0% found this document useful (0 votes)
15 views

Computer Networks (CS 305) : Application Layer - Architectures

Computer Networks - concise explanations - L5

Uploaded by

Rounak Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Computer Networks (CS 305) : Application Layer - Architectures

Computer Networks - concise explanations - L5

Uploaded by

Rounak Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Computer Networks (CS 305)

Lecture 5
Application Layer – Architectures

Prepared by –
Dr. Soumen Moulik
Department of Computer Science & Engineering
National Institute of Technology Meghalaya
Introduction
— Core part of network
application development is –
writing programs that run on
different hosts and
communicate with each
other over the network
◦ Different applications –
Web, social networking, email,
multi-user gaming, remote login,
streaming video (YouTube), voice
over IP (Skype), P2P file-sharing
application (Torrent)
— Network-core devices do
not run user applications

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya


Introduction
— Network applications and application-layer protocols
reside in application layer
— Different protocols applicable to this layer:
◦ DNS: translation of human-friendly names for Internet hosts
◦ HTTP: provides for Web document request and transfer
◦ FTP: provides for the transfer of files between two end systems
◦ SMTP: provides for the transfer of e-mail messages
— The packet of information at this layer: Message

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya


Application Architecture
— Client-Server
◦ Always-on host – server, Ex – web server
◦ Sometimes-on or always-on host – client, Ex – browsers
◦ Clients do not directly communicate with each other
◦ Server has a fixed, well-known address (IP address)
– Client host requests the server for an object, by sending a packet to the
server’s address
– Server host receives the request and responds by sending the requested
object to the client host
◦ Often, a single server host is incapable of keeping up with all the
requests from its clients
– A large cluster of hosts (data center) is often used
◦ Infrastructure intensive – require service providers to purchase,
install, and maintain server farms

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya


Client-Server Architecture

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya


Application Architecture
— Peer-to-Peer (P2P)
◦ Minimum (or no) reliance on always-on servers
◦ Direct communication between pairs of intermittently
connected hosts, called peers
◦ Advantages: Self-scalable, cost-effective
◦ Challenges: ISP friendliness, security, incentive design
◦ Examples –
– File distribution (BitTorrent), File sharing (eMule, LimeWire)
– Internet telephony (Skype)

— Hybrid
◦ Combination of both client-server and P2P elements
– For many instant messaging applications, severs are used to track the IP
addresses of users, but user-to-user messages are sent directly between user
hosts (without passing through intermediate servers)

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya


Peer-to-Peer Architecture

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya


Hybrid Architecture

Dr. Soumen Moulik, Dept. of CSE, NIT Meghalaya

You might also like