0% found this document useful (0 votes)
18 views

Module-5-Application Layer

Uploaded by

Safa Hamza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Module-5-Application Layer

Uploaded by

Safa Hamza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Module IV

APPLICATION LAYER
• The application layer enables the user to
access the network.
• it provides user interface and support for
services such as electronic mail, file access
and transfer, access to system resources,
surfing the web and network management.
• The services provided by the application layer
can be categorized as
• • Remote login category
– Telnet
• • File transfer category
– FTP ( file transfer protocol)
– TFTP (trivial file transfer protocol)
• • Electronic mail category
– SMTP ( simple message transfer protocol)
– IMAP (internet message access protocol)
– POP (Post office protocol)
• • Support services category
– DNS ( Domain name system)
– RARP (reverse address resolution protocol)
– BOOTP (boot protocol)
– SNMP ( simple network management protocol)
Telnet
• Telnet is a network protocol used on the
Internet or local area networks to provide a
bidirectional interactive text-oriented
communication facility using a virtual terminal
connection.
• User data is interspersed in-band with Telnet
control information in an 8-bit byte oriented
data connection over the Transmission Control
Protocol (TCP).
File Transfer Protocol
• File Transfer Protocol (FTP) is a standard
network protocol used to transfer files
from one host or to another host over a
TCP-based network, such as the Internet.
• FTP is built on a client-server architecture
and uses separate control and data
connections between the client and the
server)
• FTP users may authenticate themselves using
a clear-text sign-in protocol, normally in the
form of a username and password, but can
connect anonymously if the server is
configured to allow it.
• For secure transmission that hides (encrypts)
the username and password, and encrypts the
content, FTP is often secured with SSL/TLS
(FTPS) or SSH File Transfer Protocol (SFTP)
Trivial File Transfer Protocol (TFTP)
• Trivial File Transfer Protocol (TFTP) is a file
transfer protocol notable for its simplicity.
• It is generally used for automated transfer of
configuration or boot files between machines in a
local environment.
• Compared to FTP, TFTP is extremely limited,
providing no authentication, and is rarely used
interactively by a user.
• TFTP is very useful for boot computers and devices
that do not have hard disk drives or storage devices
because it can easily be implemented using a small
amount of memory. This characteristic of TFTP makes
it one of the core elements of network boot protocol
Simple Mail Transfer Protocol (SMTP)
• SMTP is an application-layer protocol that enables
the transmission and delivery of email over the
Internet.
• Simple Mail Transfer Protocol (SMTP) is an
Internet standard for electronic mail (e-mail)
transmission across Internet Protocol (IP)
networks.
• SMTP is created and maintained by the Internet
Engineering Task Force (IETF).
• No check sum are needed because TCP provides
reliable byte stream
Internet message Access Protocol (IMAP)

• Internet message access protocol (IMAP) is


one of the two most prevalent Internet
standard protocols for e-mail retrieval, the
other being the Post Office Protocol (POP).
• Virtually all modern e-mail clients and mail
servers support both protocols as a means of
transferring e-mail messages from a server.
• The POP protocol has been developed through
several versions, with version 3 (POP3) being
the current standard. Most webmail service
providers such as Hotmail, Gmail and Yahoo!
Mail also provide IMAP and POP3 service
Domain Name System (DNS)
• The Domain Name System (DNS) is a
hierarchical distributed naming system for
computers, services, or any resource
connected to the Internet or a private
network. It associates various information
with domain names assigned to each of the
participating entities
Domain Name Service
• A Domain Name Service resolves queries for
these names into IP addresses for the purpose
of locating computer services and devices
worldwide. By providing a worldwide,
distributed keyword-based redirection service,
the Domain Name System is an essential
component of the functionality of the
Internet.
• The service provided by the Domain Name System
is similar to the phone book for the Internet by
translating human-friendly computer hostnames
into IP addresses.
• For example, the domain name www.example.com
translates to the addresses 192.0.43.10 (IPv4) and
2620:0:2d0:200::10 (IPv6).
• The Domain Name System distributes the
responsibility of assigning domain names and
mapping those names to IP addresses by
designating authoritative name servers for each
Reverse Address Resolution Protocol
• The Reverse Address Resolution Protocol
(RARP) is an obsolete computer networking
protocol used by a host computer to request
its Internet Protocol address from an
administrative host, when it has available its
Link Layer or hardware address, such as a MAC
address.
Bootstrap Protocol
• In computer networking, the Bootstrap
Protocol, or BOOTP, is a network protocol used
by a network client to obtain an IP address
from a configuration server.
• BOOTP is usually used during the bootstrap
process when a computer is starting up.
• A BOOTP configuration server assigns an IP
address to each client from a pool of addresses.
BOOTP uses the User Datagram Protocol (UDP).
Simple Network Management Protocol
• Simple Network Management Protocol
(SNMP) is an Internet-standard protocol for
managing devices on IP networks.
• Devices that typically support SNMP include
routers, switches, servers, workstations,
printers, modem racks etc.
• It is used mostly in network management
systems to monitor network-attached devices
for conditions that warrant administrative
attention.
• Prayerful
• Best Wishes
• All
• My
• Dear Students

You might also like