Protocols of Application Layer PDF
Protocols of Application Layer PDF
Protocols of Application Layer PDF
It is defined as set of rules. Different protocols at application layer are: 1. 2. 3. 4. 5. 6. 7. 8. TCP/IP WWW HTTP HTTPs GOPHER TELNET USENET FTP
1.
WWW The World Wide Web, abbreviated as WWW or W3 and commonly known as the Web It is a system of interlinked hypertext documents accessed via the Internet.
QUESTION. How internet is different from WWW? ANSWER. The terms Internet and World Wide Web are often used in every-day speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The Internet is a global system of interconnected computer networks. In contrast, the Web is one of the services that runs on the Internet. It is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. In short, the Web is an application running on the Internet. FUNCTIONING OF WWW: 1.First, the browser resolves the server-name portion of the URL into an Internet Protocol address using the global, distributed Internet database known as the Domain Name System (DNS); this lookup returns an IP address such as 208.80.152.2 2.The browser then requests the resource by sending an HTTP request across the Internet to the computer at that particular address 3.It makes the request to a particular application port in the underlying Internet Protocol Suite so that the computer receiving the request can distinguish an HTTP request from other network protocols such as e-mail delivery; the HTTP protocol normally uses port 80.
Richa gupta
Page 1
4.The computer receiving the HTTP request delivers it to Web server software listening for requests on port 80. 5.If the web server can fulfill the request it sends an HTTP response back to the browser indicating success. 6.The web browser parses the HTML, interpreting the markup (<title>, <b> for bold, and such) that surrounds the words in order to draw that text on the screen. NOTE:The use of a subdomain name is useful for load balancing incoming web traffic by creating a CNAME record that points to a cluster of web servers. FEATURES PRIVACY SECURITY ACCESSIBILITY STANDARDS INTERNATIONALIZATION STATISTICS SPEED ISSUES CACHING
2.
HTTP HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. The Hypertext Transfer Protocol (HTTP) is a networking protocol for distributed, collaborative, hypermedia information systems.[ HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page. HTTP functions as a request-response protocol in the client-server computing model.
HTTP is called a stateless protocol because each command is executed independently, without any knowledge of the commands that came before it. This is the main reason that it is difficult to implement Web sites that react intelligently to user input. This shortcoming of HTTP is being addressed in a number of new technologies, including ActiveX, Java, JavaScript and cookies.
Richa gupta
Page 2
3.
URL Uniform Resource Locator (URL) It is a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
Every URL consists of some of the following: the scheme name (commonly called protocol/ protocol identifier), followed by a colon, depending on scheme, a domain name (alternatively, IP address), o a port number, o the path of the resource to be fetched or the program to be run, o for programs such as Common Gateway Interface (CGI) scripts o a query string, o and an optional fragment identifier. Absolute vs relative URLs
4.
GOPHER It is a TCP/IP Application layer protocol designed for distributing, searching, and retrieving documents over the Internet. The Gopher protocol was a predecessor of (and later, an alternative to) the World Wide Web.
Reasons for Stagnation of GOPHER 1. 2. 3. 4. Charge licensing fees for the use of its implementation of the Gopher server. Gopher client functionality was quickly duplicated by early Web browsers, such as Mosaic. Gopher has a more rigid structure compared to the free-form HTML of the Web. It had defined format and type.
Gopher support was disabled in Internet Explorer versions 5 and 6 for Windows in June 2002 by a patch meant to fix a security vulnerability in the browser's Gopher protocol handler
Richa gupta
Page 3
Features 1. A Gopher system consists of a series of hierarchical hyperlinkable menus 2. The protocol is simple to negotiate, making it possible to browse without using a client. 3. The master Gopherspace search engine is Veronica. 4. TELNET Telnet is a network protocol used on the Internet or local area networks provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection provides access to a command-line interface (usually, of an operating system) on a remote host. Reasons for discontinuation of Telnet for remote logins: 1. Telnet, by default, does not encrypt any data sent over the connection (including passwords), and so it is often practical to eavesdrop on the communications and use the password later for malicious purposes 2. Most implementations of Telnet have no authentication that would ensure communication is carried out between the two desired hosts and not intercepted in the middle. 3. Commonly used Telnet daemons have several vulnerabilities discovered over the years.
5. FTP File Transfer Protocol (FTP) is a standard network protocol. copy a file from one host to another over a TCP-based network. FTP is built on a client-server architecture. It has separate control and data connections between the client and server. FTP users may authenticate themselves. not designed to be a secure protocol Data transfer in FTP can be done in any of three modes: Stream mode: Data is sent as a continuous stream, relieving FTP from doing any processing. Rather, all processing is left up to TCP. No End-of-file indicator is needed, unless the data is divided into records. Block mode: FTP breaks the data into several blocks (block header, byte count, and data field) and then passes it on to TCP.[2] Compressed mode: Data is compressed using a single algorithm
Richa gupta
Page 4
6. HTTPs Hypertext Transfer Protocol Secure (HTTPS) combination of the Hypertext Transfer Protocol and the SSL/TLS protocol provide encrypted communication and secure identification of a network web server. used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems HTTP vs HTTPs HTTP begin with "http://" use port 80 by default subject to man-in-themiddle and eavesdropping attacks operates at the highest layer of the OSI Model, the Application layer HTTPs begin with "https://" use port 443 by default withstand such attacks use of ordinary HTTP over an encrypted Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connection.
7. USENET It is a worldwide distributed Internet discussion system. superficially regarded as a hybrid between email and web forums. set of protocols for generating, storing and retrieving news "articles"
8. TCP/IP
Richa gupta
Page 5
Richa gupta
Page 6