Computer Network Unit-5
Computer Network Unit-5
M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
Application Layer
Topic
2. DNS the different perspectives from which software can be modelled.
Identify
TELNET
E-MAIL
FTP
WWW
HTTP
SNMP
Bluetooth
Firewalls
Application Layer
The Application Layer is the topmost layer in the OSI (Open Systems Interconnection)
model and the TCP/IP (Transmission Control Protocol/Internet Protocol) model. It is
2. Identify the different perspectives from which software can be modelled.
responsible for providing network services directly to end-users or applications. The
Application Layer interacts with software applications to provide communication
services and exchange data between networked devices.
Interface with User Applications: The Application Layer provides an interface between
the network and the software applications running on the end-user devices. It enables
users to interact with network resources and services.
Protocols and Services: The Application Layer encompasses a wide range of protocols
and services that facilitate various tasks, such as email transmission (SMTP), file
transfer (FTP), web browsing (HTTP), domain name resolution (DNS), remote terminal
access (Telnet), and network management (SNMP).
Data Representation and Encoding: The Application Layer is responsible for ensuring
that data exchanged between applications is properly formatted, encoded, and
understood by both the sender and receiver. It handles tasks such as data compression,
encryption, and character encoding.
Key characteristics and functions of the Application Layer
Application-Layer Gateways (ALGs): ALGs are software components or devices
that reside atthethe
2. Identify Application
different Layer and
perspectives provide
from whichtranslation andbeinterpretation
software can modelled. services
for specific applications or protocols. They are commonly used in firewalls and
network address translation (NAT) devices to inspect and modify application-layer
traffic.
Client-Server Communication: The Application Layer facilitates communication
between client and server applications in a networked environment. Client
applications initiate requests for services or resources, while server applications
respond to those requests and provide the requested services.
End-to-End Communication: The Application Layer ensures end-to-end
communication between applications across different network devices and protocols.
It abstracts the underlying network complexities and provides a unified interface for
applications to communicate regardless of the network infrastructure.
Support for Distributed Computing: With the proliferation of distributed computing
environments and cloud-based services, the Application Layer plays a crucial role in
enabling seamless communication and interaction between distributed applications
and services.
.
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
DNS
DNS
• Identify
2. DNS, ortheDomain
differentName
perspectives
System,from
is a which software
distributed can be modelled.
hierarchical naming system used to translate human-
readable domain names (like www.example.com) into IP addresses (like 192.168.1.1) and vice versa.
• It serves as the "phonebook" of the internet, allowing users to access websites and other internet
resources using easy-to-remember domain names rather than numerical IP addresses.
DNS works
1. Domain Names: Users type a domain name (e.g., www.example.com) into their web browser to access
a website or service.
2. DNS Query: The user's device (e.g., computer, smartphone) sends a DNS query to a DNS resolver
(also known as a DNS resolver server or DNS resolver cache) to resolve the domain name into an IP
address.
3. DNS Resolver: The DNS resolver is typically provided by the user's internet service provider (ISP) or
configured by the network administrator. If the resolver has the IP address cached from previous
queries, it returns the result immediately. Otherwise, it proceeds to resolve the domain name by
querying other DNS servers.
4. DNS Hierarchy: If the resolver doesn't have the IP address cached, it sends a recursive query to the
root DNS servers, which are authoritative for the root zone of the DNS hierarchy. The root servers
respond with the IP addresses of the top-level domain (TLD) servers responsible for the requested
domain's TLD (e.g., .com, .org, .net).
5. Top-Level Domain (TLD) Servers: The resolver sends another query to the TLD servers to obtain the
IP addresses of the authoritative name servers responsible for the second-level domain (e.g.,
example.com).
DNS works
1. Authoritative Name Servers: The resolver sends a query to one of the authoritative name servers
responsible for the domain (e.g., example.com). These servers have the authoritative information
about the domain's DNS records, including its IP address.
2. DNS Response: The authoritative name server responds with the IP address associated with the
domain name.
3. Caching: The resolver caches the IP address locally for future queries, reducing the need to perform
the entire resolution process again for subsequent requests to the same domain.
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
TELNET
DNS
• Identify
2. TELNET,the different
short forperspectives
"TELetype from which software
NETwork," can beprotocol
is a network modelled.
used on the internet or local area
networks to provide a bidirectional interactive text-oriented communication facility.
• It allows a user to establish a connection to a remote host or server and interact with it as if they were
directly connected to that remote system's console.
Logging
• The logging process can be further categorized into two parts:
1. Local Login
2. Remote Login
TELNET
• Identify
2. theLogin:
1. Local different perspectives
Whenever a userfrom
logswhich
into itssoftware can beitmodelled.
local system, is known as local login.
• Identify
2. Remote theLogin:
different perspectives
Remote Login isfrom which in
a process software can becan
which users modelled.
log in to a remote site i.e. computer and
use services that are available on the remote computer. With the help of remote login, a user is able to
understand the result of transferring the result of processing from the remote computer to the local
computer.
The Procedure of Remote Login
• When the user types something on the local computer, the local operating system accepts the
character.
• The local computer does not interpret the characters, it will send them to the TELNET client.
• TELNET client transforms these characters to a universal character set called
Network Virtual Terminal (NVT) characters and it will pass them to the local TCP/IP protocol
Stack.
• Commands or text which are in the form of NVT, travel through the Internet and it will arrive
at the TCP/IP stack at the remote computer.
• Characters are then delivered to the operating system and later on passed to the TELNET
server.
• Then TELNET server changes those characters to characters that can be understandable by a
remote computer.
• The remote operating system receives characters from a pseudo-terminal driver, which is a
piece of software that pretends that characters are coming from a terminal.
• The operating system then passes the character to the appropriate application program.
Network Virtual Terminal(NVT)
TELNET Commands
Commands of Telnet are identified by a prefix
character, Interpret As Command (IAC) with
code 255. IAC is followed by command and
option codes.
The basic format of the command is as shown in
the following figure :
Following are some of the important TELNET commands:
Following are some common options used with the telnet:
Code Option Meaning
1 Echo It will echo the data that is received on one side to the other side.
• Advantages of Telnet
1. It provides remote access to someone’s computer system.
2. Telnet allows the user for more access with fewer problems in data transmission.
3. Telnet saves a lot of time.
4. The oldest system can be connected to a newer system with telnet having different operating systems.
• Disadvantages of Telnet
1. As it is somehow complex, it becomes difficult to beginners in understanding.
2. Data is sent here in form of plain text, that’s why it is not so secured.
3. Some capabilities are disabled because of not proper interlinking of the remote and local devices.
• Modes of Operation
Modes of Operation
• Most telnet implementations operate in one of the following three modes:
1. Default mode
2. Character mode
3. Line mode
• 1. Default Mode: If no other modes are invoked then this mode is used. Echoing is performed in this
mode by the client. In this mode, the user types a character and the client echoes the character on the
screen but it does not send it until the whole line is completed.
• 2. Character Mode: Each character typed in this mode is sent by the client to the server. A server in
this type of mode normally echoes characters back to be displayed on the client’s screen.
• 3. Line Mode: Line editing like echoing, character erasing, etc. is done from the client side. The
client will send the whole line to the server.
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
E-MAIL
E-MAIL
• Email is a fundamental service provided over computer networks, and its operation involves various
2. components
Identify the different perspectives
and protocols from which
that facilitate software canreception,
the transmission, be modelled.
and storage of email messages. Here’s a
detailed explanation of how email works within the context of computer networks:
• Components of Email in Computer Networks
1. Email Clients
1. Software applications used by users to compose, send, receive, and manage emails (e.g., Outlook,
Thunderbird, Gmail).
2. Mail Servers
1. Servers responsible for sending, receiving, and storing emails. There are two main types:
1.SMTP Server: Handles the sending of emails.
2.IMAP/POP3 Server: Handles the retrieval of emails.
3. DNS (Domain Name System)
1. Translates domain names into IP addresses, enabling the routing of emails
to the correct mail servers.
E-MAIL
• Key Protocols
2. Identify the different perspectives from which software can be modelled.
1. SMTP (Simple Mail Transfer Protocol)
1. Used for sending emails from an email client to an email server or between email servers.
2. Operates typically on port 25, with ports 587 and 465 used for secure transmission (SMTP over SSL/TLS).
2. IMAP (Internet Message Access Protocol)
1. Used for retrieving emails from a mail server to an email client while keeping emails on the server,
allowing synchronization across multiple devices.
2. Operates typically on port 143, with port 993 used for secure connections (IMAP over SSL/TLS).
3. POP3 (Post Office Protocol version 3)
1. Used for retrieving emails from a mail server to an email client, typically
downloading emails to the local device and removing them from the server.
2.Operates typically on port 110, with port 995 used for secure connections
(POP3 over SSL/TLS).
Email Transmission Process
1. Encryption
1. SSL/TLS: Secures the connection between email clients and servers, and between servers,
ensuring that email content is encrypted during transmission.
2. Authentication
1. Email servers require user authentication to prevent unauthorized access to email accounts.
3. Spam Filtering
1. Email servers often include spam filters to detect and block unwanted emails.
4. Anti-virus Scanning
1. Emails are scanned for malware before being delivered to the recipient.
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
FTP
FTP
• File Transfer Protocol (FTP) is a standard network protocol used
for the transfer of files between a client and a server over a
2. computer
Identify thenetwork.
differentHere’s
perspectives from which explanation
a comprehensive software canof
be FTP,
modelled.
including its key components, protocols, operation, and security
considerations:
FTP?
• FTP (File Transfer Protocol) is a client-server protocol that allows
users to transfer files between computers over a TCP/IP network,
such as the internet. It was developed in the 1970s and remains
widely used for exchanging files.
• Key Components
1. FTP Client
1. A software application that initiates the connection to an FTP
server to upload or download files. Examples include FileZilla,
WinSCP, and command-line FTP utilities.
2. FTP Server
1. A server that responds to requests from FTP clients to transfer
files. It hosts the files and directories accessible via FTP.
FTP Protocol
• FTP operates on the application layer of the OSI model and relies on TCP for reliable data transfer. It uses
two main channels:
1. Control Channel
1. Used for sending commands and receiving responses between the client and server.
2. Operates on TCP port 21 by default.
2. Data Channel
1. Used for transferring actual files between the client and server.
2. Operates on a dynamically allocated port, depending on the mode (active or passive).
FTP Modes
1. Active Mode
1. The client opens a random port and informs the server of this port number.
2. The server then initiates the data connection from its port 20 to the client's specified port.
3. Firewall and NAT issues can arise because the server initiates the connection to the client.
2. Passive Mode
1. The server opens a random port and informs the client of this port number.
2. The client then initiates the data connection to the server's specified port.
3. This mode is often used to circumvent firewall and NAT issues, as the client initiates both control and
data connections.
FTP Commands
• FTP commands are text-based and follow a standard syntax. Some common commands include:
• USER: Specifies the username for authentication.
• PASS: Specifies the password for authentication.
• LIST: Lists the files and directories in the current directory.
• RETR: Retrieves (downloads) a file from the server.
• STOR: Stores (uploads) a file to the server.
• CWD: Changes the working directory on the server.
• QUIT: Closes the connection.
FTP Operation
1. Connecting to the Server
1. The client initiates a connection to the server's control port (port 21).
2. The client sends the USER and PASS commands to authenticate.
2. Navigating the Server
1. The client can change directories using the CWD command and list files using the LIST command.
3. Transferring Files
1. To download a file, the client sends the RETR command followed by the file name.
2. To upload a file, the client sends the STOR command followed by the file name.
3. Depending on the mode (active or passive), the data channel is established accordingly to transfer
the file.
4. Closing the Connection
1. The client sends the QUIT command to terminate the session.
Security Considerations
• FTP was not designed with security in mind, leading to several vulnerabilities:
1. Plaintext Transmission
1. Credentials and data are sent in plaintext, making them susceptible to interception.
2. Secure Alternatives
1. FTPS (FTP Secure): Adds SSL/TLS encryption to FTP, securing the control and data channels.
2. SFTP (SSH File Transfer Protocol): Not related to FTP but uses SSH to provide a secure file
transfer mechanism.
3. Firewall and NAT Issues
1. Active mode can have issues with firewalls and NAT, making passive mode more commonly used.
Applications of FTP
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
WWW
World Wide Web
• The World Wide Web or Web is basically a collection of information that is linked together from points all
over the world.
• It is also abbreviated as WWW.
• World wide web provides flexibility, portability, and user-friendly features.
• It mainly consists of a worldwide collection of electronic documents (i.e, Web Pages).
• It is basically a way of exchanging information between computers on the Internet.
• The WWW is mainly the network of pages consists of images, text, and sounds on the Internet which can be
simply viewed on the browser by using the browser software.
• It was invented by Tim Berners-Lee.
Components of WWW
The Components of WWW mainly falls into two
categories:
1.Structural Components
2.Semantic Components
Architecture of WWW
• The WWW is mainly a distributed client/server
service where a client using the browser can access
the service using a server. The Service that is
provided is distributed over many different locations
commonly known as sites/websites.
Each website holds one or more documents that are
generally referred to as web pages.
Where each web page contains a link to other pages
on the same site or at other sites.
These pages can be retrieved and viewed by using
browsers.
1.Client/Browser
• The Client/Web browser is basically a program
that is used to communicate with the webserver
on the Internet.
• Each browser mainly comprises of three
components and these are:
•Controller
•Interpreter
•Client Protocols
•The Controller mainly receives the input from the
input device, after that it uses the client programs
in order to access the documents.
•After accessing the document, the controller
makes use of an interpreter in order to display the
document on the screen.
•An interpreter can be Java, HTML, javascript
mainly depending upon the type of the document.
•The Client protocol can be FTP, HTTP, TELNET
• 2.Server
Components
• The Computer that is mainly available for the network resources and in order to provide services to the
other computer upon request is generally known as the server.
• The Web pages are mainly stored on the server.
• Whenever the request of the client arrives then the corresponding document is sent to the client.
• The connection between the client and the server is TCP.
• It can become more efficient through multithreading or multiprocessing. Because in this case, the server
can answer more than one request at a time.
3.URL
URL is an abbreviation of the Uniform resource locator.
•It is basically a standard used for specifying any kind of information on the Internet.
•In order to access any page the client generally needs an address.
•To facilitate the access of the documents throughout the world HTTP generally makes use of Locators.
URL mainly defines the four things:
• Protocol: It is a client/server program that is mainly used to retrieve the document. A commonly used
protocol is HTTP.
• Host Computer :It is the computer on which the information is located.
It is not mandatory because it is the name given to any computer that hosts the web page.
• Port
The URL can optionally contain the port number of the server.
If the port number is included then it is generally inserted in between the host and path and is generally
separated from the host by the colon.
• Path
It indicates the pathname of the file where the information is located.
• Given below are some of the features provided by the World Wide Web:
• Provides a system for Hypertext information
• Open standards and Open source
• Distributed.
• Mainly makes the use of Web Browser in order to provide a single interface for many services.
• Dynamic
• Interactive
• Cross-Platform
Advantages&DisAdv of WWW
Advantages of WWW
• There are some drawbacks of the WWW and these are as follows;
• It is difficult to prioritize and filter some information.
• There is no guarantee of finding what one person is looking for.
• There occurs some danger in case of overload of Information.
• There is no quality control over the available data.
• There is no regulation.
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
HTTP
• HTTP stands for Hypertext Transfer Protocol and is mainly used to access the data on the world wide web
i.e (WWW). The HTTP mainly functions as the combination of FTP(File Transfer Protocol) and
SMTP(Simple Mail Transfer Protocol).
• HTTP is one of the protocols used at the Application Layer.
• The HTTP is similar to FTP because HTTP is used to transfer the files and it mainly uses the services of
TCP.
• Also, HTTP is much simpler than FTP because there is only one TCP connection.
• In HTTP, there is no separate control connection, as only data is transferred between the client and the
server.
• The HTTP is like SMTP because the transfer of data between the client and server simply looks like
SMTP messages. But there is a difference unlike SMTP, the HTTP messages are not destined to be read
by humans as they are read and interpreted by HTPP Client(that is browser) and HTTP server.
• Also, SMTP messages are stored and then forwarded while the HTTP messages are delivered
immediately.
• The HTTP mainly uses the services of the TCP on the well-known port that is port 80.
• HTTP is a stateless protocol.
• In HTTP, the client initializes the transaction by sending a request message, and the server replies by
sending a response.
• This protocol is used to transfer the data in the form of plain text, hypertext, audio as well as video, and so
on.
Working of HTTP
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
SNMP
SNMP Protocol
•SNMP mainly stands for Simple Network Management protocol.
•It is basically a framework that is used for managing the devices on the internet by using the TCP/IP protocol
suite.
•Basically, SNMP provides a set of fundamental operations in order to monitor and maintain the Internet.
•It is an application layer protocol that was defined by the Internet engineering task force.
•This protocol is mainly used to monitor the network, detect the faults in the Network, and sometimes it is
also used to configure the remote devices.
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
Bluetooth
Bluetooth
• Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile
devices over short distances using UHF radio waves in the ISM bands, from 2.402 GHz to 2.48 GHz.
It is used to build personal area networks (PANs) and allows devices to communicate without the
need for cables, making it convenient for various applications such as audio streaming, file transfer,
and peripheral connectivity.
Key Features of Bluetooth
• The transmission capacity of Bluetooth is 720 kbps.
• Bluetooth is a wireless device.
• Bluetooth is a Low-cost and short-distance radio communications standard.
• Bluetooth is robust and flexible.
• The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
Piconet: Piconet is a type of Bluetooth network that contains one
primary node called the master node and seven active secondary
nodes called slave nodes. Thus, we can say that there is a total of 8
active nodes which are present at a distance of 10 meters. The
communication between the primary and secondary nodes can be
one-to-one or one-to-many. Possible communication is only
between the master and slave; Slave-slave communication is not
possible. It also has 255 parked nodes, these are secondary nodes
and cannot take participation in communication unless it gets
converted to the active state.
Scatternet: It is formed by using various piconets. A slave that is
present in one piconet can act as master or we can say primary in
another piconet. This kind of node can receive a message from a
master in one piconet and deliver the message to its slave in the
other piconet where it is acting as a master. This type of node is
referred to as a bridge node. A station cannot be mastered in two
piconets
Bluetooth Protocol Stack
Bluetooth Protocol Stack
1. Radio (RF) layer: It specifies the details of the air interface, including frequency, the use of frequency
hopping and transmit power. It performs modulation/demodulation of the data into RF signals. It defines the
physical characteristics of Bluetooth transceivers. It defines two types of physical links: connection-less and
connection-oriented.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system and is equivalent to the MAC
sublayer in LANs. It performs the connection establishment within a piconet, addressing, packet format,
timing and power control.
3. Link Manager protocol layer: It performs the management of the already established links which includes
authentication and encryption processes. It is responsible for creating the links, monitoring their health, and
terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also known as the heart of the Bluetooth
protocol stack. It allows the communication between upper and lower layers of the Bluetooth protocol stack. It
packages the data packets received from upper layers into the form expected by lower layers. It also performs
segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery Protocol. It allows discovering the
services available on another Bluetooth-enabled device.
Bluetooth Protocol Stack
6. RF comm layer: It is a cabal replacement protocol. It is short for Radio Frontend Component. It
provides a serial interface with WAP and OBEX. It also provides emulation of serial ports over the
logical link control and adaption protocol(L2CAP). The protocol is based on the ETSI standard TS
07.10.
7. OBEX: It is short for Object Exchange. It is a communication protocol to exchange objects between
2 devices.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony service. The basic function of
this layer is call control (setup & release) and group management for the gateway serving multiple
devices.
10. Application layer: It enables the user to interact with the application.
Types of Bluetooth
• Various types of Bluetooth are available in the market nowadays. Let us look at them.
• In-Car Headset: One can make calls from the car speaker system without the use of
mobile phones.
• Stereo Headset: To listen to music in car or in music players at home.
• Webcam: One can link the camera with the help of Bluetooth with their laptop or
phone.
• Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth
with mobile phone or laptop.
• Bluetooth Global Positioning System (GPS): To use
Global Positioning System (GPS) in cars, one can connect their phone with car system
via Bluetooth to fetch the directions of the address.
Adv and DisADv and Its application
• Advantages of Bluetooth
• It is a low-cost and easy-to-use device.
• It can also penetrate through walls.
• It creates an Ad-hoc connection immediately without any wires.
• It is used for voice and data transfer.
• Disadvantages of Bluetooth
• It can be hacked and hence, less secure.
• It has a slow data transfer rate of 3 Mbps.
• Bluetooth communication does not support routing.
• Applications of Bluetooth
• It can be used in wireless headsets, wireless PANs, and LANs.
• It can connect a digital camera wireless to a mobile phone.
• It can transfer data in terms of videos, songs, photographs, or files from one cell phone to another cell
phone or computer.
• It is used in the sectors of Medical healthcare, sports and fitness, Military.
Mr. M Purnachandrarao
Assistant Professor
Department of
CSE(Data Science)
Course Name
Computer Network
Topic Name
UNIT-5
Firewall
• A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules accepts, rejects, or drops
that specific traffic.
•Accept: allow the traffic
•Reject: block the traffic but reply with an “unreachable error”
•Drop : block the traffic with no reply
• Protection from unauthorized access: Firewalls can be set up to restrict incoming traffic from
particular IP addresses or networks, preventing hackers or other malicious actors from easily accessing
a network or system. Protection from unwanted access.
• Prevention of malware and other threats: Malware and other threat prevention: Firewalls can be set
up to block traffic linked to known malware or other security concerns, assisting in the defense against
these kinds of attacks.
• Control of network access: By limiting access to specified individuals or groups for particular servers
or applications, firewalls can be used to restrict access to particular network resources or services.
• Monitoring of network activity: Firewalls can be set up to record and keep track of all network
activity.
• Regulation compliance: Many industries are bound by rules that demand the usage of firewalls or
other security measures.
• Network segmentation: By using firewalls to split up a bigger network into smaller subnets, the
attack surface is reduced and the security level is raised.
Disadvantages of using Firewall
• Complexity: Setting up and keeping up a firewall can be time-consuming and difficult, especially for
bigger networks or companies with a wide variety of users and devices.
• Limited Visibility: Firewalls may not be able to identify or stop security risks that operate at other
levels, such as the application or endpoint level, because they can only observe and manage traffic at
the network level.
• False sense of security: Some businesses may place an excessive amount of reliance on their
firewall and disregard other crucial security measures like endpoint security or intrusion detection
systems.
• Limited adaptability: Because firewalls are frequently rule-based, they might not be able to respond
to fresh security threats.
• Performance impact: Network performance can be significantly impacted by firewalls, particularly
if they are set up to analyze or manage a lot of traffic.
• Limited scalability: Because firewalls are only able to secure one network, businesses that have
several networks must deploy many firewalls, which can be expensive.
• Limited VPN support: Some firewalls might not allow complex VPN features like split tunneling,
which could restrict the experience of a remote worker.
• Cost: Purchasing many devices or add-on features for a firewall system can be expensive, especially
for businesses.
Thank You