Application Layer
Application Layer
• Application Layer provides a facility by which users can forward several emails and it
also provides a storage facility.
• This layer allows users to access, retrieve and manage files in a remote computer.
• It allows users to log on as a remote host.
• This layer provides access to global information about various services.
• This layer provides services which include: e-mail, transferring files, distributing results
to the user, directory services, network resources and so on.
• It provides protocols that allow software to send and receive information and present
meaningful data to users.
• It handles issues such as network transparency, resource allocation and so on.
• This layer serves as a window for users and application processes to access network
services.
HTTP
• FTP (File Transfer Protocol) is a standard network protocol used for the transfer of files from one host to
another over a TCP-based network, such as the Internet.
• FTP works by opening two connections that link the computers trying to communicate with each other.
• One of the main reasons why modern businesses and individuals need FTP is its ability to perform large file
size transfers.
• The three most common ways of using FTP include:
1. Via a web browser: With a web browser, you do not need any special software or a client to download
files from servers that provide for FTP sites.
2. A general user interface (GUI) FTP client: These third-party applications enable users to connect and
then send files over FTP.
3. Command-line FTP: Major operating systems come equipped with FTP client capabilities as a command
line.
FTP
• FTP uses Transport control protocol, which provides reliability and flow control that can
guarantee that the file will reach its destination while the connection is established.
• TFTP uses User Datagram protocol which doesn't establish a connection and therefore
cannot guarantee that files to get to their destinations.
SMTP
1. Composition of Mail: A user sends an e-mail by composing an electronic mail message using a Mail User Agent (MUA).
Mail User Agent is a program which is used to send and receive mail. The message contains two parts: body and header. The
body is the main part of the message while the header includes information such as the sender and recipient address. The
header also includes descriptive information such as the subject of the message.
2. Submission of Mail: After composing an email, the mail client then submits the completed e-mail to the SMTP server by
using SMTP on TCP port 25.
3. Delivery of Mail: E-mail addresses contain two parts: username of the recipient and domain name. For
example, [email protected], where "vivek" is the username of the recipient and "gmail.com" is the domain name.
Receipt and Processing of Mail: Once the incoming message is received, the exchange server delivers it to the incoming
server (Mail Delivery Agent) which stores the e-mail where it waits for the user to retrieve it.
4. Access and Retrieval of Mail: The stored email in MDA can be retrieved by using MUA (Mail User Agent). MUA can be
accessed by using login and password.
SIMPLE NETWORK MANAGEMENT PROTOCOL
• A manager is a host that runs the SNMP client program while the agent is a router that runs the
SNMP server program.
• Management of the internet is achieved through simple interaction between a manager and agent.
• The agent is used to keep the information in a database while the manager is used to access the
values in the database. For example, a router can store the appropriate variables such as a number
of packets received and forwarded while the manager can compare these variables to determine
whether the router is congested or not.
• Agents can also contribute to the management process. A server program on the agent checks the
environment, if something goes wrong, the agent sends a warning message to the manager.
SNMP
or if plaintext is viewed as a
where letters of plaintext sequence of bits, then
are replaced by other substitution involves
letters or by numbers or replacing plaintext bit
symbols patterns with ciphertext bit
patterns
• earliest known substitution cipher
• Developed by Julius Caesar
• first attested use in military affairs
Caesar • replaces each letter by 3rd letter on
• example:
Cipher meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
• can define transformation as:
abcdefghijklmnopqrstuvwxyz
DEFGHIJKLMNOPQRSTUVWXYZABC
• mathematically give each letter a number
abcdefghij k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
22 23 24 25
• rather than just shifting the alphabet
• could shuffle (jumble) the letters arbitrarily
Monoalphabeti • each plaintext letter maps to a different random
ciphertext letter
c Cipher
• hence key is 26 letters long
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
• Plaintext: ifwewishtoreplaceletters
• Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Numbers of keys used
Single –Symmetric
Two keys -
Asymmetric
Symmetric v/s Asymmetric key
COMPARISON SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY