SlideShare une entreprise Scribd logo
The Application Layer
10/29/2023 Dr.T.Thendral - CN
DNS—The Domain Name System
• IP addresses: These addresses are hard for
people to remember
• To solve these problems, DNS (the Domain
Name System) was invented.
• DNS is the phonebook of the Internet
• DNS translates domain names to IP addresses
so browsers can load Internet resources.
10/29/2023 Dr.T.Thendral - CN
The DNS Name Space
• A portion of the Internet domain name space
10/29/2023 Dr.T.Thendral - CN
Reference
10/29/2023 Dr.T.Thendral - CN
EXAMPLES
• 1. cs.yale.edu (Yale University, in the United
States)
• 2. cs.vu.nl (Vrije Universiteit, in The
Netherlands)
• 3. cs.keio.ac.jp (Keio University, in Japan)
10/29/2023 Dr.T.Thendral - CN
Resource Records
• Every domain, whether it is a single host or a
top-level domain, can have a set of resource
records associated with it
• For a single host, the most common resource
record is just its IP address
• A resource record is a five-tuple
• The format we will use is as follows:
Domain_name Time_to_live Class Type Value
10/29/2023 Dr.T.Thendral - CN
• The Domain_name tells the domain to which
this record applies
• The Time_to_live field gives an indication of
how stable the record is
• The third field of every resource record is the
Class
• For Internet information, it is always IN.
10/29/2023 Dr.T.Thendral - CN
The Principal DNS Resource Record Types
For Internet Protocol version 4 (IPv4)
10/29/2023 Dr.T.Thendral - CN
IPv4 an address consists of 32 bits
10/29/2023 Dr.T.Thendral - CN
Name Servers
• DNS name server is a server that stores the
DNS records
• To avoid the problems associated with having
only a single source of information, the DNS
name space is divided into nonoverlapping
zones
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
Electronic Mail
• Electronic mail, or e-mail, as it is known to its many
fans, has been around for over two decades
• Before 1990, it was mostly used in academia
• E-mail, like most other forms of communication, has
its own conventions and styles
• In particular, it is very informal and has a low
threshold of use
• E-mail is full of jargon such as BTW (By The Way),
ROTFL (Rolling On The Floor Laughing), and IMHO (In
My Humble Opinion)
10/29/2023 Dr.T.Thendral - CN
Some smileys
• Many people also use little ASCII symbols
called smileys or emoticons in their e-mail
10/29/2023 Dr.T.Thendral - CN
Some of the complaints were as follows:
1. Sending a message to a group of people was inconvenient. Managers often
need this facility to send memos to all their subordinates.
2. Messages had no internal structure, making computer processing difficult
For example, if a forwarded message was included in the body of another
message, extracting the forwarded part from the received message was
difficult.
3. The originator (sender) never knew if a message arrived or not.
4. If someone was planning to be away on business for several weeks and
wanted all incoming e-mail to be handled by his secretary, this was not easy to
arrange.
5. The user interface was poorly integrated with the transmission system
requiring users first to edit a file, then leave the editor and invoke the file
transfer program.
6. It was not possible to create and send messages containing a mixture of
text, drawings, facsimile, and voice
10/29/2023 Dr.T.Thendral - CN
Architecture and Services
• They normally consist of two subsystems:
• The user agents, which allow people to read
and send e-mail, and the message transfer
agents, which move the messages from the
source to the destination
• Typically, e-mail systems support five basic
functions
• Composition, Transfer, Reporting, Displaying,
Disposition
10/29/2023 Dr.T.Thendral - CN
• Most systems allow users to create mailboxes
to store incoming e-mail
• Commands are needed to create and destroy
mailboxes, inspect the contents of mailboxes,
insert and delete messages from mailboxes,
and so on.
• This gives rise to the idea of a mailing list,
which is a list of e-mail addresses
• A key idea in e-mail systems is the distinction
between the envelope and its contents
• The message inside the envelope consists of
two parts: the header and the body
10/29/2023 Dr.T.Thendral - CN
The User Agent
• Sending E-mail, Reading E-mail
• An example display of the contents of a
mailbox
10/29/2023 Dr.T.Thendral - CN
Message Formats
10/29/2023 Dr.T.Thendral - CN
RFC 822 header fields related to message transport
10/29/2023 Dr.T.Thendral - CN
MIME—The Multipurpose Internet Mail
Extensions
1. Messages in languages with accents (e.g.,
French and German)
2. Messages in non-Latin alphabets (e.g.,
Hebrew and Russian)
3. Messages in languages without alphabets
(e.g., Chinese and Japanese)
4. Messages not containing text at all (e.g.,
audio or images)
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
Message Transfer
• SMTP—The Simple Mail Transfer Protocol
• (a) Sending and reading mail when the receiver has a permanent Internet
connection and the user agent runs on the same machine as the message
transfer agent
• (b) Reading e-mail when the receiver has a dial-up connection to an ISP
(internet service provider)
10/29/2023 Dr.T.Thendral - CN
Network Security
• Most security problems are intentionally
caused by malicious people trying to gain
some benefit, get attention, or to harm
someone
• Some people who cause security problems
and why
10/29/2023 Dr.T.Thendral - CN
• Network security problems can be divided
roughly into four areas:
• secrecy, authentication, nonrepudiation, and
integrity control
10/29/2023 Dr.T.Thendral - CN
Cryptography
• Cryptography comes from the Greek words for
''secret writing.'‘
• Professionals make a distinction between
ciphers and codes
• A cipher is a character-for-character or bit-
for-bit transformation, without regard to the
linguistic structure of the message
• In contrast, a code replaces one word with
another word or symbol
10/29/2023 Dr.T.Thendral - CN
Introduction to Cryptography
10/29/2023 Dr.T.Thendral - CN
Substitution Ciphers
• In a substitution cipher each letter or group of
letters is replaced by another letter or group
of letters to disguise it
• One of the oldest known ciphers is the Caesar
cipher, attributed to Julius Caesar.
• In this method, a becomes D, b becomes E, c
becomes F, ... , and z becomes C
10/29/2023 Dr.T.Thendral - CN
• The next improvement is to have each of the symbols
in the plaintext, say, the 26 letters for simplicity, map
onto some other letter.
• For example,
• plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
• ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C
V B N M
• The general system of symbol-for-symbol
substitution is called a monoalphabetic substitution
• The plaintext attack would be transformed into the
ciphertext QZZQEA
10/29/2023 Dr.T.Thendral - CN
Transposition Ciphers
• Transposition ciphers, in contrast, reorder the
letters but do not disguise them
• In this example, MEGABUCK is the key
10/29/2023 Dr.T.Thendral - CN
One-Time Pads
• First choose a random bit string as the key
• Then convert the plaintext into a bit string, for
example by using its ASCII representation
• With a one-time pad, the encryption
algorithm is simply the XOR operation
• The resulting ciphertext cannot be broken,
This method, known as the one-time pad
10/29/2023 Dr.T.Thendral - CN
10/29/2023 Dr.T.Thendral - CN
Two Fundamental Cryptographic
Principles
• Redundancy - The first principle is that all
encrypted messages must contain some
redundancy, that is, information not needed
to understand the message
• Cryptographic principle 1: Messages must
contain some redundancy
• EX: CRC, Hamming or Reed Solomon code is a
more efficient way to do error detection and
correction
10/29/2023 Dr.T.Thendral - CN
Freshness
• Cryptographic principle 2: Some method is
needed to foil replay attacks
• The second cryptographic principle is that
some measures must be taken to ensure that
each message received can be verified as
being fresh, that is, sent very recently
10/29/2023 Dr.T.Thendral - CN

Contenu connexe

Tendances

Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
Anil Pokhrel
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
karan2190
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
SabarishSanjeevi
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
Merlin Florrence
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
Pallepati Vasavi
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
myrajendra
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Online
 
Agreement protocol
Agreement protocolAgreement protocol
Agreement protocol
Saif Ali Khan
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
junnubabu
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
adil raja
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 

Tendances (20)

Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Agreement protocol
Agreement protocolAgreement protocol
Agreement protocol
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 

Similaire à The Application Layer.ppt

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
sravya reddy
 
applicationlayer.pptx
applicationlayer.pptxapplicationlayer.pptx
applicationlayer.pptx
georgejustymirobi1
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mail
Maxwell Musonda
 
Lecture 3 internet and web
Lecture 3 internet and webLecture 3 internet and web
Lecture 3 internet and web
Dhiviya Rose
 
SUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptxSUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptx
BagalanaSteven
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
12 IPT0302 Examples of Communication Systems
12 IPT0302   Examples of Communication Systems12 IPT0302   Examples of Communication Systems
12 IPT0302 Examples of Communication Systems
ctedds
 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdf
SuriyaMahendran2
 
e COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptxe COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptx
REVITADESIHERTIN
 
Electronic communication
Electronic communicationElectronic communication
Electronic communication
Dr. B T Sampath Kumar
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
Vasanti Dutta
 
ch01.ppt
ch01.pptch01.ppt
Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)
80094859
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
GulshanKumar368
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
Inexk Pedrero
 
IS100 Week 5
IS100 Week 5IS100 Week 5
IS100 Week 5
METU-Informatics
 
Networking
Networking Networking
Application Layer
Application LayerApplication Layer
Application Layer
ushabarad142
 
network.pptx
network.pptxnetwork.pptx
network.pptx
ssuser8347a1
 
The internet
The internetThe internet
The internet
joseph0914
 

Similaire à The Application Layer.ppt (20)

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
applicationlayer.pptx
applicationlayer.pptxapplicationlayer.pptx
applicationlayer.pptx
 
Lecture 4 sending and receiving e-mail
Lecture 4   sending and receiving e-mailLecture 4   sending and receiving e-mail
Lecture 4 sending and receiving e-mail
 
Lecture 3 internet and web
Lecture 3 internet and webLecture 3 internet and web
Lecture 3 internet and web
 
SUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptxSUB ICT- NOTES FOR S6.pptx
SUB ICT- NOTES FOR S6.pptx
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
12 IPT0302 Examples of Communication Systems
12 IPT0302   Examples of Communication Systems12 IPT0302   Examples of Communication Systems
12 IPT0302 Examples of Communication Systems
 
Chp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdfChp 1 Living_in_Networkv2 .pdf
Chp 1 Living_in_Networkv2 .pdf
 
e COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptxe COMMERCE INFRASTRUCTURE.pptx
e COMMERCE INFRASTRUCTURE.pptx
 
Electronic communication
Electronic communicationElectronic communication
Electronic communication
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
 
IS100 Week 5
IS100 Week 5IS100 Week 5
IS100 Week 5
 
Networking
Networking Networking
Networking
 
Application Layer
Application LayerApplication Layer
Application Layer
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
The internet
The internetThe internet
The internet
 

Plus de DrTThendralCompSci

Loader and linker.pptx
Loader and linker.pptxLoader and linker.pptx
Loader and linker.pptx
DrTThendralCompSci
 
SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
DrTThendralCompSci
 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
DrTThendralCompSci
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
DrTThendralCompSci
 
SOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
DrTThendralCompSci
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
DrTThendralCompSci
 
Ethernet.ppt
Ethernet.pptEthernet.ppt
Ethernet.ppt
DrTThendralCompSci
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci
 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
DrTThendralCompSci
 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
DrTThendralCompSci
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci
 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
DrTThendralCompSci
 
PROCESS MODELS.ppt
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
DrTThendralCompSci
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci
 

Plus de DrTThendralCompSci (15)

Loader and linker.pptx
Loader and linker.pptxLoader and linker.pptx
Loader and linker.pptx
 
SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
 
SOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Ethernet.ppt
Ethernet.pptEthernet.ppt
Ethernet.ppt
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
 
PROCESS MODELS.ppt
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 

Dernier

Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Dernier (20)

Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

The Application Layer.ppt

  • 1. The Application Layer 10/29/2023 Dr.T.Thendral - CN
  • 2. DNS—The Domain Name System • IP addresses: These addresses are hard for people to remember • To solve these problems, DNS (the Domain Name System) was invented. • DNS is the phonebook of the Internet • DNS translates domain names to IP addresses so browsers can load Internet resources. 10/29/2023 Dr.T.Thendral - CN
  • 3. The DNS Name Space • A portion of the Internet domain name space 10/29/2023 Dr.T.Thendral - CN
  • 5. EXAMPLES • 1. cs.yale.edu (Yale University, in the United States) • 2. cs.vu.nl (Vrije Universiteit, in The Netherlands) • 3. cs.keio.ac.jp (Keio University, in Japan) 10/29/2023 Dr.T.Thendral - CN
  • 6. Resource Records • Every domain, whether it is a single host or a top-level domain, can have a set of resource records associated with it • For a single host, the most common resource record is just its IP address • A resource record is a five-tuple • The format we will use is as follows: Domain_name Time_to_live Class Type Value 10/29/2023 Dr.T.Thendral - CN
  • 7. • The Domain_name tells the domain to which this record applies • The Time_to_live field gives an indication of how stable the record is • The third field of every resource record is the Class • For Internet information, it is always IN. 10/29/2023 Dr.T.Thendral - CN
  • 8. The Principal DNS Resource Record Types For Internet Protocol version 4 (IPv4) 10/29/2023 Dr.T.Thendral - CN IPv4 an address consists of 32 bits
  • 10. Name Servers • DNS name server is a server that stores the DNS records • To avoid the problems associated with having only a single source of information, the DNS name space is divided into nonoverlapping zones 10/29/2023 Dr.T.Thendral - CN
  • 13. Electronic Mail • Electronic mail, or e-mail, as it is known to its many fans, has been around for over two decades • Before 1990, it was mostly used in academia • E-mail, like most other forms of communication, has its own conventions and styles • In particular, it is very informal and has a low threshold of use • E-mail is full of jargon such as BTW (By The Way), ROTFL (Rolling On The Floor Laughing), and IMHO (In My Humble Opinion) 10/29/2023 Dr.T.Thendral - CN
  • 14. Some smileys • Many people also use little ASCII symbols called smileys or emoticons in their e-mail 10/29/2023 Dr.T.Thendral - CN
  • 15. Some of the complaints were as follows: 1. Sending a message to a group of people was inconvenient. Managers often need this facility to send memos to all their subordinates. 2. Messages had no internal structure, making computer processing difficult For example, if a forwarded message was included in the body of another message, extracting the forwarded part from the received message was difficult. 3. The originator (sender) never knew if a message arrived or not. 4. If someone was planning to be away on business for several weeks and wanted all incoming e-mail to be handled by his secretary, this was not easy to arrange. 5. The user interface was poorly integrated with the transmission system requiring users first to edit a file, then leave the editor and invoke the file transfer program. 6. It was not possible to create and send messages containing a mixture of text, drawings, facsimile, and voice 10/29/2023 Dr.T.Thendral - CN
  • 16. Architecture and Services • They normally consist of two subsystems: • The user agents, which allow people to read and send e-mail, and the message transfer agents, which move the messages from the source to the destination • Typically, e-mail systems support five basic functions • Composition, Transfer, Reporting, Displaying, Disposition 10/29/2023 Dr.T.Thendral - CN
  • 17. • Most systems allow users to create mailboxes to store incoming e-mail • Commands are needed to create and destroy mailboxes, inspect the contents of mailboxes, insert and delete messages from mailboxes, and so on. • This gives rise to the idea of a mailing list, which is a list of e-mail addresses • A key idea in e-mail systems is the distinction between the envelope and its contents • The message inside the envelope consists of two parts: the header and the body 10/29/2023 Dr.T.Thendral - CN
  • 18. The User Agent • Sending E-mail, Reading E-mail • An example display of the contents of a mailbox 10/29/2023 Dr.T.Thendral - CN
  • 19. Message Formats 10/29/2023 Dr.T.Thendral - CN RFC 822 header fields related to message transport
  • 21. MIME—The Multipurpose Internet Mail Extensions 1. Messages in languages with accents (e.g., French and German) 2. Messages in non-Latin alphabets (e.g., Hebrew and Russian) 3. Messages in languages without alphabets (e.g., Chinese and Japanese) 4. Messages not containing text at all (e.g., audio or images) 10/29/2023 Dr.T.Thendral - CN
  • 24. Message Transfer • SMTP—The Simple Mail Transfer Protocol • (a) Sending and reading mail when the receiver has a permanent Internet connection and the user agent runs on the same machine as the message transfer agent • (b) Reading e-mail when the receiver has a dial-up connection to an ISP (internet service provider) 10/29/2023 Dr.T.Thendral - CN
  • 25. Network Security • Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone • Some people who cause security problems and why 10/29/2023 Dr.T.Thendral - CN
  • 26. • Network security problems can be divided roughly into four areas: • secrecy, authentication, nonrepudiation, and integrity control 10/29/2023 Dr.T.Thendral - CN
  • 27. Cryptography • Cryptography comes from the Greek words for ''secret writing.'‘ • Professionals make a distinction between ciphers and codes • A cipher is a character-for-character or bit- for-bit transformation, without regard to the linguistic structure of the message • In contrast, a code replaces one word with another word or symbol 10/29/2023 Dr.T.Thendral - CN
  • 29. Substitution Ciphers • In a substitution cipher each letter or group of letters is replaced by another letter or group of letters to disguise it • One of the oldest known ciphers is the Caesar cipher, attributed to Julius Caesar. • In this method, a becomes D, b becomes E, c becomes F, ... , and z becomes C 10/29/2023 Dr.T.Thendral - CN
  • 30. • The next improvement is to have each of the symbols in the plaintext, say, the 26 letters for simplicity, map onto some other letter. • For example, • plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z • ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C V B N M • The general system of symbol-for-symbol substitution is called a monoalphabetic substitution • The plaintext attack would be transformed into the ciphertext QZZQEA 10/29/2023 Dr.T.Thendral - CN
  • 31. Transposition Ciphers • Transposition ciphers, in contrast, reorder the letters but do not disguise them • In this example, MEGABUCK is the key 10/29/2023 Dr.T.Thendral - CN
  • 32. One-Time Pads • First choose a random bit string as the key • Then convert the plaintext into a bit string, for example by using its ASCII representation • With a one-time pad, the encryption algorithm is simply the XOR operation • The resulting ciphertext cannot be broken, This method, known as the one-time pad 10/29/2023 Dr.T.Thendral - CN
  • 34. Two Fundamental Cryptographic Principles • Redundancy - The first principle is that all encrypted messages must contain some redundancy, that is, information not needed to understand the message • Cryptographic principle 1: Messages must contain some redundancy • EX: CRC, Hamming or Reed Solomon code is a more efficient way to do error detection and correction 10/29/2023 Dr.T.Thendral - CN
  • 35. Freshness • Cryptographic principle 2: Some method is needed to foil replay attacks • The second cryptographic principle is that some measures must be taken to ensure that each message received can be verified as being fresh, that is, sent very recently 10/29/2023 Dr.T.Thendral - CN