0% found this document useful (0 votes)
81 views

Application Layer: Presented By: Sanskrati Upadhyay Roll Number: MT19CPS018

The application layer enables users and software to access network services like email, file transfer, and the web. Key protocols at this layer include SMTP for email, FTP for file transfer, HTTP/HTTPS for web access, and POP3/IMAP for retrieving email. The application layer relies on the layers below it to complete transmission while masking these details from the user.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Application Layer: Presented By: Sanskrati Upadhyay Roll Number: MT19CPS018

The application layer enables users and software to access network services like email, file transfer, and the web. Key protocols at this layer include SMTP for email, FTP for file transfer, HTTP/HTTPS for web access, and POP3/IMAP for retrieving email. The application layer relies on the layers below it to complete transmission while masking these details from the user.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

APPLICATION

LAYER
Presented By: Sanskrati Upadhyay
Roll Number : MT19CPS018
LAYERED ARCHITECTURE – ISO-OSI MODEL

• There are N number of users who use computer network and are located over
the world. So to ensure, national and worldwide data communication, systems
must be developed which are compatible to communicate with each other,
hence ISO has developed the standard.
• The model developed by ISO is Open System Interconnection(OSI) model and
commonly known as ISO-OSI model.
• ISO-OSI model is a seven layer architecture. It defines seven layers or levels in
a complete communication system.
APPLICATION
LAYER
&
PROTOCOLS
INTRODUCTION
• The application layer enables the user, whether human or software, to
access the network. It provides user interfaces and support for services
such as electronic mail, remote file access and transfer, shared database
management, and other types of distributed information services.

• It's an abstraction layer service that masks the rest of the application
from the transmission process. The application layer relies on all the
layers below it to complete its process.
APPLICATIONS LAYER – ALLOWS USER TO
INTERFACE WITH THE NETWORK!
PROTOCOL ARCHITECTURE
E-MAIL SERVICES AND PROTOCOLS

• One of the most popular Internet services is electronic mail (e-mail).


• The four major components in E-mail are-
a) USER AGENTS
b) MAIL SERVERS
c) SIMPLE MAIL TRANSFER PROTOCOL(SMTP)
d) POP3/IMAP4 PROTOCOL.
USER AGENT
• A user agent is a software
package (program) that
composes, reads, replies to, and
forwards messages. It also USER
AGENT
handles mailboxes.
• There are two types of user Reading
Compose
the Replying Handling
agents: the
message messages mailboxes
message
a) Command driven
b) GUI-Based
Mail server
These are the servers which will hold the incoming messages from the sender.

Message Transfer agent :SMTP


• The actual mail transfer is done through message transfer agents.
• The formal protocol that defines the MTA client and server in the Internet is
called the Simple Mail Transfer Protocol (SMTP).
• SMTP is commonly called as a PUSH protocol.
POP3 - PULL PROTOCOL

• Post Office Protocol, version 3 (POP3) is simple and limited in functionality.


The client POP3 software is installed on the recipient computer; the server
POP3 software is installed on the mail server.

• Mail access starts with the client when the user needs to download e-mail
from the mailbox on the mail server. The client opens a connection to the
server on TCP port 110. It then sends its user name and password to access the
mailbox. The user can then list and retrieve the mail messages, one by one.
IMAP4:INTERNET MAIL ACCESS PROTOCOL

• Another mail access protocol is Internet Mail Access Protocol, version 4


(IMAP4). IMAP4 is similar to POP3, but it has more features; IMAP4 is more
powerful and more complex.

• POP3 is deficient in several ways. It does not allow the user to organize her mail
on the server; the user cannot have different folders on the server. (Of course, the
user can create folders on her own computer.) In addition, POP3 does not allow
the user to partially check the contents of the mail before downloading.
EXTRA FUNCTIONS OF IMAP4

A user can check the mail header prior to


downloading.

A user can partially download the e-mail.


This is helpful when the bandwidth is
limited.

A user can create, delete, rename


mailboxes on the server.

A user can create hierarchy of mailboxes


on the server.
FILE TRANSFER PROTOCOL(FTP)
• Transferring files from one computer to another is one of the most common tasks
expected from a networking or internetworking environment. To implement this we
use FTP.
• FTP establishes two connection between the host-
a) One connection is used for data transfer.
b) Other for control information (commands and responses).
• FTP uses two well-known TCP ports:
a) Port 21 is used for the control connection
b) Port 20 is used for the data connection.
WORLD WIDE WEB (WWW)
• The Web is a repository of information in which the documents,
called web pages, are distributed all over the world and related
documents are linked together.
• The WWW is a distributed client-server service, in which a client
using a browser can access a service using a server. However, the
service provided is distributed over many locations called sites. Each
site holds one or more web pages. Each web page, however, can
contain some links to other web pages in the same or other sites.
HTTP & HTTPS

• The Hypertext Transfer Protocol


(HTTP) is a protocol used mainly
to access data on the World Wide
Web.
• HTTP specifies a
request/response protocol.
• HTTPS stands for Hyper Text
Transfer Protocol Secure.
STEPS INVOLVED ARE AS FOLLOWS:
URL is typed in the address bar. Browser checks with DNS server to
convert it to an IP address.

Connection to the server requested.

Using HTTP or HTTPS protocol requirements, the browser sends a GET


request to the server to ask for the desired html document .

The server sends the HTML code for the web page to the browser. The
browser interprets the HTML code and formats the page to fit the browser
window.
DOMAIN NAME SYSTEM
• The domain name system is usually used to translate a host name into an
IP address .
• Domain names comprise a hierarchy so that names are unique, yet easy
to remember.
• For example: A user of an e-mail program may know the e-mail address
of the recipient; however, the IP protocol needs the IP address. The DNS
client program sends a request to a DNS server to map the e-mail address
to the corresponding IP address.
DNS SERVER STRUCTURE
• DNS Servers resolve names to
IP addresses.
• It would be difficult to
remember the IP address of
every website we like to visit,
but we can remember names.
REFRENCES
Websites
• https://www.studytonight.com/computer-networks/complet
e-osi-model
• https://www.youtube.com/watch?v=EMklAY_biwg
• https://www.youtube.com/watch?v=PJo5yOtu7o8
Books
Data communication and Networking, Behrouz A Forouzan

You might also like