50% found this document useful (2 votes)
2K views25 pages

Application Layer

The application layer provides services that allow application programs on networked devices to communicate with each other. It relies on the layers below it to handle transmission of data, while providing an interface for users to access network resources and applications. Common application layer protocols include HTTP, SMTP, POP3, FTP, DNS, DHCP, Telnet, and SMB, which enable browsing the web, sending email, file transfers, device configuration, remote access, and file/printer sharing, respectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views25 pages

Application Layer

The application layer provides services that allow application programs on networked devices to communicate with each other. It relies on the layers below it to handle transmission of data, while providing an interface for users to access network resources and applications. Common application layer protocols include HTTP, SMTP, POP3, FTP, DNS, DHCP, Telnet, and SMB, which enable browsing the web, sending email, file transfers, device configuration, remote access, and file/printer sharing, respectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

APPLICATION LAYER FUNCTIONALITY

AND PROTOCOLS

Version 4.0
APPLICATION LAYER

Sitting at Layer 7 -- the very top


of the Open Systems
Interconnection (OSI)
communications model -- the
application layer provides
services for an application
program to ensure that effective
communication with another
application program on a
network is possible.
2
APPLICATION LAYER (CONT)

Application layer should not be thought of as an application


as most people understand it. Instead, the application layer
is a component within an application that controls the
communication method to other devices. It's an abstraction
layer service that masks the rest of the application from the
transmission process. The application layer relies on all the
layers below it to complete its process. At this stage, the
data, or the application, is presented in a visual form the
user can understand.

3
APPLICATIONS LAYER – ALLOWS USER
TO INTERFACE WITH THE NETWORK!
Application Layer – Provides the interface
between the applications on either end of
the network.
PROTOCOLS AND NETWORKS
PROTOCOLS

• DNS – Matches domain names with IP addresses


• HTTP – Used to transfer data between clients/servers using
a web browser
• SMTP & POP3 – used to send email messages from
clients to servers over the internet
• FTP – allows the download/upload of files between a
client/server
• Telnet – allows users to login to a host from a remote
location and take control as if they were sitting at the
machine (virtual connection)
• DHCP – assigns IP addresses, subnet masks, default
gateways, DNS servers, etcs. To users as they login the
network
APPLICATION LAYER SOFTWARE

• 2 types
• Applications – Provide the human (user)
interface. Relies on lower layers to complete the
communication process.

• Services – establish an interface to the network


where protocols provide the rules and formats
that govern how data is treated..
CLIENT/SERVER MODEL

• Client –
• device requesting information (initiates the data exchange)
• Can also UPLOAD data to the servers
• Server – device responding to the request
• How does it handle multiple request from multiple users and
keep everything in order?
• Relies on support from the lower layer functions to
distinguish between services and conversations.
• Server relies on a service called a server daemon – runs
in the background and ‘listens’ for requests for that service.
It can then exchange messages as appropriate & send
requested data.
PEER-TO-PEER (P2P) NETWORK
MODEL

• Two or more computers are connected and are


able to share resources without having a
dedicated server
• Every end device can function as a client or server
on a ‘per request’ basis
• Resources are decentralized (information can be
located anywhere)
P2P APPLICATIONS

• Running applications in hybrid mode allows for a


centralized directory of files even though the files
themselves may be on multiple machines
• Unlike P2P networks, a device can act as both the
client and server within the same communication
• Each device must provide a user interface and
run a background service.
• Can be used on P2P networks, client/server
networks and across the internet.
P2P APPLICATIONS EXAMPLE
DNS SERVICES

• DNS(Domain Name System) resolver – supports


name resolution for other network applications and
services that need it.
• Devices are usually given 1 or more DNS Server
addresses they can use for name resolution.
• Uses different types of resource records to actually
resolve the name/IP address issues
DSN SERVICES AND PROTOCOL
WWW SERVICE AND HTTP

Steps:
1. URL is typed in the address bar.
2. Browser checks with DNS server to convert it to an IP address
3. Connects to the server requested
4. Using HTTP or HTTPS protocol requirements, the browser
sends a GET request to the server to ask for the desired html
document (usually index.html)
5. The server sends the HTML code for the web page to the
browser.
6. The browser interprets the HTML code and formats the page
to fit the browser window.
7. See the next slide for an example.
WWW SERVICE AND HTTP
E-MAIL SERVICES AND SMTP/POP
PROTOCOLS
• E-mail is the most popular network service.
• E-mail client (when people compose e-mail) is
called Mail User Agent (MUA)
• MUA allows messages to be sent/retrieved to and
from your mailbox
• Requires several applications and services
• POP or POP3 – deliver email from server to client (incoming
messages)
• SMTP – handles outbound messages from clients
E-MAIL SERVICES AND SMTP/POP
PROTOCOLS
FTP

• Commonly used application layer protocol


• Allows for the transfer of files between
clients/servers.
• Requires 2 connections to the server
1. Commands – uses TCP port 21
2. Actual data – uses TCP port 20
DHCP

• Dynamic Host Configuration Protocol – enables


devices to obtain IP addresses, subnet masks,
gateways, DNS server information, etc. from a
DHCP server.
• An IP address that is not being used is assigned
from a range of available addresses
• Not permanently assigned – only leased for a
specific period of time (usually 24 hours – 7 days)
• If the host logs off or the power is lost, the IP
address they were using is returned to the pool to
be re-assigned to another host when needed.
• This is how you are able to use Wi-Fi at various
places in the world!
TELNET

• Developed in the early 1970’s – among the oldest of the


application layer protocols and services in the TCP/IP
protocol suite.
• Allows users to emulate text-based terminal devices over
the network using software.
• A connection is known as a ‘virtual terminal (vty)’ session.
• Can be run from the command prompt on a PC.
• You can use the device as if you were sitting there with all
the rights and priorities that you username will offer you.
TELNET (CONT)

• Disadvantages: Doesn’t support encryption like SSH. All


data is transferred as plain text. It can be easily
intercepted and understood.
• If security is a concern, you should use Secure Shell (SSH)
protocol. Provides for remote logins with stronger
authentication than telnet.
• Network Professionals should always use SSH whenever
possible.
TELNET
FILE SHARING SERVICES AND SMB
PROTOCOL
• Server Message Block
• SMB has become a mainstay of Microsoft networking, even
more so since the introduction of Windows 2000 software.
• Allows servers to share their resources with clients
• Linux and Unix also share with Microsoft networks using a
version of SMB called SAMBA.
• Apple also supports sharing resources using an SMB protocol
• What can SMB do?
• Start, authenticate, and terminate sessions
• Control file and printer access
• Allow applications to send/receive messages to/from another
device
FILE SHARING SERVICES AND SMB

You might also like