SlideShare a Scribd company logo
Application Layer
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Application Layer
• The application layer provides services to the user.
• Communication is provided using a logical connection, which means
that the two application layers assume that there is an imaginary direct
connection through which they can send and receive messages.
• The application layer in the OSI model is the closest layer to the end user
which means that the application layer and end user can interact
directly with the software application. The application layer programs
are based on client and servers.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Services of Application Layers
• Network Virtual terminal: An application layer allows a user to log on to a
remote host.
• File Transfer, Access, and Management (FTAM): An application allows a user
to access files in a remote computer, to retrieve files from a computer and to
manage files in a remote computer.
• Addressing: To obtain communication between client and server, there is a
need for addressing. DNS is used.
• Mail Services: An application layer provides Email forwarding and storage.
• Directory Services: An application contains a distributed database that
provides access for global information about various objects and services.
• Authentication: It authenticates the sender or receiver's message or both.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Domain Name System(DNS)
• It is a directory service that provides a mapping between the name of a host
on the network and its numerical address.
• DNS is required for the functioning of the internet.
• Each node in a tree has a domain name, and a full domain name is a sequence
of symbols specified by dots.
• DNS is a service that translates the domain name into IP addresses. This
allows the users of networks to utilize user-friendly names when looking for
other hosts instead of remembering the IP addresses.
• For example, suppose the FTP site at EduSoft had an IP address of
132.147.165.50, most people would reach this site by specifying
ftp.EduSoft.com. Therefore, the domain name is more reliable than IP
address.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Example of using the DNS service
the binding between the names and IP addresses.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Name Space
• A name space that maps each address to a unique name
• A name in this space is a sequence of characters without structure
• It can be organized in two ways: flat name space or hierarchical name space .
• Flat : a name is assigned to an address. A name in this space is a Sequence of
characters without structure.
• hierarchical name space : each name is made of several parts.
1. The first part can define the nature of the organization
2. the second part can define the name of an organization
3. the third part can define departments in the organization
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Domain Name Space
• DNS is broken up into domains, a logical organization of computers
that exist in a larger network.
• To have a hierarchical name space, a domain name space was
designed.
• In this design the names are defined in an inverted-tree structure
with the root at the top. The tree can have only 128 levels: level 0
(root) to level 127.
• The domain name space is divided into three different sections:
generic domains, country domains, and inverse domain.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Domain name space
Each node in the tree has a label, which is a string with a
maximum of 63 characters.
The root label is a null string (empty string).
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Label
• Each node in the tree has a label, which is a string with a maximum of
63 characters.
• The root label is a null string (empty string). DNS requires that
children of a node
• (nodes that branch from the same node) have different labels, which
guarantees the uniqueness of the domain names.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Domain Name
• Each node in the tree has a domain name.
• A full domain name is a sequence of labels separated by dots (.).
• The domain names are always read from the node up to the root.
• The last label is the label of the root (null).
• If a label is terminated by a null string, it is called a fully qualified domain name
(FQDN). The name must end with a null label, but because null means nothing, the
label ends with a dot.
• If a label is not terminated by a null string, it is called a partially qualified domain
name (PQDN).
• A PQDN starts from a node, but it does not reach the root. It is used when the name
to be resolved belongs to the same site as the client.
• Here the resolver can supply the missing part, called the suffix, to create an FQDN.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
DISTRIBUTION OF NAME SPACE
The information contained in the domain name space must be stored. However,
it is very inefficient and also unreliable to have just one computer store such a
huge amount of information.
Hierarchy of Name Servers
Zone
Root Server
Primary and Secondary Servers
Topics discussed in this section:
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Figure 25.6 Hierarchy of name servers
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
hierarchical name space
• In hierarchical name space, each name consists of several parts.
• First part defines the nature of the organization, second part defines
the name of an organization, third part defines department of the
organization, and so on.
• In hierarchical name space, the authority to assign and control the
name spaces can be decentralized.
• Authority for names in each partition is passed to each designated
agent.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Zone
• the complete domain name hierarchy cannot be stored on a single
server, it is divided among many servers. What a server is responsible
for or has authority over is called a zone.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Root Server
• A root server usually does not store any information about domains
but delegates its authority to other servers, keeping references to
those servers.
• There are several root servers, each covering the whole domain name
space. The root servers are distributed all around the world.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
DNS defines two types of servers
1. primary server and
2. Secondary server.
A primary server is a server that stores a file about the zone for which it is an
authority. It is responsible for creating, maintaining, and updating the zone file.
It stores the zone file on a local disk.
A secondary server is a server that transfers the complete information about
a zone from another server (primary or secondary) and stores the file on its
local disk.
The secondary server neither creates nor updates the zone files. If updating is
required, it must be done by the primary server, which sends the updated
version to the secondary.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
DNS IN THE INTERNET
• DNS is a protocol that can be used in different platforms.
• In the Internet, the domain name space (tree) is divided into three
different sections: generic domains, country domains, and the
inverse domain.
Generic Domains
Country Domains
Inverse Domain
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Generic Domains
• It defines the registered hosts according to their generic behavior.
• Each node in a tree defines the domain name, which is an index to the
DNS database.
• It uses three-character labels, and these labels describe the organization
type. Label Description
aero Airlines and aerospace companies
biz Businesses or firms
com Commercial Organizations
coop Cooperative business Organizations
edu Educational institutions
gov Government institutions
info Information service providers
int International Organizations
mil Military groups
museum Museum & other nonprofit organizations
name Personal names
net Network Support centers
org Nonprofit Organizations
pro Professional individual Organizations
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Country Domain
• The format of country domain is same as a generic domain, but it uses two-
character country abbreviations (e.g., us for the United States) in place of
three character organizational abbreviations.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Inverse Domain
• The inverse domain is used for mapping an address to a name. When the
server has received a request from the client, and the server contains the files
of only authorized clients.
• To determine whether the client is on the authorized list or not, it sends a
query to the DNS server and ask for mapping an address to the name.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
RESOLUTION
Mapping a name to an address or an address to a name is called
name-address resolution.
Resolver
Mapping Names to Addresses
Mapping Addresses to Names
Recursive Resolution
Caching
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Resolution
• A host that needs to map an address to a name or a name to an address calls a
DNS client called a resolver
• Recursive Resolution
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Recursive resolution
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Iterative Resolution
• In iterative resolution, each server that does not know the mapping
sends the IP address of the next server back to the one that
requested it.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Iterative resolution
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Caching
• Each time a server receives a query for a name that is not in its domain, it
needs to search its database for a server IP address.
• Reduction of this search time would increase efficiency. DNS handles this with
a mechanism called caching.
• First, the authoritative server always adds information to the mapping called
time to live (TTL). It defines the time in seconds that the receiving server can
cache the information.
• Second, DNS requires that each server keep a TTL counter for each mapping it
caches.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Resource Records
• The zone information associated with a server is implemented as a set of
resource records.
• In other words, a name server stores a database of resource records.
• A resource record is a 5-tuple structure
(Domain Name, Type, Class, TTL, Value)
• The domain name field is what identifies the resource record.
• The value defines the information kept about the domain name.
• The TTL defines the number of Iterative resolution seconds for which the
information is valid.
Dr.T.Abirami , Associate Professor , Department of IT , Kongu
Engineering College
Ad

More Related Content

What's hot (20)

Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Rarp
RarpRarp
Rarp
AnusuaBasu
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
Smriti Rastogi
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Dns
DnsDns
Dns
Sanoj Kumar
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
Heba_a
 
Dhcp
DhcpDhcp
Dhcp
Chinmoy Jena
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Frame relay
Frame relayFrame relay
Frame relay
Ayesha Maqsood
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
RochakSrivastava3
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 

Similar to Application layer : DNS (20)

Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
Kongu Engineering College, Perundurai, Erode
 
application layer protocols DNS,SNMP,web service.ppt
application layer protocols DNS,SNMP,web service.pptapplication layer protocols DNS,SNMP,web service.ppt
application layer protocols DNS,SNMP,web service.ppt
jayaprasanna10
 
3-Application Layer.pptx
3-Application Layer.pptx3-Application Layer.pptx
3-Application Layer.pptx
SachinDUpadhye
 
applicationlayer.pptx
applicationlayer.pptxapplicationlayer.pptx
applicationlayer.pptx
georgejustymirobi1
 
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Sisodetrupti
 
Unit 5 Applicationaaaaaaaaaaaa Layer.pdf
Unit 5 Applicationaaaaaaaaaaaa Layer.pdfUnit 5 Applicationaaaaaaaaaaaa Layer.pdf
Unit 5 Applicationaaaaaaaaaaaa Layer.pdf
AdityaGupta221734
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
ssuser8b4eb21
 
Application layer protocols-SMTP Unit-V.ppt
Application layer protocols-SMTP Unit-V.pptApplication layer protocols-SMTP Unit-V.ppt
Application layer protocols-SMTP Unit-V.ppt
jayaprasanna10
 
3_CHAP~2.PPT
3_CHAP~2.PPT3_CHAP~2.PPT
3_CHAP~2.PPT
hoangdinhhanh88
 
DNS_Presentation.pptx
DNS_Presentation.pptxDNS_Presentation.pptx
DNS_Presentation.pptx
RAJESHKUMAR216309
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
Mahavir Vataliya
 
Chapter03
Chapter03Chapter03
Chapter03
pittore44
 
Domain Name System(DNS) - Overview
Domain Name System(DNS) - OverviewDomain Name System(DNS) - Overview
Domain Name System(DNS) - Overview
Gunjan Panara
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
GPAPassedStudents
 
Active directory
Active directoryActive directory
Active directory
Prasanth Menon
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddharth Chandel
 
DNS(In_Linux).pptx
DNS(In_Linux).pptxDNS(In_Linux).pptx
DNS(In_Linux).pptx
ShanmugapriyaSenthil3
 
Lec-7-dns.pptx
Lec-7-dns.pptxLec-7-dns.pptx
Lec-7-dns.pptx
Syed Ejaz
 
Name Services and Domain Name System
Name Services and Domain Name SystemName Services and Domain Name System
Name Services and Domain Name System
Ashish KC
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
Duressa Teshome
 
application layer protocols DNS,SNMP,web service.ppt
application layer protocols DNS,SNMP,web service.pptapplication layer protocols DNS,SNMP,web service.ppt
application layer protocols DNS,SNMP,web service.ppt
jayaprasanna10
 
3-Application Layer.pptx
3-Application Layer.pptx3-Application Layer.pptx
3-Application Layer.pptx
SachinDUpadhye
 
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Exploring the Application Layer: DNS, FQDN, SMTP, Web-Based Email, and FTP Ex...
Sisodetrupti
 
Unit 5 Applicationaaaaaaaaaaaa Layer.pdf
Unit 5 Applicationaaaaaaaaaaaa Layer.pdfUnit 5 Applicationaaaaaaaaaaaa Layer.pdf
Unit 5 Applicationaaaaaaaaaaaa Layer.pdf
AdityaGupta221734
 
Application layer protocols-SMTP Unit-V.ppt
Application layer protocols-SMTP Unit-V.pptApplication layer protocols-SMTP Unit-V.ppt
Application layer protocols-SMTP Unit-V.ppt
jayaprasanna10
 
Domain Name System(DNS) - Overview
Domain Name System(DNS) - OverviewDomain Name System(DNS) - Overview
Domain Name System(DNS) - Overview
Gunjan Panara
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
GPAPassedStudents
 
Lec-7-dns.pptx
Lec-7-dns.pptxLec-7-dns.pptx
Lec-7-dns.pptx
Syed Ejaz
 
Name Services and Domain Name System
Name Services and Domain Name SystemName Services and Domain Name System
Name Services and Domain Name System
Ashish KC
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
Duressa Teshome
 
Ad

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Generative AI refers to a subset of artificial intelligence
Introduction to Generative AI refers to a subset of artificial intelligenceIntroduction to Generative AI refers to a subset of artificial intelligence
Introduction to Generative AI refers to a subset of artificial intelligence
Kongu Engineering College, Perundurai, Erode
 
Introduction to Microsoft Power BI is a business analytics service
Introduction to Microsoft Power BI is a business analytics serviceIntroduction to Microsoft Power BI is a business analytics service
Introduction to Microsoft Power BI is a business analytics service
Kongu Engineering College, Perundurai, Erode
 
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Connect to NoSQL Database (MongoDB) using Node JS & Connect Node.js with NoSQ...
Kongu Engineering College, Perundurai, Erode
 
concept of server-side JavaScript / JS Framework: NODEJS
concept of server-side JavaScript / JS Framework: NODEJSconcept of server-side JavaScript / JS Framework: NODEJS
concept of server-side JavaScript / JS Framework: NODEJS
Kongu Engineering College, Perundurai, Erode
 
Node.js web-based Example :Run a local server in order to start using node.js...
Node.js web-based Example :Run a local server in order to start using node.js...Node.js web-based Example :Run a local server in order to start using node.js...
Node.js web-based Example :Run a local server in order to start using node.js...
Kongu Engineering College, Perundurai, Erode
 
Concepts of Satellite Communication and types and its applications
Concepts of Satellite Communication  and types and its applicationsConcepts of Satellite Communication  and types and its applications
Concepts of Satellite Communication and types and its applications
Kongu Engineering College, Perundurai, Erode
 
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLANConcepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Concepts of Mobile Communication Wireless LANs, Bluetooth , HiperLAN
Kongu Engineering College, Perundurai, Erode
 
Web Technology Introduction framework.pptx
Web Technology Introduction framework.pptxWeb Technology Introduction framework.pptx
Web Technology Introduction framework.pptx
Kongu Engineering College, Perundurai, Erode
 
Computer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vectorComputer Network - Unicast Routing Distance vector Link state vector
Computer Network - Unicast Routing Distance vector Link state vector
Kongu Engineering College, Perundurai, Erode
 
Android SQLite database oriented application development
Android SQLite database oriented application developmentAndroid SQLite database oriented application development
Android SQLite database oriented application development
Kongu Engineering College, Perundurai, Erode
 
Android Application Development Programming
Android Application Development ProgrammingAndroid Application Development Programming
Android Application Development Programming
Kongu Engineering College, Perundurai, Erode
 
Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
Kongu Engineering College, Perundurai, Erode
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
Kongu Engineering College, Perundurai, Erode
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
Kongu Engineering College, Perundurai, Erode
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
Kongu Engineering College, Perundurai, Erode
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
Kongu Engineering College, Perundurai, Erode
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
Kongu Engineering College, Perundurai, Erode
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
Kongu Engineering College, Perundurai, Erode
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
Kongu Engineering College, Perundurai, Erode
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
Kongu Engineering College, Perundurai, Erode
 
Ad

Recently uploaded (20)

Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 

Application layer : DNS

  • 1. Application Layer Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 2. Application Layer • The application layer provides services to the user. • Communication is provided using a logical connection, which means that the two application layers assume that there is an imaginary direct connection through which they can send and receive messages. • The application layer in the OSI model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 3. Services of Application Layers • Network Virtual terminal: An application layer allows a user to log on to a remote host. • File Transfer, Access, and Management (FTAM): An application allows a user to access files in a remote computer, to retrieve files from a computer and to manage files in a remote computer. • Addressing: To obtain communication between client and server, there is a need for addressing. DNS is used. • Mail Services: An application layer provides Email forwarding and storage. • Directory Services: An application contains a distributed database that provides access for global information about various objects and services. • Authentication: It authenticates the sender or receiver's message or both. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 4. Domain Name System(DNS) • It is a directory service that provides a mapping between the name of a host on the network and its numerical address. • DNS is required for the functioning of the internet. • Each node in a tree has a domain name, and a full domain name is a sequence of symbols specified by dots. • DNS is a service that translates the domain name into IP addresses. This allows the users of networks to utilize user-friendly names when looking for other hosts instead of remembering the IP addresses. • For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50, most people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain name is more reliable than IP address. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 5. Example of using the DNS service the binding between the names and IP addresses. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 6. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 7. Name Space • A name space that maps each address to a unique name • A name in this space is a sequence of characters without structure • It can be organized in two ways: flat name space or hierarchical name space . • Flat : a name is assigned to an address. A name in this space is a Sequence of characters without structure. • hierarchical name space : each name is made of several parts. 1. The first part can define the nature of the organization 2. the second part can define the name of an organization 3. the third part can define departments in the organization Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 8. Domain Name Space • DNS is broken up into domains, a logical organization of computers that exist in a larger network. • To have a hierarchical name space, a domain name space was designed. • In this design the names are defined in an inverted-tree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127. • The domain name space is divided into three different sections: generic domains, country domains, and inverse domain. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 9. Domain name space Each node in the tree has a label, which is a string with a maximum of 63 characters. The root label is a null string (empty string). Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 10. Label • Each node in the tree has a label, which is a string with a maximum of 63 characters. • The root label is a null string (empty string). DNS requires that children of a node • (nodes that branch from the same node) have different labels, which guarantees the uniqueness of the domain names. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 11. Domain Name • Each node in the tree has a domain name. • A full domain name is a sequence of labels separated by dots (.). • The domain names are always read from the node up to the root. • The last label is the label of the root (null). • If a label is terminated by a null string, it is called a fully qualified domain name (FQDN). The name must end with a null label, but because null means nothing, the label ends with a dot. • If a label is not terminated by a null string, it is called a partially qualified domain name (PQDN). • A PQDN starts from a node, but it does not reach the root. It is used when the name to be resolved belongs to the same site as the client. • Here the resolver can supply the missing part, called the suffix, to create an FQDN. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 12. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 13. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 14. DISTRIBUTION OF NAME SPACE The information contained in the domain name space must be stored. However, it is very inefficient and also unreliable to have just one computer store such a huge amount of information. Hierarchy of Name Servers Zone Root Server Primary and Secondary Servers Topics discussed in this section: Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 15. Figure 25.6 Hierarchy of name servers Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 16. hierarchical name space • In hierarchical name space, each name consists of several parts. • First part defines the nature of the organization, second part defines the name of an organization, third part defines department of the organization, and so on. • In hierarchical name space, the authority to assign and control the name spaces can be decentralized. • Authority for names in each partition is passed to each designated agent. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 17. Zone • the complete domain name hierarchy cannot be stored on a single server, it is divided among many servers. What a server is responsible for or has authority over is called a zone. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 18. Root Server • A root server usually does not store any information about domains but delegates its authority to other servers, keeping references to those servers. • There are several root servers, each covering the whole domain name space. The root servers are distributed all around the world. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 19. DNS defines two types of servers 1. primary server and 2. Secondary server. A primary server is a server that stores a file about the zone for which it is an authority. It is responsible for creating, maintaining, and updating the zone file. It stores the zone file on a local disk. A secondary server is a server that transfers the complete information about a zone from another server (primary or secondary) and stores the file on its local disk. The secondary server neither creates nor updates the zone files. If updating is required, it must be done by the primary server, which sends the updated version to the secondary. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 20. DNS IN THE INTERNET • DNS is a protocol that can be used in different platforms. • In the Internet, the domain name space (tree) is divided into three different sections: generic domains, country domains, and the inverse domain. Generic Domains Country Domains Inverse Domain Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 21. Generic Domains • It defines the registered hosts according to their generic behavior. • Each node in a tree defines the domain name, which is an index to the DNS database. • It uses three-character labels, and these labels describe the organization type. Label Description aero Airlines and aerospace companies biz Businesses or firms com Commercial Organizations coop Cooperative business Organizations edu Educational institutions gov Government institutions info Information service providers int International Organizations mil Military groups museum Museum & other nonprofit organizations name Personal names net Network Support centers org Nonprofit Organizations pro Professional individual Organizations Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 22. Country Domain • The format of country domain is same as a generic domain, but it uses two- character country abbreviations (e.g., us for the United States) in place of three character organizational abbreviations. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 23. Inverse Domain • The inverse domain is used for mapping an address to a name. When the server has received a request from the client, and the server contains the files of only authorized clients. • To determine whether the client is on the authorized list or not, it sends a query to the DNS server and ask for mapping an address to the name. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 24. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 25. RESOLUTION Mapping a name to an address or an address to a name is called name-address resolution. Resolver Mapping Names to Addresses Mapping Addresses to Names Recursive Resolution Caching Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 26. Resolution • A host that needs to map an address to a name or a name to an address calls a DNS client called a resolver • Recursive Resolution Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 27. Recursive resolution Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 28. Iterative Resolution • In iterative resolution, each server that does not know the mapping sends the IP address of the next server back to the one that requested it. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 29. Iterative resolution Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 30. Caching • Each time a server receives a query for a name that is not in its domain, it needs to search its database for a server IP address. • Reduction of this search time would increase efficiency. DNS handles this with a mechanism called caching. • First, the authoritative server always adds information to the mapping called time to live (TTL). It defines the time in seconds that the receiving server can cache the information. • Second, DNS requires that each server keep a TTL counter for each mapping it caches. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College
  • 31. Resource Records • The zone information associated with a server is implemented as a set of resource records. • In other words, a name server stores a database of resource records. • A resource record is a 5-tuple structure (Domain Name, Type, Class, TTL, Value) • The domain name field is what identifies the resource record. • The value defines the information kept about the domain name. • The TTL defines the number of Iterative resolution seconds for which the information is valid. Dr.T.Abirami , Associate Professor , Department of IT , Kongu Engineering College