Application Layer (PPT)
Application Layer (PPT)
Syllabus:
4
Unit-V Application Layer
Syllabus:
• Application Layer Protocols: DNS, FTP, TFTP, HTTP/HTTPS, SMTP, POP, IMAP.
• IEEE 802.11: Architecture, MAC Sub Layer, Addressing Mechanism, Physical Layer,
MIT ADT University SOE Department of Computer Science and Engineering Computer Networks
Course Outcomes
? Explain the different protocols used at application layer i.e. HTTP, SNMP, SMTP,
FTP, TELNET and IMAP
Client process:
initiates communication
Server process:
waits to be contacted
▪ Two or more computers are connected and are able to share resources
without having a dedicated server
▪ Every end device can function as a client or server on a ‘per request’
basis
▪ Resources are decentralized (information can be located anywhere)
▪ Difficult to enforce security and policies
▪ User accounts and access rights have to be set individually on each peer
device
Common Port Numbers
❑ TCP
FTP – 20-21
Telnet – 23
SMTP – 25
DNS – 53 (Both TCP & UDP)
HTTP – 80
❑ UDP
DHCP – 67 & 68
POP – 110
Domain Name System (DNS)
Each terminal in network has an unique IP address and a name (name
space).
A name space that maps each address to a unique name can be organized
in two ways: flat or hierarchical
In a flat name space, a name is assigned to an address. A name in this
space is a sequence of characters without structure.
In a hierarchical name space, each name is made of several parts.
An example given below in which TCP/IP uses a DNS client and a DNS server
to map a name to an address. A user wants to use a file transfer client to access
the corresponding file transfer server running on a remote host. The user knows
only the file transfer server name, such as afilesource.com. However, the
TCP/IP suite needs the IP address of the file transfer server to make the
connection. The following six steps map the host name to an IP address:
▪ The user passes the host name to the file transfer client.
▪ The file transfer client passes the host name to the DNS client.
▪ Each computer, after being booted, knows the address of one DNS
server. The DNS client sends a message to a DNS server with a query
that gives the file transfer server name using the known IP address of
the DNS server.
▪ The DNS server responds with the IP address of the desired file transfer
server.
▪ The DNS server passes the IP address to the file transfer client.
▪ The file transfer client now uses the received IP address to access the file
transfer Server.
DNS is used for designing hierarchical name space
Example of hierarchical name space: www.staffs.ac.uk,
www.fcet.staffs.ac.uk,
gawains.staffs.ac.uk, blackboard.staffs.ac.uk
In this design the names are defined in an inverted-tree structure
with the root at the top. The tree can have only 128 levels: level
0 (root) to level 127
Domain Name and Label
Domain Name
▪ Each node in the tree has a domain name. A full domain name is a
sequence of labels separated by dots (.). The domain names are
always read from the node up to the root. The last label is the label
of the root (null). This means that a full domain name always ends in
a null label, which means the last character is a dot because the null
string is nothing.
▪ If a label is terminated by a null string, it is called a fully qualified
domain name (FQDN).
DNS Server
Stores domain name space information within its domain/subdomain.
DSN Services and Protocol
❑ Active Documents
? For many applications, a program or a script needs to be run at
the client site. These are called active documents. For example,
suppose a program that creates animated graphics on the screen
or a program that interacts with the user. When a browser
requests an active document, the server sends a copy of the
document or a script. The document is then run at the client
(browser) site.
MIT ADT University SOE Department of Computer Science and Engineering Computer
Networks
HyperText Transfer Protocol (HTTP)
▪ The Hyper Text Transfer Protocol (HTTP) is used to define how the
client-server programs can be written to retrieve web pages from the Web. An
HTTP client sends a request; an HTTP server returns a response. The server
uses the port number 80.
▪ HTTP uses the services of TCP. This means that, before any transaction
between the client and the server can take place, a connection need s to be
established between them. After the transaction, the connection should be
terminated.
WWW Service and HTTP
Steps:
1. URL is typed in the address bar.
2. Browser checks with DNS server to convert it to an IP address
3. Connects to the server requested
4. Using HTTP or HTTPS protocol requirements, the browser sends a GET
request to the server to ask for the desired html document (usually index.html)
5. The server sends the HTML code for the web page to the browser.
6. The browser interprets the HTML code and formats the page to fit the browser
window.
Parameter HTTP HTTPS
32 It is hypertext transfer It is hypertext transfer protocol
Protocol
protocol. with secure.
It is designed to prevent
It is less secure as the data hackers from accessing
Security
can be vulnerable to hackers. critical information. It is secure
against such attacks.
Port It uses port 80 by default It was use port 443 by default.
Starts with HTTP URLs begin with http:// HTTPs URLs begin with https://
If the website needs to collect
It’s a good fit for websites
the private information such
Used for designed for information
as credit card number, then it
consumption like blogs.
is a more secure protocol.
HTTPS scrambles the data
HTTP does not scramble the before transmission. At the
data to be transmitted. That’s receiver end, it descrambles
Scrambling why there is a higher chance to recover the original data.
that transmitted information is Therefore, the transmitted
available to hackers. information is secure which
MIT ADT University SOE Department of Computer Science and Engineering Computer
Networks can’t be hacked.
33
Both the File Transfer Protocol (FTP) and the Trivial File Transfer Protocol
(TFTP) are used to transfer files between systems. FTP is a widely used protocol
that allows the remote user to navigate the server's file structure and upload and
download files. TFTP is a simplified alternative to FTP that provides no
authentication and is most often used to transfer configurations to and from
network devices.
39
? FTP is used for copying files from one host to another host
location. FTP works on Port 20 and 21. Port 20 is used for data
and Port 21 is used for connection control.
? TFTP is lighter than FTP and is used when a file transfer
functionality is needed without FTP features. It works on Port 69
and follows the UDP protocol.
40 Key FTP TFTP
Stands For FTP stands for File Transfer Protocol. TFTP stands for Trivial File
Transfer Protocol.
Ports FTP works on ports 20 and 21. TFTP works on port 69.
Complexity FTP is more complex than TFTP. TFTP is less complex than FTP.
Commands FTP has lots of commands or messages. TFTP has only five messages.
Working of IMAP
15.53
Connection of a wired LAN and a wireless LAN to other networks
15.54
Access Control
- How a wireless host can get access to the shared
medium (air)
15.55
Hidden station problem
15.56
IEEE 802.11 PROJECT
15.57
IEEE 802 Standards Working Groups
58
802.15.4 ZigBee
59
15.61
Extended service set (ESS)
15.62
Wireless Physical Layer
63
? Physical layer conforms to OSI (five options)
? 1997: 802.11 infrared, FHSS, DSSS {FHSS and DSSS run in the 2.4GHz band}
? 1999: 802.11a OFDM and 802.11b HR-DSSS
? 2001: 802.11g OFDM
? 802.11 Infrared
? Two capacities: 1 Mbps or 2 Mbps.
? Range is 10 to 20 meters and cannot penetrate walls.
? Does not work outdoors.
? 802.11 FHSS (Frequence Hopping Spread Spectrum)
? The main issue is multipath fading.
? [P&D] The idea behind spread spectrum is to spread the signal over a
wider frequency to minimize the interference from other devices.
? 79 non-overlapping channels, each 1 Mhz wide at low end of 2.4 GHz ISM
band.
? The same pseudo-random number generator used by all stations to start the
hopping process.
? Dwell time: min. time on channel before hopping (400msec).
Wireless Physical Layer
? 802.11 DSSS (Direct Sequence Spread Spectrum)
? The main idea is to represent each bit in the frame by multiple bits in the
transmitted signal (i.e., it sends the XOR of that bit and n random bits).
? Spreads signal over entire spectrum using pseudo-random sequence (similar to
CDMA see Tanenbaum sec. 2.6.2).
? Each bit transmitted using an 11-bit chipping Barker sequence, PSK at
1Mbaud.
? This yields a a capacity of 1 or 2 Mbps.
15.70
CSMA/CA and NAV
15.71
NA
V
Frame format
15.72
Addressing Mechanism
- The IEEE 802.11 addressing mechanism
specifies four cases, defined by the value of the
two flags in the FC field, To DS and From DS.
15.73
Addresses
15.74
Addressing
mechanisms
15.75
Exposed station
problem
15.76
77
Bluetooth
It is a Wireless Personal Area Network (WPAN) technology and is used
for exchanging data over smaller distances. This technology was
invented by Ericson in 1994.
It operates in the unlicensed, industrial, scientific and medical (ISM)
band from 2.4 GHz to 2.485 GHz. Maximum devices that can be
connected at the same time are 7. Bluetooth ranges up to 10 meters.
It provides data rates up to 1 Mbps or 3 Mbps depending upon the
version. The spreading technique that it uses is FHSS
(Frequency-hopping spread spectrum).
A Bluetooth network is called a piconet and a collection of
interconnected piconets is called scatternet.
78
Topic/Title
What is bluetooth.
Bluetooth Transmission capacity 720 kbps.
Bluetooth is Wireless.
Bluetooth is Low cost short distance radio communications standard
.
Bluetooth is robust and flexible .
Bluetooth is cable replacement technology that can be used to
connect almost any device to any other device.
The basic architecture unit of a bluetooth is a piconet.
MIT ADT University SOE Department of Computer Science and Engineering Computer Networks
79
Bluetooth Architecture:
The architecture of Bluetooth defines two types of networks:
1. Piconet 2. Scatternet
80
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes. Thus, we can say
that there is a total of 8 active nodes which are present at a distance of 10 meters.
The communication between the primary and secondary nodes can be one-to-one or
one-to-many. Possible communication is only between the master and slave;
Slave-slave communication is not possible. It also has 255 parked nodes, these are
secondary nodes and cannot take participation in communication unless it gets
converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act
as master or we can say primary in another piconet. This kind of node can receive a
message from a master in one piconet and deliver the message to its slave in the
other piconet where it is acting as a slave. This type of node is referred to as a
bridge node. A station cannot be mastered in two piconets.
81
MIT ADT University SOE Department of Computer Science and Engineering Computer Networks
Protocols in the Bluetooth Protocol Architecture
82
•Physical Layer − This includes Bluetooth radio and Baseband (also in the data link
layer.
• Radio − This is a physical layer equivalent protocol that lays down the physical
structure and specifications for transmission of radio waves. It defines air
interface, frequency bands, frequency hopping specifications, and modulation
techniques.
• Baseband − This protocol takes the services of radio protocol. It defines the
addressing scheme, packet frame format, timing, and power control algorithms.
•Data Link Layer − This includes Baseband, Link Manager Protocol (LMP), and
Logical Link Control and Adaptation Protocol (L2CAP).
•Link Manager Protocol (LMP) − LMP establishes logical links between Bluetooth
devices and maintains the links for enabling communications. The other main
functions of LMP are device authentication, message encryption, and negotiation of
packet sizes.
•Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP provides adaption
between upper layer frame and baseband layer frame format. L2CAP provides support
for both connection-oriented as well as connectionless services.
83
Topic/Title
MIT ADT University SOE Department of Computer Science and Engineering Computer Networks
84
LoRa
What is LoRa?
LoRa technology was developed by a company called Semtech and it is a new wireless protocol
designed specifically for long-range, low-power communications. LoRa stands for Long Range
Radio and is mainly targeted for M2M and IoT networks. This technology will enable public or
multi-tenant networks to connect a number of applications running on the same network.
LoRa Alliance was formed to standardize LPWAN (Low Power Wide Area Networks) for IoT and
is a non-profit association which features membership from a number of key market shareholders
such as CISCO, actility, MicroChip, IBM, STMicro, SEMTECH, Orange mobile and many more.
This alliance is key to providing interoperability among multiple nationwide networks.
Each LoRa gateway has the ability to handle up to millions of nodes. The signals can span a
significant distance, which means that there is less infrastructure required, making constructing a
network much cheaper and faster to implement.
LoRa also features an adaptive data rate algorithm to help maximize the nodes battery life and
network capacity. The LoRa protocol includes a number of different layers including encryption
at the network, application and device level for secure communications.
85
86
Specification LoRa Feature
ZigBee is a Personal Area Network task group with low rate task group
4. It is a technology of home networking. ZigBee is a technological
standard created for controlling and sensing the network. As we know
that ZigBee is the Personal Area network of task group 4 so it is based
on IEEE 802.15.4 and is created by Zigbee Alliance.
ZigBee is a standard that addresses the need for very low-cost
implementation of Low power devices with Low data rates for
short-range wireless communications
99
Types of ZigBee Devices:
•Zigbee Coordinator Device: It communicates with routers. This device is
used for connecting the devices.
•Zigbee Router: It is used for passing the data between devices.
•Zigbee End Device: It is the device that is going to be controlled.
100
General Characteristics of Zigbee Standard
Thank You
MIT ADT University SOE Department of Computer Science and Engineering Computer Networks