0% found this document useful (0 votes)
9 views45 pages

Application Layer Section'a'

Uploaded by

ethio6872
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views45 pages

Application Layer Section'a'

Uploaded by

ethio6872
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

ARBAMINCH UNIVERSITY

FACULTY OF COMPUTING AND SOFTWARE ENGINEERING COMPUTER SCIENCE DEPARTMENT


Group A s s ig nm en t for C omp ut er S c i e n c e (Group 3)
Se mes t er II Section"A"

GROUP
MEMBERS
No Name ID Number

1. Medanit Brhanu Tesfaye NSR/1410/16

2. Mekdelawit Geta Birhanu NSR/639/16

3. Mekdes Erdachew Yirgu NSR/640/16

4. Meles Tesfay Gebretsadh NSR/655/16

5. Meron Tarekegn Tadesse NSR/T/015/17

6. Mohamed Abdinasir Jame NCSR/1475/16

7. Muluken Lukas Soresa NSR/1463/16

8. Nahom Gosa Assefa NSR/748/16

9. Naod Teshale Manaye NSR/752/16

10. Nardos Esey Hizkel NSR/757/16

11. Netsanet Meseret Gebreegziabher NSR/1491/16

12. Nigatu Girma Gerbi NSR/785/16

13. Nuhamin Degne Kitaba NSR/791/16

Submission date: 22th April 2025


Submitted to: Mr. Yilkal B
key points
vDefinition to Application layer
vFunctionalities of Application layer
vHow the Application Layer Works
vProtocols of the Application Layer
vApplication Layer in OSI Model And TCP/IP
Model
vService provide by Application Layer
vApplication Layer vs Presentation Layer
vReal World Application ofApplication Layer
vApplication layer Tools
vAdvantage and Disadvantage of Application
layer
Definition of Application layer
The Application Layer is the seventh and topmost layer in the OSI (Open Systems
Interconnection) model and the TCP/IP model. Its primary role is to provide network
services directly to end-users or applications. It acts as an interface between the user
applications and the underlying network infrastructure, enabling seamless
communication between software programs on different devices over a network.
Unlike other layers in the OSI and TCP/IP models, which focus on transmitting raw
data, the Application Layer is responsible for ensuring that the transmitted data is
understandable and usable by applications. It deals with high-level functions such as
data translation, encryption, compression, and session management, which are essential
for efficient, secure, and reliable communication.
.
The Application Layer enables a variety of services and protocols that
support essential activities like web browsing, email, file transfer,
remote access, and realtime communication. Some common protocols
operating at this layer include HTTP, FTP, SMTP, DNS, and SSH,
among others.
This layer plays a crucial role in the functionality of modern networks,
enabling various applications to work together across different
platforms and devices.
However, despite its importance, the Application Layer also presents
challenges in
terms of protocol complexity, resource consumption, and security
vulnerabilities. Understanding the functions, protocols, and real-world
applications of the Application Layer is key to appreciating its role in
facilitating communication in a networked world
What is the application layer?
The application layer sits at Layer 7, the top of the Open Systems
Interconnection (OSI) communications model. It ensures an application
can effectively communicate with other applications on different
computer systems and networks.

The application layer is not an application. Instead, it is a component


within an application that controls the communication method to other
devices. It is an abstraction layer service that masks the rest of the
application from the transmission process.

The application layer relies on all the layers below it to complete its
process. At this stage, the data or the application is presented in a
visual form that the user can understand.
.
Functions of Application Layer
The Application Layer, being topmost layer in OSI model,
performs functions required in any kind of application or
communication proce
Application layer ensures that data is translated,
formatted, compressed, or encrypted appropriately
for the receiving application to understand and
process .

• .
• Data Translation: Converts data from one format to another
that is compatible with the receiving application.

oExample: Translating between ASCII and EBCDIC


character encoding systems.

• Character Encoding/Decoding: Converts text into binary


codes and vice versa, such as UTF-8 or Unicode, ensuring
compatibility between devices.

• Data Compression: Reduces the size of data to improve


transmission speed and optimize bandwidth usage. o
Example: Compressing images or videos for faster
transmission
• Encryption and Decryption: Secures data by encrypting
it before transmission and decrypting it on the receiver's
end to ensure privacy.

oExample: HTTPS using SSL/TLS to encrypt web traffic

It enables applications to access network services


such as email, file transfers, or remote system
access.
• .
• Email Services: Provides the ability to send, receive, and store
email messages over the network.
o Protocols:
o SMTP (Simple Mail Transfer Protocol): For sending
emails.
o POP3 (Post Office Protocol v3): For retrieving emails from
a server.
o IMAP (Internet Message Access Protocol): For managing
emails on the server.
• File Transfer Services: Allows the uploading, downloading, and
management of files between systems.
o Protocols:
o FTP (File Transfer Protocol): Enables file sharing and
transfers
° TFTP (Trivial File Transfer
Protocol): A simplified,
connectionless version of FTP.
• Web Services: Supports communication
between browsers and servers to access web
content.
o Protocols:
o HTTP (Hypertext Transfer Protocol): For
accessing websites.
o HTTPS (HTTP Secure): Ensures
secure web communication through
encryption.
• Remote Access Services: Enables users to access
devices and applications on a remote network.
o Protocols:
o Telnet: Provides remote command-line access. o
SSH (Secure Shell): Provides secure remote access
by encrypting the communication.
Application protocols define the rules and methods that
enable communication between software applications.
• File Transfer Protocols: For managing and transferring
files. o
FTP: Supports transferring large files with security features. o
TFTP: A lightweight alternative for transferring smaller files.
• .
• Web Communication
Protocols: Facilitates access to and
interaction with web services
oHTTP/HTTPS: Enables browsing and secure
access to websites.
• Domain Name Services: Resolves human-
readable domain names (e.g., google.com) into IP
addresses for routing.
o Protocol:
o DNS (Domain Name System).

• Messaging Protocols: Facilitates message-


based communication. o Example: XMPP
(Extensible Messaging and Presence Protocol) for
instant messaging.
Application layer establishes, manages, and
terminates sessions between
communicating applications. It also ensures
synchronization and controls the flow of
data.
• Session Establishment and Termination: o It
initiates and gracefully closes communication
sessions.
• o Example: Logging in and logging out of a
website or application.
• Synchronization:
o It inserts checkpoints into data streams to allow
o recovery from interruptions without restarting
the entire transfer
o Example: Inlarge file transfers, checkpoints
ensure partial data isn't lost during disruptions.
• Token Management:
oItallocates transmission rights to avoid conflicts
or collisions in communication.
oExample: Allowing only one application to send
data at a time in half-duplex communication.
• Real-Time Communication Services:
o Supports video conferencing, Voice over IP
(VoIP), and streaming services.
o Protocols:
o SIP (Session Initiation Protocol): Manages
multimedia sessions like video calls.
o RTP (Real-Time Transport Protocol):
Ensures delivery of real-time data such as
audio and video streams.
Generaly application layer has the following
functions
The application layer handles the following functions:

• ensures that the receiving device is identified, reachable and ready to


accept data;

• when appropriate, enables authentication between devices for an extra

layer of network security;

• makes sure necessary communication interfaces exist, such as whether


there is an
Ethernet or Wi-Fi interface in the sender's computer;

• ensures agreement at both ends on error recovery procedures, data integrity

and privacy;

• determines protocol and data syntax rules at the application level; and

• presents the data on the receiving end to the user application.


Working of Application Layer
• At first, client sends a command to server and when server
receives that command, it allocates port number to client.

• Thereafter, the client sends an initiation connection request to


server and when server receives request, it gives
acknowledgement (ACK) to client through client has
successfully established a connection with the server.

• Therefore, now client has access to server through which it may


either ask server to send any types of files or other documents or
it may upload some files or documents on server itself.
Application Layer Works

1. User interacts with an application (e.g., browser).


2. The application sends a request to the network.
3. Application layer protocols format and direct data for
transmission.
4. Data is transmitted to the destination via lower
layers.

• Application layer provides protocols and services


that enable applications to communicate and
exchange data across a network.
• This layer ensures that user applications can
effectively communicate with each other and with
servers.
Application Layer Protocols

The application layer provides several protocols which allow any


software to easily send and receive information and present meaningful
data to its users. The following are some of the application layer
protocols.
HTTP: HTTP stands for Hyper Text Transfer Protocol. It is
the foundation of the World Wide Web (WWW). HTTP works
on the client server model. This
protocol is used for transmitting hypermedia documents like
H TM L . This pr o to c o l w as d e s i g n ed p a r t i c u l ar l y f o r the
communications between the web browsers and web servers,
but this protocol can also be used for several other purposes.
HTTP is a stateless protocol (network protocol in which a
client sends requests to server and server responses back as
per the given state), which means the server is not responsible
for maintaining the previous client’s requests. HTTP uses port
number 80.
• DNS: DNS stands for Domain Name System

The DNS service translates the domain name (selected by user) into the
corresponding IP address. For example- If you choose the domain name as
www.abcd.com, then DNS must translate it as 192.36.20.8 (random IP address
written just for understanding purposes).
DNS protocol uses the port number 53.
• TELNET: Telnet stands for
Telecommunications Network. This protocol
is used formanaging files over the Internet. It
allows the Telnet clients to access the
resources of Telnet server. Telnet uses
port number 23.
• DHCP: DHCP stands f o r Dynamic Host Configuration
Protocol. I t. provides IP addresses to hosts. Whenever a host tries to
register for an IP address with the DHCP server, DHCP server
provides lots of information to the corresponding host.DHCP uses port
numbers 67 and 68.
FTP: FTP stands for File Transfer Protocol. This protocol
helps to transfer different files from one device to another. FTP
promotes sharing of files via remote computer devices with
reliable, efficient data transfer. FTP uses port number 20 for data
access and port number 21 for data control.

.
• SMTP: SMTP stands f o r Simple Mail Transfer Protocol. It
is
used to transfer electronic mail from one user to another user.
SMTP is used by end users to send emails with ease. SMTP
uses port numbers 25 and 587.Network File System. This protocol
allows remote
.Network File System.
This protocol allows
remote hosts to mount files
over a network and interact with
those file systems as though
they are mounted locally. NFS
uses the port number 2049.
• SNMP: SNMP stands for simple
network managment protocol
This gathers device from the network data
by management station at fixed or random
intervals, requiring them to disclose certain
information. SNMP uses port numbers 161
(TCP) and 162 (UDP).
Application Layer in
OSI Model
The Application Layer of OSI
(Open System Interconnection)
model, is the top layer in this
model and takes care of
network communication. The
application layer provides the
functionality to send and
receive data from users. It acts
as the interface between the
user and the application. The
application provides services
like file transmission, mail
service, and many more.
Application Layer in the OSI
Model
•Position: The 7th layer (topmost layer).
•Interaction: Interfaces with the Presentation Layer below it.
Focuses on user-related services and abstractions.
• User Interface: it provides the user interface that allows individuals
or Applications to interact with network services.
• Abstraction: It abstracts the complexities of the lower layers from
the end-user applications
• Resource Access: It facilitates access to network resources, such
as:files, printers, and databases
• Communication: It enables applications to communicate with each
other and with servers over a network
Application Layer
in TCP/IP Model
Application layer is the top most
layer in TCP/IP model. Application
layer provides the devices to acces
network and applications such as
emails, cloud storage etc.
While communicating from one
application layer protocol to
another application layer the
information is forwarded to
transport layer.
Services Provided by the
Application Layer
1. File Transfer: Moving data between devices (e.g.,
FTP, SFTP).
2. Email Communication: Sending and receiving
emails (SMTP, IMAP).
2. Network Management: It includes protocols for
managing network devices and services, such as SNMP
4. Web Access: Browsing the internet (HTTP, HTTPS).
5. Protocol and Data Syntax: ensures agreement on
these rules between communicating devices.
6. Directory Services: Resolving names to IPs (DNS).
Application Layer vs presentation
layer
Application Layer:
Role: Directly interacts with end-user applications and provides
network services for communication (e.g., HTTP, FTP, SMTP).
Focus: Defines protocols for specific applications to communicate
over the network.
Layer: Highest layer in both OSI and TCP/IP models.
Presentation Layer:
Role: Ensures data is properly formatted, encrypted, or compressed for the
recipient (e.g., data encoding/decoding, encryption).
Focus: Data translation and security, ensuring compatibility in data formats
between systems.
Layer: Found only in the OSI model (Layer 6), but merged into the
Application Layer in the TCP/IP model.

Real world applications of application layer


Web Browsing (HTTP/HTTPS)

Real-world Example: When you open a web browser (e.g., Google


Chrome, Firefox, Safari) and visit a website, the Application Layer
(through HTTP/HTTPS) manages the request for a webpage from a
server and delivers the content back to your browser.
Email (SMTP, IMAP, POP3)

Real-world Example: Email services (e.g., Gmail, Outlook, Yahoo


Mail) use these protocols to send, receive, and store emails.
SMTP handles sending, while IMAP and POP3 manage receiving
and storing emails on mail servers.
File Transfer (FTP, SFTP)
.The File Transfer Protocol (FTP) and its secure equivalent SFTP
allow users to transfer files between computers and servers
Real-world Example: Applications like FileZilla or WinSCP use
FTP or SFTP to upload and download files between a local
computer and a remote server, such as for website management or
cloud storage access.
Remote Access (SSH, Telnet)
Real-world Example: SSH is used by network administrators to securely
log into remote servers or devices (e.g., managing servers or networking
equipment), while Telnet was historically used for similar purposes but
lacks encryption.
Application layer tools
Examples of Application layer tools
Email Clients (SMTP, IMAP, POP3)
Examples: Microsoft Outlook, Mozilla Thunderbird, Apple Mail,
Gmail (Web)
Role: These tools handle the sending and receiving of emails.
They use protocols like SMTP (for sending emails), IMAP or POP3
(for retrieving emails from servers), and work at the Application
Layer to manage email communication.
File Transfer Tools (FTP, SFTP)
Examples: FileZilla, WinSCP, Cyberduck
Role: These tools allow users to upload and download files between local
systems and remote servers. They use FTP or SFTP protocols to manage
file transfers and are part of the Application Layer.
.Remote Access Tools (SSH, Telnet)
Examples: PuTTY, OpenSSH,
SecureCRT
Role: These tools allow users to remotely access and
manage servers or network devices. SSH provides
secure, encrypted communication, while Telnet offers
unencrypted communication (less secure). Both tools
function at the Application Layer.
DNS Tools
Examples: nslookup, dig, DNSstuff
Role: These tools are used to query DNS servers to resolve
domain names into IP addresses. They operate at the Application
Layer and help users or administrators check the health and
configuration of DNS servers.
Advantages of Application Layer Services
• It enables seamless communication between
applications using standardized protocols.
• It simplifies data access and management through
services like file transfers and email.
• It supports real-time communication (e.g., VoIP,
video conferencing).
• It enhances security with encryption (e.g., HTTPS,
TLS).
• It improves reliability with error handling,
compression, and session management.
• It promotes interoperability between different devices
and applications.
• It is scalable to accommodate growing network
demands
Limitations of Application Layer Services
• Protocol overhead increases data size and reduces
efficiency.
• It relies on lower layers, making it susceptible to issues
in underlying networks.
• It is vulnerable to cyber threats like DNS spoofing and
phishing.
• Some protocols lack inherent security (e.g., HTTP, FTP).
• High traffic can cause latency or downtime.
• Complex implementation and maintenance of diverse
protocols.
• Data processing (e.g., encryption, compression)
consumes additional resources.
Conclusion:
The Application Layer, sitting at the top of the OSI and
TCP/IP models, plays a pivotal role in enabling seamless
communication between different applications and
systems over a network. Its key functions include data
translation, compression, encryption, and ensuring
smooth access to network services like email, file
transfers, and web browsing. By providing a wide
range of application-specific protocols such as HTTP,
FTP, SMTP, DNS, and others, the Application Layer
facilitates efficient and reliable communication for real-
world applications, such as web browsing, email
exchange, file sharing, and remote access.
Despite its crucial role in enabling user interaction and system
communication, the Application Layer has its challenges. These
include increased protocol overhead, reliance on underlying
network layers, vulnerability to security threats, and the
complexity of managing diverse protocols. Furthermore,
resource-intensive operations such as encryption, compression,
and data handling may impact system performance, particularly
in high-traffic environments.
In conclusion, while the Application Layer enhances the
functionality and interoperability of networked applications, it
requires careful design and implementation to balance
performance, security, and scalability. As technology evolves,
the Application Layer will continue to adapt to the growing
demands for seamless, secure, and efficient network
communication.
Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy