SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
Business Data Communications and Networking   8th Edition   Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc  Copyright 2005 John Wiley & Sons, Inc 2 -
Application Layer Chapter 2 Copyright 2005 John Wiley & Sons, Inc 2 -
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Application Layer - Introduction Copyright 2005 John Wiley & Sons, Inc 2 -  Application Layer Network Layer Transport Layer Applications (e.g., email, web,  word processing) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Host-Based Architectures Copyright 2005 John Wiley & Sons, Inc 2 -  ,[object Object],[object Object],or a PC running a terminal emulation program
Problems with Host-based Arch. ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Client-Based Architectures Copyright 2005 John Wiley & Sons, Inc 2 -  Was popular in 1980s with the widespread use of PCs, LANs, and programs such as spreadsheets and word processors Example: Using a word processing on a PC and storing data (file) on a server
Problems with Client-Based Arch. ,[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Client-Server Architectures Copyright 2005 John Wiley & Sons, Inc 2 -  Client (PC) Server (PC, mini, mainframe) Presentation logic Application logic Data Access logic Data Storage Application logic may reside on the client, server or be split up between the two Used by most networks today  Example: Using a Web browser to get pages from
Client-Server Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Middleware ,[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -  Middleware client application programs server application programs a standard way of translating between software from different vendors ,[object Object],[object Object]
Multi-tier Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
3-tier Architecture Copyright 2005 John Wiley & Sons, Inc 2 -
N-tier Architecture Copyright 2005 John Wiley & Sons, Inc 2 -
Multi-tier Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Fat vs. Thin Clients ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Thin-Client Example: Web Architecture Copyright 2005 John Wiley & Sons, Inc 2 -  Client (PC) Web Server (PC, mini, mainframe) Presentation logic Application Logic Data Access logic Data Storage
Criteria for Choosing Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Choosing an Architecture Copyright 2005 John Wiley & Sons, Inc 2 -    Host-Based Client-Based Client-Server Cost of Infrastructure High Medium Low Cost of Development Low Medium High Scalability Low Medium High
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
World Wide Web ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -  CERN - Centre Européan pour Rechèrche Nucleaire NCSA - National Center for Supercomputing Applications
How the Web Works Copyright 2005 John Wiley & Sons, Inc 2 -  HTTP Response HTTP Request Client Computer Server Computer HTTP - Hypertext Transfer Protocol Main Web communications protocol: Clicking on a hyperlink or typing a URL into a browser starts a request-response cycle A request-response cycle:   include multiple steps since web pages often contain embedded files, such as graphics, each requiring a separate response.
HTTP Request Message Copyright 2005 John Wiley & Sons, Inc 2 -  Request line ( command,  URL, HTTP version number) Request header ( information on the browser,  date, and the referring page ) Request body (information sent to the server,  e.g.,  from a form) required optional optional (If the user types in the URL by themselves, then the referring page is blank.)
Example of an HTTP Request Copyright 2005 John Wiley & Sons, Inc 2 -  GET http://www.kelley.indiana.edu/ardennis/home.htm HTTP/1.1 Date: Mon 06 Aug 2001 17:35:46 GMT User-Agent: Mozilla/6.0 Referer: http://www.indiana.edu/~aisdept/faculty.htm Request Header Request  Line Web browser (code name for Netscape) Command URL   HTTP version URL that contained the link to the requested URL Note that this HTTP Request message has no “Body” part. GMT – Greenwich Mean Time
HTTP Response Message Copyright 2005 John Wiley & Sons, Inc 2 -  Response status ( http version number, status code, reason) Response header ( information on the server, date,  URL of the page retrieved, format used ) Response body (requested web page) optional optional required
Example of an HTTP Response Copyright 2005 John Wiley & Sons, Inc 2 -  <html> <head> <title>Allen R. Dennis</title> </head> <body> <H2> Allen R. Dennis </H2> <P>Welcome to the home page of Allen R. Dennis</P> </body> </html> Date: Mon 06 Aug 2001 17:35:46 GMT  Server: NCSA/1.3  Location: http:// www.kelley.indiana.edu/adennis/home.htm  Content-type: text/html Response Header Response  Body HTTP/1.1  200  OK Response Status Another example of response status:  HTTP/1.1  404  page not found)
HTML - Hypertext Markup Language ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Electronic Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
E-mail Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Two-Tier E-mail Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
How SMTP Works Copyright 2005 John Wiley & Sons, Inc 2 -  LAN Internet LAN with e-mail client software  Client computer  Server computer with Server computer with e-mail server software e-mail server software SMTP packet SMTP packet SMTP packet SMTP packet IMAP or  POP packet (“message transfer agent”) an e-mail message is sent as an SMTP packet to the local mail server reads the packet’s destination address and sends it over the Internet to the receiver’s mail server. stores the message in the receiver’s mail box contacts the mail server which then downloads the message (“user agent”) Client computer
Host Based e-mail Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Three-Tier Client-Server Arch. Copyright 2005 John Wiley & Sons, Inc 2 -  Client computer with Web Browser Server computer with  Web server  software Server computer with  email server  software performs the same functions as the mail server in the two-tier example sends HTTP requests to the Web server ,[object Object],[object Object],Best known example: Web based email (e.g., Hotmail) No need for an email user agent
Web-based e-mail Copyright 2005 John Wiley & Sons, Inc 2 -  LAN LAN SMTP packet SMTP packet SMTP packet Internet Client computer with Client computer with Server computer with Server computer with Server computer with Web server software Web server software e-mail server software IMAP or POP packet IMAP packet HTTP request HTTP request HTTP response HTTP response Web browser Web browser Server computer with email server software
SMTP Message Copyright 2005 John Wiley & Sons, Inc 2 -  Header ( source and destination addresses, date, subject,  and other information about the e-mail message) Body ( message itself) Attachments (additional files included  along with the e-mail message )
Sample SMTP Message ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -  Header Body Note that this SMTP message has no attachments. Unique ID used to keep track of messages. Text in “ “ are ignored
MIME ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Listserv Discussion Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
File Transfer Protocol (FTP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Telnet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Instant Messaging (IM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
How Instant Messaging Works Copyright 2005 John Wiley & Sons, Inc 2 -  LAN LAN LAN IM packet IM packet IM packet IM packet Internet Server computer with IM client software e-mail client software Client computer with Client computer with with IM server software sends a request to the IM server telling it that you are online. If a friend connects, the IM server sends a packet to your IM client and vice versa If a chat session has more than two clients, multiple packets are sent by the IM server. IM servers can also relay information to other IM servers. When you type some text, your IM client sends the text in a packet to the IM server which relays it to your friend.
Videoconferencing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Videoconferencing Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Webcasting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Implications for Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -
Copyright 2005 John Wiley & Sons, Inc. ,[object Object],Copyright 2005 John Wiley & Sons, Inc 2 -

Contenu connexe

Tendances

Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Chapter 2 : Application Layer
Chapter 2 : Application LayerChapter 2 : Application Layer
Chapter 2 : Application LayerAmin Omi
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 
Application layer chapter-9
Application layer chapter-9Application layer chapter-9
Application layer chapter-9Student
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layerKritika Purohit
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Application layer
Application layerApplication layer
Application layerreshmadayma
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
Application layer
Application layerApplication layer
Application layerreshmadayma
 

Tendances (20)

Application layer
Application layerApplication layer
Application layer
 
Application Layer
Application Layer Application Layer
Application Layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Chapter 2 : Application Layer
Chapter 2 : Application LayerChapter 2 : Application Layer
Chapter 2 : Application Layer
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer chapter-9
Application layer chapter-9Application layer chapter-9
Application layer chapter-9
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Chapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7thChapter 2 - Computer Networking a top-down Approach 7th
Chapter 2 - Computer Networking a top-down Approach 7th
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Application layer
Application layerApplication layer
Application layer
 
Chapter 2 v6.3
Chapter 2 v6.3Chapter 2 v6.3
Chapter 2 v6.3
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Application layer
Application layerApplication layer
Application layer
 

En vedette

Application Layer
Application LayerApplication Layer
Application Layerrosmida
 
Spoofing y bot net
Spoofing y bot netSpoofing y bot net
Spoofing y bot netTensor
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
HyperText Transfer Protocol
HyperText Transfer ProtocolHyperText Transfer Protocol
HyperText Transfer Protocolponduse
 
The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 

En vedette (10)

Application Layer
Application LayerApplication Layer
Application Layer
 
Spoofing y bot net
Spoofing y bot netSpoofing y bot net
Spoofing y bot net
 
Application Layer Protocol
Application Layer ProtocolApplication Layer Protocol
Application Layer Protocol
 
HTTP
HTTPHTTP
HTTP
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
HyperText Transfer Protocol
HyperText Transfer ProtocolHyperText Transfer Protocol
HyperText Transfer Protocol
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Edi layer
Edi layerEdi layer
Edi layer
 

Similaire à Application layer

Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...TylerYuli
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignmentsIsaac Akingbala
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01lonetree
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptFernandoLipardoJr
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technologyRanol R C
 
Introduction to the web
Introduction to the webIntroduction to the web
Introduction to the webSAMIR BHOGAYTA
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systemsReza Gh
 
Web topic 1 internet
Web topic 1  internetWeb topic 1  internet
Web topic 1 internetCK Yang
 
Introduction to Basic Concepts in Web
Introduction to Basic Concepts in WebIntroduction to Basic Concepts in Web
Introduction to Basic Concepts in WebJussi Pohjolainen
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfRaghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfRaghunathan52
 

Similaire à Application layer (20)

Ch02
Ch02Ch02
Ch02
 
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...Business Data Communications and Networking 12th Edition FitzGerald Solutions...
Business Data Communications and Networking 12th Edition FitzGerald Solutions...
 
Application layer assignments
Application layer assignmentsApplication layer assignments
Application layer assignments
 
Exp2003 Int Ppt 01
Exp2003 Int Ppt 01Exp2003 Int Ppt 01
Exp2003 Int Ppt 01
 
Web
WebWeb
Web
 
Ch2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.pptCh2_Ed7_Network_Applications.ppt
Ch2_Ed7_Network_Applications.ppt
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
 
Chapter2 Application
Chapter2 ApplicationChapter2 Application
Chapter2 Application
 
Introduction to the web
Introduction to the webIntroduction to the web
Introduction to the web
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
lec-01-WP.pdf
lec-01-WP.pdflec-01-WP.pdf
lec-01-WP.pdf
 
Web topic 1 internet
Web topic 1  internetWeb topic 1  internet
Web topic 1 internet
 
Introduction to Basic Concepts in Web
Introduction to Basic Concepts in WebIntroduction to Basic Concepts in Web
Introduction to Basic Concepts in Web
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
Web server
Web serverWeb server
Web server
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 

Dernier

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Dernier (20)

Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

Application layer

  • 1. Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Copyright 2005 John Wiley & Sons, Inc 2 -
  • 2. Application Layer Chapter 2 Copyright 2005 John Wiley & Sons, Inc 2 -
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Client-Based Architectures Copyright 2005 John Wiley & Sons, Inc 2 - Was popular in 1980s with the widespread use of PCs, LANs, and programs such as spreadsheets and word processors Example: Using a word processing on a PC and storing data (file) on a server
  • 9.
  • 10. Client-Server Architectures Copyright 2005 John Wiley & Sons, Inc 2 - Client (PC) Server (PC, mini, mainframe) Presentation logic Application logic Data Access logic Data Storage Application logic may reside on the client, server or be split up between the two Used by most networks today Example: Using a Web browser to get pages from
  • 11.
  • 12.
  • 13.
  • 14. 3-tier Architecture Copyright 2005 John Wiley & Sons, Inc 2 -
  • 15. N-tier Architecture Copyright 2005 John Wiley & Sons, Inc 2 -
  • 16.
  • 17.
  • 18. Thin-Client Example: Web Architecture Copyright 2005 John Wiley & Sons, Inc 2 - Client (PC) Web Server (PC, mini, mainframe) Presentation logic Application Logic Data Access logic Data Storage
  • 19.
  • 20. Choosing an Architecture Copyright 2005 John Wiley & Sons, Inc 2 -   Host-Based Client-Based Client-Server Cost of Infrastructure High Medium Low Cost of Development Low Medium High Scalability Low Medium High
  • 21.
  • 22.
  • 23. How the Web Works Copyright 2005 John Wiley & Sons, Inc 2 - HTTP Response HTTP Request Client Computer Server Computer HTTP - Hypertext Transfer Protocol Main Web communications protocol: Clicking on a hyperlink or typing a URL into a browser starts a request-response cycle A request-response cycle: include multiple steps since web pages often contain embedded files, such as graphics, each requiring a separate response.
  • 24. HTTP Request Message Copyright 2005 John Wiley & Sons, Inc 2 - Request line ( command, URL, HTTP version number) Request header ( information on the browser, date, and the referring page ) Request body (information sent to the server, e.g., from a form) required optional optional (If the user types in the URL by themselves, then the referring page is blank.)
  • 25. Example of an HTTP Request Copyright 2005 John Wiley & Sons, Inc 2 - GET http://www.kelley.indiana.edu/ardennis/home.htm HTTP/1.1 Date: Mon 06 Aug 2001 17:35:46 GMT User-Agent: Mozilla/6.0 Referer: http://www.indiana.edu/~aisdept/faculty.htm Request Header Request Line Web browser (code name for Netscape) Command URL HTTP version URL that contained the link to the requested URL Note that this HTTP Request message has no “Body” part. GMT – Greenwich Mean Time
  • 26. HTTP Response Message Copyright 2005 John Wiley & Sons, Inc 2 - Response status ( http version number, status code, reason) Response header ( information on the server, date, URL of the page retrieved, format used ) Response body (requested web page) optional optional required
  • 27. Example of an HTTP Response Copyright 2005 John Wiley & Sons, Inc 2 - <html> <head> <title>Allen R. Dennis</title> </head> <body> <H2> Allen R. Dennis </H2> <P>Welcome to the home page of Allen R. Dennis</P> </body> </html> Date: Mon 06 Aug 2001 17:35:46 GMT Server: NCSA/1.3 Location: http:// www.kelley.indiana.edu/adennis/home.htm Content-type: text/html Response Header Response Body HTTP/1.1 200 OK Response Status Another example of response status: HTTP/1.1 404 page not found)
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. How SMTP Works Copyright 2005 John Wiley & Sons, Inc 2 - LAN Internet LAN with e-mail client software Client computer Server computer with Server computer with e-mail server software e-mail server software SMTP packet SMTP packet SMTP packet SMTP packet IMAP or POP packet (“message transfer agent”) an e-mail message is sent as an SMTP packet to the local mail server reads the packet’s destination address and sends it over the Internet to the receiver’s mail server. stores the message in the receiver’s mail box contacts the mail server which then downloads the message (“user agent”) Client computer
  • 33.
  • 34.
  • 35. Web-based e-mail Copyright 2005 John Wiley & Sons, Inc 2 - LAN LAN SMTP packet SMTP packet SMTP packet Internet Client computer with Client computer with Server computer with Server computer with Server computer with Web server software Web server software e-mail server software IMAP or POP packet IMAP packet HTTP request HTTP request HTTP response HTTP response Web browser Web browser Server computer with email server software
  • 36. SMTP Message Copyright 2005 John Wiley & Sons, Inc 2 - Header ( source and destination addresses, date, subject, and other information about the e-mail message) Body ( message itself) Attachments (additional files included along with the e-mail message )
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. How Instant Messaging Works Copyright 2005 John Wiley & Sons, Inc 2 - LAN LAN LAN IM packet IM packet IM packet IM packet Internet Server computer with IM client software e-mail client software Client computer with Client computer with with IM server software sends a request to the IM server telling it that you are online. If a friend connects, the IM server sends a packet to your IM client and vice versa If a chat session has more than two clients, multiple packets are sent by the IM server. IM servers can also relay information to other IM servers. When you type some text, your IM client sends the text in a packet to the IM server which relays it to your friend.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.