





Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The responsibilities of the application layer in computer networking, including identifying communication partners, synchronizing applications, establishing error recovery procedures, and controlling data integrity. It also provides examples of application layer protocols like ftp and tftp, and discusses ftp commands and anonymous ftp. Furthermore, it touches upon virtual terminals and their uses, as well as the domain name system (dns) and its role in mapping names to ip addresses.
What you will learn
Typology: Exams
1 / 9
This page cannot be seen from the preview
Don't miss anything!
Syllabus:-Unit-V
Possible Conceptual Questions:-
Question No-(1): What are various responsibilities of Application Layer? Answer:- Responsibilities of Application Layer: Application layer is basically responsible for providing the Interface to users so that network may be accessed. Other responsibilities of the application layer may be defined as below:-
ā¢Identifying and establishing the availability of intended communication partners
Controlling data integrity
Application Layer Examples: Following are the common examples of the Application Layer protocols:
ā¢Domain Name System
ā¢File Transfer Protocol ā¢Hypertext Transfer Protocol ā¢Simple Mail Transport Protocol ā¢Simple Network Management Protocol ā¢Telnet
Question No-(2): What do you understand by File Transfer Protocol? Explain at least 10 Commands of FTP? How FTP is different from TFTP? Answer: - File Transfer Protocol:- File Transfer Protocol ( FTP) is an important Application Layer protocol. It is a reliable, connection-oriented service that uses TCP to transfer files between systems.
FTP and TFTP
FTP Commands: The FTP ( F ile T ransfer P rotocol) utility program is commonly used for copying files to and from other computers. These computers may be at the same site or at different sites thousands of miles apart..
To connect your local machine to the remote machine, type ftp machinename
where machinename is the full machine name of the remote machine, e.g., dbitdoon.com. If the name of the machine is unknown, you may type
ftp machinennumber
where machinennumber is the net address of the remote machine, e.g., 129.82.45.181. In either case, this command is similar to logging onto the remote machine. If the remote machine has been reached successfully,
FTP responds by asking for a loginname and password.
When you enter your own loginname and password for the remote machine, it returns the prompt ftp>
and permits you access to your own home directory on the remote machine. You should be able to move around in your own directory and to copy files to and from your local machine using the FTP interface commands given on the following page.
Anonymous FTP At times you may wish to copy files from a remote machine on which you do not have a login name. This can be done using anonymous FTP. When the remote machine asks for your loginname, you should type in the word anonymous. Instead of a password, you should enter your own electronic mail address. This allows the remote site to keep records of the anonymous FTP requests. Once you have been logged in, you are in the anonymous directory for the remote machine. This usually contains a number of public files and directories. Again you should be able to move around in these directories. However, you are only able to copy the files from the remote machine to your own local machine; you are not able to write on the remote machine or to delete any files there. Other Common FTP Commands
? to request help or information about the FTP commands
ascii to set the mode of file transfer to ASCII (this is the default and transmits seven bits per character)
binary to set the mode of file transfer to binary (the binary mode transmits all eight bits per byte and thus provides less chance of a transmission error and must be used to transmit files other than ASCII files)
SMTP is a relatively simple, text-based protocol, in which one or more recipients of a message are specified (and in most cases verified to exist) along with the message text and possibly other encoded objects. The message is then transferred to a remote server using a procedure of queries and responses between the client and server.
An email client knows the outgoing mail SMTP server from its configuration. A relaying server typically determines which SMTP server to connect to by looking up the each recipient's domain name (the part of the email address to the right of the at ( @ ) sign).
The SMTP client initiates a TCP connection to server's port 25 (unless overridden by configuration). SMTP is a "push" protocol that does not allow one to "pull" messages from a remote server on demand. To do this a mail client must use POP3 through port No 110.
However E-mail servers communicate with each other using the Simple Mail Transport Protocol (SMTP) to send and receive mail.
Question No-(4): What do you understand by Virtual Terminals? What is the use of Virtual Terminals? Answer: Virtual Terminals: Virtual Terminal refers to an application service that :-
hardware, terminal type and characteristics
processing, and
This is a software in user's computer that emulates a particular type of hardware terminal in order to access a server. When personal computers began to proliferate in the late 1980s, virtual terminals enabled users to access the corporate minicomputers and mainframes from their PCs without having to use dedicated terminals. These provide access to a database or an information system via a common interface such as a Web browser on any user's computer.
Virtual terminal protocol based on the OSI application layer protocols has been defined. However, the virtual terminal protocol is not widely used on the Internet.
Following three terms are used in Virtual Termianal:-
Question No-(5): What do you understand by SNMP? Explain how networks are managed by SNMP? Highlight terms used in SNMP? Answer :- SNMP (Simple Network Management Protocol):- The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices.
Following terms need to be defined to explain the working of SNMP.
Management protocol -- A management protocol is used to convey management information between agents and NMSs. SNMP is the Internet community's de facto standard management protocol.
Question No-(7): What do you understand by DNS? How DNS maps names into ip- address? Answer: - The Domain Name System (DNS) associates various information with domain names; most importantly, it serves as the "phone book" for the Internet by translating human-readable computer hostnames, e.g. www.example.com , into IP addresses, e.g. 208.77.188.166 , which networking equipment needs to deliver information. It also stores other information such as the list of mail servers that accept email for a given domain. In providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use.
ā¢A domain is a group of computers that are associated by their geographical location or their business type. ā¢There are more than 200 top-level domains on the Internet, examples of which include the following: us ā United States .uk ā United Kingdom .edu ā educational sites .com ā commercial sites .gov ā government sites .org ā non-profit sites .net ā network service
How DNS works in theory : DNS working may be understood with the help of following terms:-
The domain name space :-The domain name space consists of a tree of domain names. Each node or leaf in the tree has zero or more resource records , which hold information associated with the domain name. The tree sub-divides into zones beginning at the root
zone. A DNS zone consists of a collection of connected nodes authoritatively served by an authoritative DNS nameserver****. (Note that a single nameserver can host several zones.)
When a system administrator wants to let another administrator control a part of the domain name space within the first administratorās zone of authority, control can be delegated to the second administrator. This splits off a part of the old zone into a new zone, which comes under the authority of the second administrator's nameservers. The old zone ceases to be authoritative for the new zone.
Parts of a domain name
A domain name usually consists of two or more parts (technically a label ), which is conventionally written separated by dots, such as example.com.
DNS servers
The Domain Name System consists of a hierarchical set of DNS servers. Each domain or subdomain has one or more authoritative DNS servers that publish information about that domain and the name servers of any domains "beneath" it. The hierarchy of authoritative DNS servers matches the hierarchy of domains. At the top of the hierarchy stand the root nameservers: the servers to query when looking up ( resolving ) a top-level domain name
DNS resolvers
A resolver looks up the resource record information associated with nodes. A resolver knows how to communicate with name servers by sending DNS queries and heeding DNS responses.
A DNS query may be either a recursive query or a non-recursive query:
The resolver (or another DNS server acting recursively on behalf of the resolver) negotiates use of recursive service using bits in the query headers.
Resolving usually entails iterating through several name servers to find the needed information. However, some resolvers function simplistically and can communicate only with a single name server. These simple resolvers rely on a recursive query to a recursive name server to perform the work of finding information for them.
Address resolution mechanism
In practice, full host names will frequently consist of just three segments (e.g. www .inadomain.example ).
For querying purposes, software interprets the name segment by segment, from right to left, using an iterative search procedure. At each step along the way, the program queries a corresponding DNS server to provide a pointer to the next server which it should consult.