You are on page 1of 28

University Institute of Engineering

DEPARTMENT OF COMPUTER SCIENCE


& ENGINEERING
Bachelor of Engineering (Computer Science & Engineering)
Subject Name:Computer Network
Subject Code: 21CSH-256/ 21ITH-256

DISCOVER . LEARN . EMPOWER


Application Layer-Protocols
Application Layer works with following protocols:

• DHCP(Dynamic Host Configuration Protocol)


• DNS(Domain Name System)
• HTTP/ HTTPS(Hypertext Transfer Protocol/Hypertext Transfer
Protocol(secure))
• FTP(File Transfer Protocol)
• TFTP(Trivial File Transfer Protocol)
• SFTP(Secure File Transfer Protocol)
2
DHCP
• Mapping Physical to Logical Address – sometimes host knows its
physical address, but needs to know its logical address.

Cases –
• Sometimes host moves from one physical network to another
network.
• Host wants a temporary IP address.
*Why DHCP – because other address resolution protocols are static in
nature.
• DHCP provide static and dynamic address allocation that can be manual or
automatic.

3
4
5
6
7
8
9
10
11
12
13
14
ELECTRONIC MAIL

One of the most popular Internet services is electronic


mail (e-mail). The designers of the Internet probably
never imagined the popularity of this application
program. Its architecture consists of several components
that we discuss in this chapter.

26.15
Figure 26.6 First scenario in electronic mail

26.16
Note

When the sender and the receiver of an


e-mail are on the same system,
we need only two user agents.

26.17
Figure 26.7 Second scenario in electronic mail

26.18
Note

When the sender and the receiver of an


e-mail are on different systems, we
need two UAs and a pair of
MTAs (client and server).

26.19
Figure 26.8 Third scenario in electronic mail

26.20
Note

When the sender is connected to the


mail server via a LAN or a WAN,
we need two UAs and two pairs
of MTAs (client and server).

26.21
Figure 26.9 Fourth scenario in electronic mail

26.22
Figure 26.10 Push versus pull in electronic email

26.23
Note

When both sender and receiver are


connected to the mail server via
a LAN or a WAN, we need two
UAs, two pairs of MTAs
and a pair of MAAs.
This is the most common situation
today.

26.24
Figure 26.11 Services of user agent

26.25
Figure 26.12 Format of an e-mail

26.26
Figure 26.13 E-mail address

26.27
References
• https://www.gatevidyalay.com/tag/application-layer-protocols-ppt/
• https://www.javatpoint.com/computer-network-application-layer
• https://www.tutorialspoint.com/data_communication_computer_net
work/application_layer_introduction.htm
• Data Communication and Networks by Behrouz A. Forouzan

28

You might also like