0% found this document useful (0 votes)
32 views33 pages

Application layer

Uploaded by

lalahaha205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views33 pages

Application layer

Uploaded by

lalahaha205
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Application Layer

Application Architecture

Three types:

. Client-Server - E.g. Web, Email, FTP

. Peer-to-Peer - Bit-torrent, Gnutella

· Hybrid of client-server and peer-to-peer - Skype, Instant messenger


1. Client-Server Architecture

An application program running on the local machine sends a request to another application program is
known as a client, and a program that serves a request is known as a server.

For example, when a web server receives a request from the client host, it responds to the request to the
client host.

Characteristics Of Client-server architecture:

○ In Client-server architecture, clients do not directly communicate with each other. For example, in a
web application, two browsers do not directly communicate with each other.
○ A server is fixed, well-known address known as IP address because the server is always on while the
client can always contact the server by sending a packet to the sender's IP address.

Disadvantage Of Client-server architecture:

It is a single-server based architecture which is incapable of holding all the requests from the clients. For example,
a social networking site can become overwhelmed when there is only one server exists.
2. P2P (peer-to-peer) architecture
It has no dedicated server in a data center. The peers are the computers which are not owned by the service
provider. Most of the peers reside in the homes, offices, schools, and universities.

The peers communicate with each other without passing the information through a dedicated server, this
architecture is known as peer-to-peer architecture.

The applications based on P2P architecture includes file sharing and internet telephony.

Features of P2P architecture


○ Self scalability: In a file sharing system, although each peer generates a workload by requesting the
files, each peer also adds a service capacity by distributing the files to the peer.
○ Cost-effective: It is cost-effective as it does not require significant server infrastructure and server
bandwidth.
3. Hybrid Architecture
. Initial contact is to a central server - Used to determine info about other
end-systems

. After this, end-systems talk directly

E.g. Instant Messaging


Application Layer

Services of Application Layers


○ Network Virtual terminal: An application layer allows a user to log on to a remote host. To do so, the
application creates a software emulation of a terminal at the remote host. The user's computer talks to
the software terminal, which in turn, talks to the host. The remote host thinks that it is communicating
with one of its own terminals, so it allows the user to log on.
○ File Transfer, Access, and Management (FTAM): An application allows a user to access files in a
remote computer, to retrieve files from a computer and to manage files in a remote computer. FTAM
defines a hierarchical virtual file in terms of file structure, file attributes and the kind of operations
performed on the files and their attributes.
○ Addressing: To obtain communication between client and server, there is a need for addressing.
When a client made a request to the server, the request contains the server address and its own
address. The server response to the client request, the request contains the destination address, i.e.,
client address. To achieve this kind of addressing, DNS is used.
○ Mail Services: An application layer provides Email forwarding and storage.
○ Directory Services: An application contains a distributed database that provides access for global
information about various objects and services.

Authentication: It authenticates the sender or receiver's message or both.


DHCP (Dynamic Host Configuration Protocol)
https://slideplayer.com/slide/8779008/

Previous protocols

. RARP: Reverse Address Resolution Protocol

. BOOTP: Bootstrap Protocol

. DHCP: Dynamic Host Configuration Protocol


DHCP Operation
Client and server on two different networks
In this case, however, there is one problem that must be solved.
The DHCP request is broadcast because the client does not know the IP address of the server.
A broadcast IP datagram cannot pass through any router. A router receiving such a packet discards it. Recall that an IP address of all
1s is a limited broadcast address.
To solve the problem, there is a need for an intermediary. One of the hosts (or a router that can be configured to operate at the
application layer) can be used as a relay.
DNS: https://www.slideshare.net/slideshow/application-layer-dns/250660807#2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy