Micro Project Report

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Matoshri Education Society’s

MATOSHRI INSTITUTE OF TECHNOLOGY


A/P : Dhanore, Tal-Yeola , Dist.-Nasik, 423401

Micro Project Report


Academic year: 2024-25

Title of Project
Application Layer Protocols

Name of Student: Raundal Yash Suresh


Class : TYCO
Semester : Fifth
Roll No : 08
Enrollment No: 2211710048
Seat No :

Program : Computer Engineering


Course : OSY
Course code : 22516
Name of Teacher: Miss. Ghodke R. B.
Matoshri Education Society’s
MATOSHRI INSTITUTE OF TECHNOLOGY
A/P : Dhanore, Tal-Yeola , Dist.-Nasik, 423401

CERTIFICATE
This is to certify that Mr. Raundal Yash Suresh
Roll no 08 Of Fifth Semester of Diploma in
Computer Engineering has successfully completed
the for the Academic yeear 2024 -2025 as prescribed
MSBTE Micro Project in Application Layer
Protocols curriculum under the guidance of subject
teacher.

Place: Yeola Enrollment No: 2211710048


Date: Seat No:

Subject Teacher HOD Principal


Miss. Ghodke R. B. Mr. Ghorpde M. S. Mr. Gujrathi G.S.
Micro Project Report Index

Academic Year: 2024-25 Program: Computer Engineering


Class: TYCO Course: OSY
Course Code: 22516 Roll No: 08
Enrollment No: 2211710048 Exam Seat No:

Title of Micro Project: - Application Layer Protocols

Sr. Contents Page No.


No.
1 Introduction 7

2 Application Layer Protocols 8


Overview
3 Functions of Application Layer 9
Protocols
4 Working of the Application Layer 10

5 Common Application Layer Protocols 11

6 Significance of Application Layer 12


Protocols
7 Advantages of Application Layer 13
Protocols
8 Limitations of Application Layer 14
Protocols
9 Conclusion 15

10 Reference 16
1

Signature of Students Signature of Faculty


Raundal Yash Suresh Miss. Ghodke R. B.
ANNEXURE I
Rubric for Evaluation of Micro Project

Academic Year: 2024-25 Program: Computer Engineering


Class: TYCO Course: OSY
Course Code: 22516 Roll No: 08
Enrollment No: 2211710048 Exam Seat No:

Title of Micro Project: - Application Layer Protocols


Group Members:
Sr.No. Roll No. Name of Candidates

1 08 Raundal Yash Suresh

CO coverage:

Apply file management techniques.


Indicatorsfor different level of Performance
Marks
(Evaluation Scale 0 to 2)
Sr. No Criteria Obtained (
Out of 2) Poor (0) Average (1) Good (2)

Submission of Not Submitted proposal or project Project proposal &


1 Project anything in report submitted in project report
proposal/Report time time submitted ij time
CO/PRO Not attained any Attained some Attained
2 Attainment CO/PRO CO/PRO Maximum
Contains
Content of Not contains
Contains some relevant maximum
3 project/Formatti relevant
information relevant
ng information information
Total Marks
4 (06)
QuOSYion/
5 Answers (04)
Total (10) :

Additional Comments (if any):

Name of Teacher & Sign


Miss. Ghodke R. B.
Micro Project Proposal

Academic Year: 2024-25 Program: Computer Engg


Class: TYCO Course: OSY
Course Code: 22516

Title of Micro Project: Application Layer Protocols

Group Members:
Sr no Roll no Name Of Candidates

1 08 Raundal Yash Suresh

Content / Key Points:


Understanding concets of organization

Stationary/ Material Required (if any):

Internet Source

References:
https://www.geeksforgeeks.org/network-protocols-and-proxies-in-system-design/
Micro Project Log Book

Semester: Fifth Program: Computer Engineering


Course: OSY Class: TYCO

Topic of the Micro-Project: - Application Layer Protocols

Sr.No. Roll No. Name of Group Members Sign


1 08 Raundal Yash Suresh

Week Discussion & Details Teacher’s Teacher’s


No. Comment Sign
1 General Discussion about micro project activity.
2 Guidelines for micro project
3 Discussion on different industry/application/study
oriented topics
4 Work distribution to collect the information regarding
topic by each member.
5 Gathered information through the various sources, such
as internet, book, magazine, joutrnar and newspaper
6 Discussed the difficulty faced during the collection of
necessary information among the group member.
7 Discussion with the guide to sort out differently faced
while collecting the information.
8 Prepared a rough draft & shown it to the guide.

9 Necessary instructions are given by the guide for its


better Presentation & Finalized project.
10 Presentation is given on the topic, Report is prepared onthe
topics & final submission of micro project and
Report

Name & Signature of project Guide Name & Signature of HOD


Mr. Ghorpade M. S.
Miss. Ghodke R. B.
Introduction

The application layer is the topmost layer in the OSI (Open Systems
Interconnection) model, serving as the interface between the network
services and end-user applications. It provides the necessary protocols for
facilitating communication between software applications across a network.
This layer supports a wide range of services such as email (SMTP), file
transfer (FTP), web browsing (HTTP/HTTPS), and name resolution (DNS),
all of which are crucial for modern communication.

At the application layer, data is prepared for transmission by structuring it


into a format that the receiving application can understand. This layer also
manages user interactions and ensures the proper delivery of information to
the correct application on the destination device. The application layer hides
the complexity of the underlying network architecture, allowing users to
focus on their tasks without needing to know the technical details of how the
data is transmitted.

As an essential component of networking, the application layer ensures


seamless interaction between users and networked services. Without it, users
would be unable to access critical applications like web browsers, email
clients, or file transfer systems. By studying application layer protocols, we
gain a better understanding of how these services operate and the methods
used to ensure reliable and secure communication across networks.
Application Layer Protocols Overview
Application layer protocols are sets of rules and conventions that define
how data is exchanged between applications over a network. These
protocols enable the functioning of user-centric services like web
browsing, email communication, and file transfers. Operating at the
highest layer of the OSI model, application layer protocols manage the
exchange of information between end-user applications by specifying
how messages should be structured, transmitted, and processed by the
receiving system.
Each application layer protocol is tailored to support specific tasks. For
instance, HTTP (HyperText Transfer Protocol) handles web page
requests and data transfer, while SMTP (Simple Mail Transfer
Protocol) manages the sending of emails. Similarly, DNS (Domain
Name System) is used to translate human-readable domain names into
IP addresses, facilitating web navigation. Protocols like FTP (File
Transfer Protocol) enable the exchange of files between computers on
a network.
The main responsibility of application layer protocols is to ensure that
applications across different systems can communicate efficiently,
regardless of the underlying network architecture. These protocols
handle user data, ensuring that it is appropriately packaged, transmitted,
and received in a format that the destination application can understand,
making it possible for users to interact with services seamlessly.
Functions of Application Layer Protocols

1. Data Exchange:
They enable the transmission of data between applications,
ensuring that the sender and receiver follow the same format (e.g.,
HTTP for web pages, SMTP for emails).
2. Resource Sharing:
Facilitate access to shared resources like files and printers over
the network (e.g., FTP, SMB).
3. Service Discovery:
Help identify services and devices available on the network (e.g.,
DNS for resolving domain names, DHCP for IP address
allocation).
4. User Authentication and Security:
Implement encryption, authentication, and security protocols to
protect data (e.g., HTTPS for secure web communication).
5. Data Format Translation:
Ensure that data can be interpreted correctly by different systems
(e.g., MIME for sending multimedia in emails).
6. Session Management:
Manage and maintain sessions between applications (e.g., Telnet
for remote access).
7. Error Handling and Flow Control:
Ensure reliable communication by managing errors and
controlling data flow during transmission.
Working of the Application Layer
The application layer serves as the interface between the end user and
the network, facilitating the interaction of software applications with
lower layers of the OSI model. Here's how the application layer works:
1. User Requests:
When a user interacts with an application, such as opening a web
page or sending an email, the application layer protocols process
the request and prepare the data for transmission.
2. Data Packaging:
The application layer translates the user’s input into a format that
can be transmitted over the network. For example, HTTP converts
web page requests into a structured message, while SMTP
packages email data for delivery.
3. Communication with Lower Layers:
Once the data is formatted, the application layer passes it down to
the transport layer (e.g., TCP or UDP) for further processing, such
as segmenting and assigning a destination address.
4. Transmission and Response:
The data is sent over the network. Upon reaching the destination,
the application layer at the receiving end processes the incoming
data and delivers it to the appropriate application (e.g., displaying
a web page or receiving an email).
5. Session Management:
The application layer also manages sessions, maintaining open
communication between devices for the duration of a user’s
interaction (e.g., during a file transfer or remote access).
Common Application Layer Protocols

1. HyperText Transfer Protocol (HTTP/HTTPS)


 Function: Used for transferring web pages between a web server
and a browser.
 Port: HTTP operates on port 80, while HTTPS (the secure
version with encryption) operates on port 443.

2. File Transfer Protocol (FTP)


 Function: Facilitates the transfer of files between a client and
server.
 Port: FTP uses ports 20 and 21.

3. Simple Mail Transfer Protocol (SMTP)


 Function: Used for sending emails between mail servers.
 Port: Operates on port 25.

4. Domain Name System (DNS)


 Function: Translates human-readable domain names into IP
addresses.
 Port: Uses port 53.
5. Post Office Protocol (POP) and Internet Message Access
Protocol (IMAP)
 Function: Used for retrieving emails from a server. POP
downloads emails for offline use, while IMAP synchronizes
email data in real-time.
 Ports: POP uses port 110, and IMAP uses port 143.

6. Dynamic Host Configuration Protocol (DHCP)


 Function: Automatically assigns IP addresses to devices on a
network.
 Port: Uses ports 67 and 68.

7. Simple Network Management Protocol (SNMP)


 Function: Used for network management, allowing
administrators to monitor and control network devices.
 Port: Operates on ports 161 and 162.
Significance of Application Layer Protocols

1. User Interaction:
They serve as the bridge between user applications and the
network, allowing for direct communication through services like
web browsing (HTTP) and email (SMTP).
2. Standardized Communication:
Application layer protocols ensure standardized data exchange
between different systems and platforms, making it possible for
applications across different devices to interact seamlessly.
3. Service Accessibility:
These protocols provide access to essential network services such
as DNS for domain name resolution and DHCP for automatic IP
configuration, making network management more efficient and
user-friendly.
4. Security:
Protocols like HTTPS ensure secure data transmission by
encrypting sensitive information, safeguarding user privacy and
preventing cyber-attacks.
5. Resource Sharing:
They enable efficient resource sharing and collaboration by
supporting file transfers (FTP) and remote access (Telnet or SSH).
Advantages of Application Layer Protocols

1. User-Friendly Interaction: They enable direct communication


between users and network services, allowing for easy access to
applications like web browsers, email, and file-sharing systems.
2. Standardization: Application layer protocols create uniform
communication methods that work across different platforms and
devices, ensuring interoperability between various systems.
3. Resource Efficiency: These protocols optimize the use of
network resources by managing data transfer, file sharing, and
remote access without requiring complex manual configurations.
4. Security Enhancements: Protocols like HTTPS and SFTP offer
built-in security features such as encryption, ensuring secure
communication and data exchange over potentially unsafe
networks.
5. Versatility: Application layer protocols support a wide range of
services, from web access (HTTP) to email management (SMTP,
IMAP), providing flexibility for different types of user
interactions.
6. Scalability: The protocols are designed to scale efficiently,
making them suitable for both small local networks and large,
complex global systems like the internet.
7. Service Discovery and Availability: Application layer protocols
like DNS and DHCP enable the easy discovery and access to
network services, making it possible to resolve domain names and
automatically assign IP addresses, ensuring that services are
always available to users.
8. Error Handling and Flow Control: These protocols include
mechanisms for error detection and recovery, ensuring reliable
data transmission and managing network congestion by
controlling the flow of information between systems.
Limitations of Application Layer Protocols

1. Security Vulnerabilities:
Many protocols, like HTTP and FTP, are inherently insecure and
susceptible to attacks such as eavesdropping and data theft unless
secured (e.g., HTTPS or SFTP).
2. Resource Intensive:
Some application layer protocols can consume significant
network and system resources, especially when handling large
volumes of data or simultaneous user requests, leading to
potential performance issues.
3. Dependence on Lower Layers:
The efficiency of application layer protocols relies heavily on the
lower layers of the network, such as the transport and network
layers. Any issues at these layers (e.g., network congestion or
packet loss) can negatively affect the performance of application
layer services.
4. Lack of Real-Time Support:
Most application layer protocols are not designed for real-time
communication. For instance, protocols like HTTP and FTP are
ill-suited for time-sensitive applications such as live video
streaming or online gaming.
5. Complex Configuration:
Some protocols, like SMTP for email servers, can require
complex configurations and management, making them difficult
for inexperienced users to set up and maintain securely.
Conclusion

Application layer protocols are essential for facilitating communication


between user applications and the network, enabling various services
such as web browsing, email, and file transfers. They standardize data
exchange, ensure resource sharing, and provide security features that
enhance user experiences and protect sensitive information. By serving
as the interface between users and the network, these protocols make it
possible for applications across different platforms and devices to
interact seamlessly.
Despite their advantages, application layer protocols also have
limitations, including security vulnerabilities and reliance on lower
network layers. Understanding these protocols' roles and challenges is
vital for designing efficient and secure network solutions. As
technology continues to advance, the development of application layer
protocols will be crucial for meeting the evolving demands of users in
an increasingly connected world.
Reference
https://www.geeksforgeeks.org/open-systems-interconnection-model-
osi/
https://www.tutorialspoint.com/data_communication_computer_netw
ork/application_protocols.htm
https://www.techopedia.com/definition/6006/application-layer
https://owasp.org/www-project-application-security-verification-
standard/

You might also like