0% found this document useful (0 votes)
10 views7 pages

Application Layer

The application layer is the top layer of the OSI model and provides services directly to application processes and end users. It identifies communication partners, determines available resources, and synchronizes communication between applications. Common application layer functions include file transfer and management, mail services, virtual terminals, directory services, and authentication. Examples of application layer protocols are DNS for naming, HTTP for web content, and FTP for file transfer.

Uploaded by

Enjoy Sheshe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

Application Layer

The application layer is the top layer of the OSI model and provides services directly to application processes and end users. It identifies communication partners, determines available resources, and synchronizes communication between applications. Common application layer functions include file transfer and management, mail services, virtual terminals, directory services, and authentication. Examples of application layer protocols are DNS for naming, HTTP for web content, and FTP for file transfer.

Uploaded by

Enjoy Sheshe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

OSI MODEL

Concepts
Application Layer
• The application layer in the OSI model is the closest layer to the end
user which means that the application layer and end user can interact
directly with the software application.
• The application layer programs are based on client and servers.
• Application layer interface directly interacts with the application and
provides common web application services.
• The application layer also makes a request to the presentation layer.
Application layer is the highest level of open systems, providing
services directly for the application process.
Application Layer
The Application layer includes the following functions:
• Identifying communication partners: The application layer identifies
the availability of communication partners for an application with
data to transmit.
• Determining resource availability: The application layer determines
whether sufficient network resources are available for the requested
communication.
• Synchronizing communication: All the communications occur
between the applications requires cooperation which is managed by
an application layer.
Application Layer
• Transport access and management
• It allows a user to access, retrieve and manage files in a remote
computer.
• mail services
• It provides the basis for email forwarding and storage facilities.
• Virtual terminal
Other functions
• In addition to the functions above, there are some other functions:
directory services, remote job entry, graphics, information
communication and so on.
Application Layer Services
• Network Virtual terminal: An application layer allows a user to log on to a remote host. To do so, the
application creates a software emulation of a terminal at the remote host. The user's computer talks to the
software terminal, which in turn, talks to the host. The remote host thinks that it is communicating with one
of its own terminals, so it allows the user to log on.
• File Transfer, Access, and Management (FTAM): An application allows a user to access files in a remote
computer, to retrieve files from a computer and to manage files in a remote computer. FTAM defines a
hierarchical virtual file in terms of file structure, file attributes and the kind of operations performed on the
files and their attributes.
• Addressing: To obtain communication between client and server, there is a need for addressing. When a
client made a request to the server, the request contains the server address and its own address. The server
response to the client request, the request contains the destination address, i.e., client address. To achieve
this kind of addressing, DNS is used.
• Mail Services: An application layer provides Email forwarding and storage.
• Directory Services: An application contains a distributed database that provides access for global information
about various objects and services.
• Authentication: It authenticates the sender or receiver's message or both.
Application Layer Services Examples
DNS (Domain Name System)
• The Domain Name System (DNS) is a hierarchical decentralized naming system for computers,
services, or other resources connected to the Internet or a private network. It associates
various information with domain names assigned to each of the participating entities.
• Currently, the limit on domain name length is 63 characters, including www. And .com or
other extensions. Domain names are also restricted to only a subset of ASCII characters,
making many other languages unable to properly represent their names and words.
Punycode-based IDNA systems, which map Unicode strings to valid DNS character sets, have
been validated and adopted by some registries as a workaround.
HTTP (Hypertext Transfer Protocol)
• The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, and hypermedia information systems.[1] HTTP is the foundation of data
communication for the World Wide Web.
Application Layer Services Examples
FTP (File Transfer Protocol)
• FTP services generally run on both ports 20 and 21. Port 20 is used to
transmit data flow between the client and server, while port 21 is
used to transmit control flow and is the command to import to the ftp
server. When data is streamed, the control flow is idle. When the
control flow, idle for a long time, the client's firewall, the session will
be set to overtime, so when a large amount of data through the
firewall, there will be some problems. At this point, although the file
can be successfully transmitted, it can be broken by the firewall
because of the control session; the transfer can result in some errors.

You might also like