Application layer
The Application layer includes the following functions:
Course Name & Course Code Department of Computer Science & Engineering 5
Services of Application Layers
• Network Virtual terminal: An application layer allows a user to log on
to a remote host.
• File Transfer, Access, and Management (FTAM): An application allows
a user to access files in a remote computer, to retrieve files from a
computer and to manage files in a remote computer.
• Addressing: When a client made a request to the server, the request
contains the server address and its own address.
• Mail Services: An application layer provides Email forwarding and
storage.
Course Name & Course Code Department of Computer Science & Engineering 6
Services of Application Layers contd..
• Directory Services: An application contains a distributed database
that provides access for global information about various objects and
services.
• Authentication: It authenticates the sender or receiver's message or
both.
Course Name & Course Code Department of Computer Science & Engineering 7
Standard & Non-Standard Protocols
• To provide smooth operation of the Internet, protocols used in four
layers need to be standardized and documented.
• Each protocol is a software that interacts with user and the transport
layer to provide the service.
P2P The peers are the computers which are not owned by the service
provider.
(peer-to-pe Most of the peers reside in the homes, offices, schools, and
universities.
er) The peers communicate with each other without passing the
Course Name & Course Code Department of Computer Science & Engineering 18
Self scalability: In a file sharing
system, although each peer generates
a workload by requesting the files,
each peer also adds a service capacity
by distributing the files to the peer.
Features of P2P
architecture
Cost-effective: It is cost-effective as it
does not require significant server
infrastructure and server bandwidth.
Course Name & Course Code Department of Computer Science & Engineering 19
Mixed Paradigm
• An application may choose to use a mixture of any of the two
paradigms.
Client Server Model
• Client-Server model is a network architecture that describes how
servers interact with network devices.
• In this mode of interaction a program sends a request to another
program and awaits for a response.
• Requesting program is called client.
• Answering program is called server.
Client Server Model
Components of Client Server Model
• The main three components of Client-Server Model are:
• Client
• Server
• Networking devices.
Components of Client Server Model
• Client
• Computer that connects to and uses the resources of a remote computer or
server. Resources can be files, information, internet, processing power etc.
• Server
• Computer that provides services to the network.
• Networking devices
• Physical and wireless networking devices like hubs, switches, routers etc.
Working of Client-Server Model
Examples
• Mail Servers:
• Used for sending and receiving emails.
• File Servers
• Centralized location for the files (cloud)
• Web Servers
• Servers hosting different websites.
Advantages
• Centralized
• Security
• Performance
• scalability
Disadvantages
• Clients are prone to virus, can be uploaded into the server.
• Servers are prone to DoS attack.
Types of Client-Server Architecture
• There are different types of architecture in client-server model:
• 1-tier Architecture
• 2-tier Architecture
• 3-tier Architecture
• N-tier Architecture
1-tier Architecture
• All client or server configuration settings, UI environment, data logic is
on the same system.
• Ex: MS office, MP3 player
2-tier Architecture
• UI is stored in client machine and database is in server.
• Ex: Online ticket reservation system
3-tier Architecture
• Contains middleware, and request sent by client is processed by
middle layer and request is given to server.
N-Tier Architecture
• Also known as Multi Tier Architecture.
HTTP
● HTTP stands for Hyper Text Transfer Protocol.
● The HTTP protocol can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
HTTP messages are of two types: request and response. Both the message types follow the same
message format.
Request Message: The request message is sent by the client that consists of a request line, headers,
and sometimes a body.
Response Message: The response message is sent by the server to the client that consists of a status
line, headers, and sometimes a body.
Domain Name System
• DNS Overview:-
• Uses:-
• Domain Name:-
• Name Server:-
• Types of DNS:-
1)Generic Domain:
2)Country Domain:
3)Inverse Domain:
DNS Overview
• On the Internet, the Domain Name System (DNS) associates
various sorts of information with domain names
• Such as the list of mail exchange servers that accept email for
a given domain.
root
org
net edu com
uk
gwu cmu mit
ucb bu
cs ece
cmcl
Domain name
Name Server:
• Distribute the information among computer called
DNS server.
• DNS allows domain to be divided future into smaller
domains.
• Each server can responsible for domain.
ROOT SERVER
fhda
atc
chal Chal.atc.fhda.edu
• Country Domain:- It uses two character country
abbreviation in place of three character abbreviation
at first level. ROOT LEVEL
in us zw ae
co
cup
anza Anza.cup.ca.us
Inverse Domain:-
• It used to map an address to a name.
• The inverse domain is to the domain name space with
the first level node called ARPA(advanced research
project agency).
• The second level is also one single node named in-
addr(for inverse address).
• The rest of the domain defines IP address.
• For EX: 121.45.34.132.in-addr.arpa
What is
SNMP?
• The Simple Network Management Protocol (SNMP) is a
framework for managing devices in an internet using the
TCP/IP protocol suite. It provides a set of fundamental
operations for monitoring and maintaining an internet
– SNMP Protocol
• Defines format of messages exchanged by management systems and agents.
• Specifies the Get, GetNext, Set, and Trap operations
Next 3 are
often
used, but
highly
recommended
SMTP Transport Example
S: 220 smtp.example.com ESMTP
•C: From: "Bob Example"
Postfix
C: HELO relay.example.com •<bob@example.com>
S: 250 smtp.example.com, I am glad to
•C: To: Alice Example
meet you
<alice@example.com> C: Cc:
C: MAIL FROM:<bob@example.com> 0500
theboss@example.com
S: 250 Ok
C: RCPT TO:<alice@example.com> •C: Date: Tue, 15 January 2008 16:02:43 -
C:
S: 250 Ok
C: RCPT TO:<theboss@example.com> C: .
S: 250 Ok •C: Subject: Test message
C: DATA C: QUIT
•C: Hello Alice. This is a Test
S: 354 End data with S: 221 Bye
<CR><LF>.<CR><LF> {The server closes the connection}
On the other hand, the third stage needs a pull protocol; the
client must pull messages from the server. The direction of
the bulk data are from the server to the client. The third
stage uses a message access agent.
Stages of
Mail Delivery
• Gmail
• Outlook Express
• Mozilla
Thunderbird
• Netscape
• Internet
Explorer
IMAP4
As its name implies, IMAP allows us to access
email messages wherever we are .
Basically, email messages are stored on
servers. Whenever we heck inbox, our email
client contacts the server to connect with
messages.
When we read an email message using IMAP,
we aren't actually downloading or storing it on
computer; instead, we are reading it off of the
server.
As a result, it's possible to email from
It as an intermediary between email
client and email server.
When you sign into an email client like
Microsoft Outlook, it contacts the
email server using IMAP.
The headers of all of your email
messages are then displayed.
If you choose to read a message, it is
quickly downloaded so that you can
see it - emails are not downloaded
unless you need to open them.
Advantages of imapv4
Organize The user can not organize mails The user can organize the mails
in the mailbox of the mail server. on the server.
Folder The user can not create, delete The user can create, delete or
or rename mailboxes on a mail rename mailboxes on the mail
server. server.
Content A user can not search the content A user can search the content of
of mail for prior downloading. mail for specific string of
character before downloading.
Partial Download The user has to download the The user can partially download
mail for accessing it. the mail if bandwidth is limited.
Functions POP3 is simple and has limited IMAP is more powerful, more
functions. complex and has more features
over POP3.