Network - Application Layer Flashcards

1
Q

Application Layer

A

The application layer is the top layer of the network that interacts directly with users. It includes websites, emails, and file transfers.
πŸ“Œ Example: When you visit Google.com, your browser uses the application layer protocol HTTP to request the webpage.

The Application Layer is the part of a network that apps use to send and receive data.

What it does:
Lets programs like web browsers, emails, and chats work online.
Uses rules (protocols) like HTTP (websites), SMTP (email), FTP (file transfer), and DNS (web addresses).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Applications

A

Programs that use the internet to send and receive data, like email, video calls, and social media.
πŸ“Œ Example: WhatsApp and Zoom are network applications because they rely on the internet to send messages.

Network applications are programs that need the internet to work. They send and receive data between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Client-Server Paradigm

A

The Client-Server Paradigm is a way computers communicate in a network.

How It Works:
Client (e.g., your web browser) requests a service.
Server (e.g., a web server) processes the request and sends back data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Peer-to-Peer (P2P) Architecture

A

Computers (peers) share files and communicate directly without a central server.
πŸ“Œ Example: BitTorrent allows users to download files from other users instead of a single website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process Communication

A

Process Communication is how programs (processes) talk to each other in a computer or network.

Examples: Client-server model, HTTP requests, sockets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sockets

A

A socket is a virtual door through which programs send and receive data.
πŸ“Œ Example: When you stream music, the music app opens a socket to connect to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Addressing Processes

A

To send data to the correct program, we use an IP address and a port number.
πŸ“Œ Example: HTTP uses port 80, and email servers use port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Layer Protocols

A

Rules that define how applications communicate over the internet.
πŸ“Œ Example: HTTP for web browsing, SMTP for emails, and DNS for translating website names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP (Hypertext Transfer Protocol)

A

A protocol used by web browsers to request and load web pages.
πŸ“Œ Example: When you type www.sdu.dk, your browser uses HTTP to fetch the page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP vs. HTTPS

A

HTTP sends data without encryption (not secure).
HTTPS encrypts data using TLS for security.
πŸ“Œ Example: Bank websites use HTTPS to protect sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Persistent vs. Non-Persistent HTTP

A

Persistent HTTP keeps the connection open for multiple requests.
Non-persistent HTTP closes the connection after each request.
πŸ“Œ Example: Modern browsers use persistent HTTP to load pages faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTP Request & Response

A

Request: The client asks for a web page.
Response: The server sends back the page.
πŸ“Œ Example: A browser requests β€œindex.html”, and the server sends the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP Status Codes

A

Numbers that show the result of a request.
πŸ“Œ Example:

200 OK β†’ The request was successful.
404 Not Found β†’ The page does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cookies

A

Small pieces of data stored in your browser to remember login details or track activity.
πŸ“Œ Example: A shopping website remembers items in your cart using cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web Caching

A

A system that stores copies of web pages to load them faster.
πŸ“Œ Example: Google caches frequently visited pages so they load instantly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS (Domain Name System)

A

Translates website names into IP addresses.
πŸ“Œ Example: When you type www.facebook.com, DNS translates it to an IP address like 157.240.22.35.

17
Q

DNS Hierarchy

A

DNS hierarchy is the structured system that helps find websites by translating domain names (like google.com) into IP addresses.

DNS has multiple layers:
1️⃣ Root Servers β†’ Store information about top-level domains (.com, .org, .dk).
2️⃣ TLD Servers β†’ Handle requests for specific domain extensions (.com, .dk).
3️⃣ Authoritative Servers β†’ Store IP addresses for websites.
πŸ“Œ Example: If you visit sdu.dk, DNS finds the right IP address for the website.

Why It Matters?
DNS hierarchy speeds up website access by breaking down requests step by step.
Without it, we’d have to remember IP addresses instead of domain names!

18
Q

DNS Queries

A

A DNS query is a request made by a computer to find the IP address of a website (e.g., β€œWhat is the IP of google.com?”).

19
Q

DNS Caching

A

Browsers and DNS servers store website IP addresses temporarily to speed up future requests.
πŸ“Œ Example: If you visit YouTube, your browser remembers its IP for faster loading next time.

20
Q

Email Protocols

A

Different protocols handle sending and receiving emails:

SMTP (Simple Mail Transfer Protocol) – Sends emails.

IMAP (Internet Message Access Protocol) – Retrieves emails and keeps them on the server.

πŸ“Œ Example: Gmail uses IMAP so you can access emails from multiple devices.

21
Q

Transport Layer Security (TLS)

A

TLS encrypts data to protect online communication (used in HTTPS and emails).
πŸ“Œ Example: TLS prevents hackers from reading login details when you enter passwords.

22
Q

Digital Signatures

A

A security method that proves an email or document is authentic.
πŸ“Œ Example: A company digitally signs an email to prove it’s not fake.

23
Q

OpenPGP & S/MIME

A

Both encrypt emails to keep them private πŸ”.

OpenPGP – You create and share keys yourself. Works with any email.
S/MIME – Uses trusted certificates (CA). Built into email apps like Outlook.
OpenPGP = More control
S/MIME = Easier to use

πŸ” OpenPGP Example:

You and a friend exchange public keys.
You encrypt an email using their public key.
Only they can decrypt it with their private key.
πŸ“§ S/MIME Example:

Your company gives you a digital certificate.
You send an encrypted email to a colleague.
Their email app automatically decrypts it using the certificate.

24
Q

HTTP/2 and HTTP/3

A

HTTP/2 is faster than HTTP/1.1 because it sends multiple requests at once.
HTTP/3 uses QUIC (based on UDP) for even faster performance.
πŸ“Œ Example: Streaming services use HTTP/2 to load videos faster.

25
DNS Security (DNSSEC)
A security extension to prevent fake DNS responses (DNS spoofing). πŸ“Œ Example: DNSSEC stops hackers from redirecting you to fake websites.