SlideShare a Scribd company logo
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 5
Application Layer
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Traditional applications
• Electronic Mail
• SMTP – Simple Mail Transfer Protocol
• POP 3
• IMAP
• MIME
• HTTP – Hyper Text Transfer Protocol
• Web Services
• DNS – Domain Name System
• SNMP – Simple Network Management Protocol
Application Layer
Introduction
• Applications – that are given to the END
USER.
• Every application is developed for a purpose
and have its own style of working
Apps available
That’s is not ALL.
Traditional Applications
• Among all the applications our study focuses on 2 main traditional
applications. They are :
Reason for Traditional Applications
• We call these application as traditional application because they existed
since the early days of computer networks.
Before starting the Topic…
• There are 3 general points that have to be made clear.
1. Distinguish between the Application Program and Application Protocols
2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called
simple because it only specifies the procedure, format is taken care by companion
protocol)
3. Each protocol will have a companion protocol which defines the format of the contents.
Distinguish between the Application Program and Application
Protocols
• example
Each protocol reinvents the Simple Remote procedure call (RPC)
mechanism
• Remote Procedure Call (RPC) is a protocol that one program can use to request a
service from a program located in another computer in a network without having
to understand network details. (A procedure call is also sometimes known as a
function call or a subroutine call.)
• RPC uses the client/server model.
RPC Mechanism
• Most of the application programs works on Query – Respond Principle.
• This RPC specifies, which mechanism to be followed to fetch information
from the source.
Each protocol will have a companion protocol
• This companion protocol specifies the format of the information to be
exchanged.
overview
• Application Program:
• Which is available to the end user
without knowing any knowledge
about the network.
• Application Protocol:
• Which specifies the RPC
mechanism to fetch information
available at remotely located
systems.
• Companion Protocol:
• Which specifies the format
of the data that are to be
exchanged.
Computer networks    unit v
Electronic Mail
E - Mail
• This is the one of the oldest applications.
• It is mandatory to distinguish between the User Interface – Transfer
Protocols – Companion Protocol
What happens when you press
Send Button
EMAIL CLIENT
MIME
EMAIL CLIENT
E - Mail
• Message Format – MIME
• Message Transfer – SMTP
• Mail Reader – POP / IMAP
Format of an E Mail
Message Format
• Message format is defined by the companion protocols. Two majorly used
protocols are given below.
• RFC 822 - Standard for the format of ARPA Internet text messages
• MIME - Multipurpose Internet Mail Extensions.
RFC 822
• This defines 2 parts
• Header
• Body
• Few headers are obtained by the user.
• Ex:
• TO address
• CC address
• BCC address
• Sub Text
• Few headers are added automatically by the program
• Ex:
• From Address
• Mail Server
• Date and Time
Syntax:
<Header Type> : <Header Value>
MIME
• Multipurpose Internet Mail Extensions.
• This is an supplementary protocol that allows Non ASCII data to be sent through E Mail
• This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
MIME Headers
• MIME mainly consists of 5 header:
• MIME - Version
• Content type
• Content transfer encoding
• Content ID
• Content Description
MIME Headers
Data types and subtypes in MIME
Content Transfer Encoding
Computer networks    unit v
Message Transfer
Introduction
• Once the mails are composed they are transferred to the destination using
Mail Transfer Protocols.
• Some of the popular Mail Transfer Protocols are
• SMTP – Simple Mail Transfer Protocol
• POP – Post Office Protocol
• IMAP – Internet Message Access Protocol
SMTP
• The actual mail transfer is done through the Mail Transfer Agents.
• The protocol that defines the MTA Client and Server is called SMTP.
• SMTP is used 2 Times
• Between sender and mail server.
• Between 2 mail servers.
• SMTP simply defines how commands and responses must be sent back
and forth.
SMTP Commands
SMTP Responses
Connection Establishment
Mail Transfer
Connection Termination
Message Reader / Message Access
Introduction
• SMPT is not involved in the third stage because SMTP is a Push Protocol.
• It pushes the message from the client to the server.
• The third stage need the Pull Protocol.
• The client must pull message from the server.
• Two of the popularly used message access agents are POP3 and IMAP
POP 3
• Post Office Protocol Version 3 (POP 3)
• Client POP 3 will be installed in the recipient’s computer and the server POP 3
is installed at the server.
• Message access will be initiated when the user wants to download the mail from
the server.
Modes of POP 3
• POP 3 have 2 modes
• Delete Mode
• In this mode, the mail is deleted from the mailbox after each retrieval.
• Keep Mode
• In this mode, the mail is kept is the personal computer for future access.
Exchange of Commands and Responses in POP 3
IMAP 4
• Internet Mail Access Protocol, Version 4
• IMAP 4 is similar to the POP 3 but with added features.
• The features are:
• A user can check the email header prior to downloading.
• A user can search the content of the email for a specific string
• A user can download partial email due to bandwidth constraints.
• User can create delete or rename mail boxes
• User can create hierarchy of mail boxes.
POP 3 Vs IMAP 4
My Official Account – POP 3 Setting
My Official account - IMAP Settings
MY Personal Account
Video Presentation on E - Mail
End
of
E - Mail
World Wide Web - WWW
Introduction
• The WWW is a repository of information
linked together from points all over the
world.
• The original goal of the web was to find a way to organize and retrieve information about
hyper linked documents.
• WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed
shortly)
WWW Architecture
Clients (Browsers)
1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents.
2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc.,
3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content
CLIENT
(BROWSERS)
 There are variety of browsers available that interprets and displays
a web document.
 Every client consists of three parts
Clients (Browsers)
Server
• The webpage is stored at the server
• Each time the request is received the corresponding document
is sent to the client.
• The server can be more efficient by enabling “Multithreading”
(Answering Multiple requests)
URL – Uniform Resource Locator
• When a page needs to be accessed it must have a address.
• HTTP uses locators to access the webpages available at widely distributed areas.
• URL is a standard for specifying any kind of information on the internet.
• URL defines 4 Important things:
Example URL
HTTP – Hyper Text Transfer Protocol
Introduction
• The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the
world wide web.
• HTTP is the combination of FTP and SMTP.
• It is like FTP because it uses TCP Connection.
• It is like SMTP because data transferred between the server and client looks like
SMTP messages.
HTTP Transaction
• The client initiates the transaction by sending a request message and the
server replies through an response message.
Formats of Request and Response Messages
Request Line and Status Line
Request Type
Status Code
• This field indicates the status of the request through codes.
• Codes in the range of
• 100  informational
• 200  Successful Request
• 300  Redirect the client to another URL
• 400  Error at client
• 500  Error at server
Status Codes and their Phrases
Contd..
Header
• The format of the header is shown in the figure.
• The request header and Response header have different values.
Request Header
Response Header
End
of
HTTP
Web Services
End
of
Web Services
Domain Name System - DNS
End
of
DNS
Simple Network Management Protocol - SNMP
End
of
SNMP

More Related Content

What's hot (20)

PDF
Remote Method Invocation (RMI)
Peter R. Egli
 
PPT
message passing
Ashish Kumar
 
PPTX
Media Access Control (MAC Layer)
Meenakshi Paul
 
PPTX
6.distributed shared memory
Gd Goenka University
 
PPTX
IEEE 802.11 Architecture and Services
Dhrumil Panchal
 
PPTX
Access to non local names
Varsha Kumar
 
PPTX
Models of Distributed System
Ashish KC
 
PPTX
switching techniques in data communication and networking
Harshita Yadav
 
PPTX
Presentation Routing algorithm
Basit Hussain
 
PPT
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
 
PPT
Unit 5 Application Layer
KalpanaC14
 
PPTX
Route Redistribution
NetProtocol Xpert
 
PDF
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
PDF
Location Aided Routing (LAR)
Pradeep Kumar TS
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
PPTX
Design Goals of Distributed System
Ashish KC
 
PPTX
Multicastingand multicast routing protocols
Iffat Anjum
 
PPT
Chapter 6 pc
Hanif Durad
 
Remote Method Invocation (RMI)
Peter R. Egli
 
message passing
Ashish Kumar
 
Media Access Control (MAC Layer)
Meenakshi Paul
 
6.distributed shared memory
Gd Goenka University
 
IEEE 802.11 Architecture and Services
Dhrumil Panchal
 
Access to non local names
Varsha Kumar
 
Models of Distributed System
Ashish KC
 
switching techniques in data communication and networking
Harshita Yadav
 
Presentation Routing algorithm
Basit Hussain
 
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
 
Unit 5 Application Layer
KalpanaC14
 
Route Redistribution
NetProtocol Xpert
 
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Location Aided Routing (LAR)
Pradeep Kumar TS
 
Pgp pretty good privacy
Pawan Arya
 
Design Goals of Distributed System
Ashish KC
 
Multicastingand multicast routing protocols
Iffat Anjum
 
Chapter 6 pc
Hanif Durad
 

Similar to Computer networks unit v (20)

PPT
Tcpip services and applications
Online
 
PDF
Unit 3 - Protocols and Client-Server Applications - IT
Deepraj Bhujel
 
PPTX
Application Layer Protocols in computer network.pptx
shrestha11ajay
 
PPTX
Module 5 Application and presentation Layer .pptx
AASTHAJAJOO
 
PPTX
Overview of Application Layer in OSI Model
rddbhn
 
PPTX
Computer networks
sonukumar142
 
PPTX
E mail flow
Harish Kumar
 
PPT
retrieving the mail
tumetr1
 
PPTX
Email
Deeptanu Datta
 
PPTX
Simple mail transfer protocol
Anagha Ghotkar
 
PPTX
Topic 2.4 network services
Atika Zaimi
 
PPTX
CN Unit-5.pptx dns jdlj;lvk;ckx; gfvfdcffdf
ssuser41d1711
 
PPTX
15 Application layer.pptx
MochamadSyaifulAnwar2
 
PPTX
The Internet
Amir Villas
 
PPT
Clients and Servers.ppt
Mohammed Ilyas
 
PPT
how email works
harikaveeravalli
 
PPTX
OSI Application layer. tcp/ip application layer
artisticcc11
 
PPTX
Module 1 part 2.pptx with clear notes and explanation
farsankadavandy
 
PPTX
Vishal patel.pptx
Vishalkumar605125
 
PPTX
Compute rNetwork.pptx
ShehryarFreelancer
 
Tcpip services and applications
Online
 
Unit 3 - Protocols and Client-Server Applications - IT
Deepraj Bhujel
 
Application Layer Protocols in computer network.pptx
shrestha11ajay
 
Module 5 Application and presentation Layer .pptx
AASTHAJAJOO
 
Overview of Application Layer in OSI Model
rddbhn
 
Computer networks
sonukumar142
 
E mail flow
Harish Kumar
 
retrieving the mail
tumetr1
 
Simple mail transfer protocol
Anagha Ghotkar
 
Topic 2.4 network services
Atika Zaimi
 
CN Unit-5.pptx dns jdlj;lvk;ckx; gfvfdcffdf
ssuser41d1711
 
15 Application layer.pptx
MochamadSyaifulAnwar2
 
The Internet
Amir Villas
 
Clients and Servers.ppt
Mohammed Ilyas
 
how email works
harikaveeravalli
 
OSI Application layer. tcp/ip application layer
artisticcc11
 
Module 1 part 2.pptx with clear notes and explanation
farsankadavandy
 
Vishal patel.pptx
Vishalkumar605125
 
Compute rNetwork.pptx
ShehryarFreelancer
 
Ad

More from JAIGANESH SEKAR (20)

PDF
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
PDF
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
PDF
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
PDF
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
PDF
2.10 network layer services i pv4
JAIGANESH SEKAR
 
PDF
2.9 network layer services packet switching
JAIGANESH SEKAR
 
PDF
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
PDF
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
PDF
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
PDF
2.5 access control channelization methods
JAIGANESH SEKAR
 
PDF
2.4 access control controlled access methods
JAIGANESH SEKAR
 
PDF
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
PDF
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
PDF
2.2 flow control
JAIGANESH SEKAR
 
PDF
2.1 framing
JAIGANESH SEKAR
 
PDF
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
PDF
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
PDF
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
PDF
6. data link layer physical addressing
JAIGANESH SEKAR
 
PDF
5. protocol layering
JAIGANESH SEKAR
 
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
2.2 flow control
JAIGANESH SEKAR
 
2.1 framing
JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
6. data link layer physical addressing
JAIGANESH SEKAR
 
5. protocol layering
JAIGANESH SEKAR
 
Ad

Recently uploaded (20)

PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PDF
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PDF
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
MRRS Strength and Durability of Concrete
CivilMythili
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 

Computer networks unit v

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 5 Application Layer Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Traditional applications • Electronic Mail • SMTP – Simple Mail Transfer Protocol • POP 3 • IMAP • MIME • HTTP – Hyper Text Transfer Protocol • Web Services • DNS – Domain Name System • SNMP – Simple Network Management Protocol
  • 5. Introduction • Applications – that are given to the END USER. • Every application is developed for a purpose and have its own style of working
  • 8. Traditional Applications • Among all the applications our study focuses on 2 main traditional applications. They are :
  • 9. Reason for Traditional Applications • We call these application as traditional application because they existed since the early days of computer networks.
  • 10. Before starting the Topic… • There are 3 general points that have to be made clear. 1. Distinguish between the Application Program and Application Protocols 2. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism (it is called simple because it only specifies the procedure, format is taken care by companion protocol) 3. Each protocol will have a companion protocol which defines the format of the contents.
  • 11. Distinguish between the Application Program and Application Protocols • example
  • 12. Each protocol reinvents the Simple Remote procedure call (RPC) mechanism • Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details. (A procedure call is also sometimes known as a function call or a subroutine call.) • RPC uses the client/server model.
  • 14. • Most of the application programs works on Query – Respond Principle. • This RPC specifies, which mechanism to be followed to fetch information from the source.
  • 15. Each protocol will have a companion protocol • This companion protocol specifies the format of the information to be exchanged.
  • 16. overview • Application Program: • Which is available to the end user without knowing any knowledge about the network. • Application Protocol: • Which specifies the RPC mechanism to fetch information available at remotely located systems. • Companion Protocol: • Which specifies the format of the data that are to be exchanged.
  • 19. E - Mail • This is the one of the oldest applications. • It is mandatory to distinguish between the User Interface – Transfer Protocols – Companion Protocol
  • 20. What happens when you press Send Button EMAIL CLIENT MIME EMAIL CLIENT
  • 21. E - Mail • Message Format – MIME • Message Transfer – SMTP • Mail Reader – POP / IMAP
  • 22. Format of an E Mail
  • 23. Message Format • Message format is defined by the companion protocols. Two majorly used protocols are given below. • RFC 822 - Standard for the format of ARPA Internet text messages • MIME - Multipurpose Internet Mail Extensions.
  • 24. RFC 822 • This defines 2 parts • Header • Body
  • 25. • Few headers are obtained by the user. • Ex: • TO address • CC address • BCC address • Sub Text • Few headers are added automatically by the program • Ex: • From Address • Mail Server • Date and Time Syntax: <Header Type> : <Header Value>
  • 26. MIME • Multipurpose Internet Mail Extensions. • This is an supplementary protocol that allows Non ASCII data to be sent through E Mail • This enabled the email to carry any type of attachments like documents, pdf, image, etc.,
  • 27. MIME Headers • MIME mainly consists of 5 header: • MIME - Version • Content type • Content transfer encoding • Content ID • Content Description
  • 29. Data types and subtypes in MIME
  • 33. Introduction • Once the mails are composed they are transferred to the destination using Mail Transfer Protocols. • Some of the popular Mail Transfer Protocols are • SMTP – Simple Mail Transfer Protocol • POP – Post Office Protocol • IMAP – Internet Message Access Protocol
  • 34. SMTP • The actual mail transfer is done through the Mail Transfer Agents. • The protocol that defines the MTA Client and Server is called SMTP. • SMTP is used 2 Times • Between sender and mail server. • Between 2 mail servers.
  • 35. • SMTP simply defines how commands and responses must be sent back and forth.
  • 41. Message Reader / Message Access
  • 42. Introduction • SMPT is not involved in the third stage because SMTP is a Push Protocol. • It pushes the message from the client to the server. • The third stage need the Pull Protocol. • The client must pull message from the server. • Two of the popularly used message access agents are POP3 and IMAP
  • 43. POP 3 • Post Office Protocol Version 3 (POP 3) • Client POP 3 will be installed in the recipient’s computer and the server POP 3 is installed at the server. • Message access will be initiated when the user wants to download the mail from the server.
  • 44. Modes of POP 3 • POP 3 have 2 modes • Delete Mode • In this mode, the mail is deleted from the mailbox after each retrieval. • Keep Mode • In this mode, the mail is kept is the personal computer for future access.
  • 45. Exchange of Commands and Responses in POP 3
  • 46. IMAP 4 • Internet Mail Access Protocol, Version 4 • IMAP 4 is similar to the POP 3 but with added features. • The features are: • A user can check the email header prior to downloading. • A user can search the content of the email for a specific string • A user can download partial email due to bandwidth constraints. • User can create delete or rename mail boxes • User can create hierarchy of mail boxes.
  • 47. POP 3 Vs IMAP 4
  • 48. My Official Account – POP 3 Setting
  • 49. My Official account - IMAP Settings
  • 53. World Wide Web - WWW
  • 54. Introduction • The WWW is a repository of information linked together from points all over the world. • The original goal of the web was to find a way to organize and retrieve information about hyper linked documents. • WWW uses HTTP Protocol to access the webpages on the internet. (Will be discussed shortly)
  • 56. Clients (Browsers) 1. Controller – Receives i/p from keyboard / mouse and uses the client program to access the documents. 2. Client protocol – This can be of any protocol discussed before like FTP, HTTP Etc., 3. Interpreters – This can be any interpreter like java, Flash or HTML to display the appropriate content CLIENT (BROWSERS)  There are variety of browsers available that interprets and displays a web document.  Every client consists of three parts
  • 58. Server • The webpage is stored at the server • Each time the request is received the corresponding document is sent to the client. • The server can be more efficient by enabling “Multithreading” (Answering Multiple requests)
  • 59. URL – Uniform Resource Locator • When a page needs to be accessed it must have a address. • HTTP uses locators to access the webpages available at widely distributed areas. • URL is a standard for specifying any kind of information on the internet. • URL defines 4 Important things:
  • 61. HTTP – Hyper Text Transfer Protocol
  • 62. Introduction • The Hyper Text Transfer Protocol (HTTP) is mainly used to access the data on the world wide web. • HTTP is the combination of FTP and SMTP. • It is like FTP because it uses TCP Connection. • It is like SMTP because data transferred between the server and client looks like SMTP messages.
  • 63. HTTP Transaction • The client initiates the transaction by sending a request message and the server replies through an response message.
  • 64. Formats of Request and Response Messages
  • 65. Request Line and Status Line
  • 67. Status Code • This field indicates the status of the request through codes. • Codes in the range of • 100  informational • 200  Successful Request • 300  Redirect the client to another URL • 400  Error at client • 500  Error at server
  • 68. Status Codes and their Phrases
  • 70. Header • The format of the header is shown in the figure. • The request header and Response header have different values.
  • 78. Simple Network Management Protocol - SNMP