Free Essay

Application Layer

In:

Submitted By abhideep
Words 1147
Pages 5
ABSTRACT
Networking at engineering level is a complicated task. It involves software, firmware, chip level engineering, hardware and even electric pulses. To ease network engineering, the whole networking concept is divided into multiple layers. Each layer is involved in some particular task and is independent of all other layers. But as a whole the almost all networking task depends on all of these layers. Layers share data between them and they depend on each other only to take input and give output. In layered architecture of Network Models, one whole network process is divided into small tasks. Each small task is then assigned to a particular layer which works dedicatedly to process the task only. Every layer does only specific work. I have chooses application layer from the OSI model because the world experiences the Internet through the use of the World Wide Web, e-mail, and file-sharing programs. These applications, as well as others, provide the human interface to the underlying network, allowing you to send and receive information with relative ease. Most of the applications are intuitive; they can be accessed and used without the need to know how they work. As we continue to study the world of networking, it becomes more important to know how an application is able to format, transmit, and interpret messages that are sent and received across the network.

INTRODUCTION
Application layer is the highest most layers in OSI and TCP/IP layered model and this layer exists in both layered Models because of its significance which is interacting with user and user applications. This layer is for applications which are involved in communication system. A user may or may not directly interacts with these applications. Application layer is where the actual communication is initiated and reflects. Because this layer is on the top of the layer stack it does not serve any other layers. Application layer takes the help of Transport and all layers below it to communicate or transfer its data to the remote host.When an application layer protocol wants to communicate with its peer application layer protocol on remote hosts it hands over the data or information to the Transport layer. The transport layer does the rest of the things with help of all layers below it.

There’s an ambiguity in understanding Application Layer and its protocol. Not every user application can be put into Application Layer. Only application which interacts with the communication system. For example, a designing software or text-editor cannot be considered as application layer programs. On the other hand when we use a Web Browser, which is actually using HTTP (Hyper Text Transfer Protocol) to interact with the network. So in this case, HTTP is Application Layer protocol. Another example is File Transfer Protocol, which helps a user to transfer a text based or binary file across the network. A user can use this protocol in either GUI based software like FileZilla or CuteFTP and the same user can use FTP in Command Line mode. So it is not important what software we use, it the protocol which is considered at Application Layer used by that software. DNS is a protocol which helps user application protocols like HTTP to accomplish its work.

BACKGROUND
In the OSI model, information is passed from one layer to the next, starting at the application layer on the transmitting host and proceeding down the hierarchy to the physical layer, then passing over the communications channel to the destination host, where the information proceeds back up the hierarchy, ending at the application layer. The Figure depicts the steps in this process. The following explains the six steps:
1. People create the communication.
2. The application layer prepares human communication for transmission over the data network.
3. Software and hardware convert communication to a digital format.
4. Application layer services initiate the data transfer.
5. Each layer plays its role. The OSI layers encapsulate data down the stack. Encapsulated data travels across the media to the destination. OSI layers at the destination unencapsulate the data up the stack.
6. The application layer receives data from the network and prepares it for human use.

The application layer is the top layer of both the OSI and TCP/IP models. Its provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. Application layer protocols are used to exchange data between programs running on the source and destination hosts. There are many application layer protocols, and new protocols are always being developed. Although the TCP/IP protocol suite was developed prior to the definition of the OSI model, the functionality of the TCP/IP application layer protocols fits roughly into the framework of the top three layers of the OSI model: application, presentation, and session. Most applications, such as web browsers or e-mail clients, incorporate functionality of the OSI Layers 5, 6, and 7. A comparison of the OSI and TCP/IP model is shown in Figure 3
Most TCP/IP application layer protocols were developed before the emergence of personal computers,GUIs, and multimedia objects. As a result, these protocols implement little of the functionality that is specified in the OSI model presentation and session layers.

Presentation Layer

The presentation layer has three primary functions:
■ Coding and conversion of application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device.
■ Compression of the data in a manner that can be decompressed by the destination device
■ Encryption of the data for transmission and decryption of data upon receipt by the destination
Presentation layer implementations are not typically associated with a particular protocol stack. The standards for video and graphics are examples. Some well-known standards for video include QuickTime and Motion Picture Experts Group (MPEG).

Session Layer
Functions at the session layer create and maintain dialogs between source and destination applications. The session layer handles the exchange of information to initiate dialogs and keep them active, and to restart sessions that are disrupted or idle for a long period of time.

TCP/IP Application Layer Protocols
The most widely known TCP/IP application layer protocols are those that provide the exchange of user information. These protocols specify the format and control information necessary for many of the common Internet communication functions. Among these TCP/IP protocols are the following: * Domain Name System (DNS) is used to resolve Internet names to IP addresses. * Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the web pages of the World Wide Web. * Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments. * Telnet, a terminal emulation protocol, is used to provide remote access to servers and networking devices. * File Transfer Protocol (FTP) is used for interactive file transfer between systems.

Similar Documents

Premium Essay

Nt1210 Unit 2.3 Application Layer

...2.2.3 Application layer The application layer consists of management and business-oriented software. It can also be understood as a user interface for the control layer. From the management point of view, the programs running in the application layer may provide the network engineers with statistics about their networks. Currently using application layer metrics in the form of a common measurement solution received minor attention. Such as application of a measurement can be a generic usage-based charging as a service. In another word, a more flexible measurement which is software defined and written by providers of service customized for their own specific use, transparent from their interior applications and end-users [24]. 2.3 OpenFlow protocol...

Words: 395 - Pages: 2

Free Essay

Intrusion Detection

...activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent. Intrusion Detection Systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection provides a way to identify and thus allow responses to, attacks against these systems. Second, due to the limitations of information security and software engineering practice, computer systems and applications may have design flaws or bugs that could be used by an intruder to attack the systems or applications. As a result, certain preventive mechanisms (e.g., firewalls) may not be as effective as expected. Intrusion detection complements these protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that we can understand the security threats and risks and thus be better prepared for future attacks. IDSs may be classified into Host-Based IDSs, Distributed IDSs, and Network-Based IDSs according to the sources of the audit information used by each IDS. 1) Host-based IDSs get audit data from host audit trails and...

Words: 1083 - Pages: 5

Premium Essay

Is3230 Assy#4

...  Services: The scan shows the use of the following services: Services Use Msrpc A tool for running processes on a remote computer. netbios-ssn It provides services related to the session layer of the OSI model allowing the applications on a separate computer to communicate microsoft-ds This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. ms-wbt-server Virtual data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. wsdapi Used to develop client applications that find and access devices, and to develop device hosts and associated services that run on Windows Vista and Windows Server 2008.  Unnecessary services and removing them: Ideally, a Web server should be on a dedicated, single-purpose host. When configuring the OS, disable everything except that which is expressly permitted—that is, disable all services and applications, re-enable only those required by the Web server, and then remove the unneeded services and applications. If possible, install the minimal OS configuration and then add or remove services and applications as needed. Choose the “minimal installation” option, if available, to minimize the effort required in removing unnecessary services. Furthermore, many uninstall scripts or programs are far from perfect...

Words: 429 - Pages: 2

Premium Essay

Nt1310 Unit 7 Layers Research Paper

...The Data Link Layer and Physical Layer  OSI Model: The Open Framework Interconnection display characterizes a systems administration structure to execute conventions in layers, with control go starting with one layer then onto the next. It is fundamentally utilized today as an instructing device. It reasonably separates PC arrange design into 7 layers in a coherent movement. The lower layers manage electrical signs, pieces of paired information, and directing of these information crosswise over systems. More elevated amounts cover organize solicitations and reactions, portrayal of information, and system conventions as observed from a client's perspective. The OSI demonstrate was initially considered as a standard engineering for building system frameworks and to be sure, numerous mainstream organize advancements today mirror the layered outline of OSI...

Words: 741 - Pages: 3

Premium Essay

Fxt2 Task 1

...Slide: 1 Presenter's Notes: Presentation regarding the university’s Disaster Recovery Plan/Enterprise Continuity Plan including: basic structures; roles within the DRP/ECP plan; areas within a company if addressed improve resilience to catastrophic events, and an employee awareness campaign. Slide 2: Presenter's notes: Presenter's notes: The presentation will cover several areas dealing with the university’s ability to prepare for an emergency or catastrophic event. The areas covered include: 1. Personnel roles within a disaster recovery and emergency continuity plan 2. Areas within the university that when properly addressed provide resilience to operational disturbances 3. Outline of a DRP/ECP training program. 4. Areas of the emergency plans that will improve by input from outside vendors. 5. The creation and execution of the plan to make employees aware of their roles in the DRP/ECP plan while confirming their understanding A1. DRP/ECP Roles Slide 3: Presenter's Notes: The responsibility of the emergency management team is to coordinate a series of teams within the university. First the perimeter security team is responsible for maintaining the physical security of the university’s property during an emergency. Second the technical support team must define operational procedures to create preparedness for an emergency; procedures to execute during an emergency situation, and procedures for catastrophic events to allow the business to function...

Words: 2078 - Pages: 9

Premium Essay

Protocols

...wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security (Protocols.com) * Transport Layer Protocols * WDP or Wireless Datagram Protocol (Protocols.com) Protocols are necessary for communications between systems, different types of communications from wired...

Words: 278 - Pages: 2

Free Essay

Game

...to do a good job…if you want a tutorial that just applies a couple of filters, then this tutorial is not for you! You will need to know how to use the PEN TOOL for this tutorial. (If you don’t know how to use the pen tool complete the fast tutorial found HERE first). I suggest you read through the entire tutorial first, before you begin. 1. Preparing the Layers Open your photo in Photoshop. Rename the layer “original”. If your picture is quite dark you will need to lighten it a little. The reason for this is that we will be tracing over the photo in black so we need to be able to see the lines we are creating clearly. Adjust the Brighness of the photo Image >> Adjustments >> Brightness/Contrast… Duplicate the “original” layer. Rename this new layer “top”. Create two more new layers. Place them under the “top” layer. Fill the layer closest to the “original” layer white and rename it “background”. Leave the other layer transparent and rename it “line art” Turn the visibility OFF for the “background” and “top” layers.< Visibility ON for the “line art” and “original” layers and the “line art” layer is active. See image below. (All this organisation will be explained soon). We are now set to create the line art. 2. Brush Tool Settings When creating line art you want to vary to thickness of the line (line weight). Varying the line weight emphasizes the perspective of the drawing. As lines become closer the viewers the lines get thicker. Lines taper...

Words: 1058 - Pages: 5

Free Essay

Master

...(unsupervised) Maintains permanent plasticity Learn in approximate match phase Non-stationary world Other ANN (BP) Offline learning supervised Plasticity regulated externally Learn in mismatch phase (error based) Stationary world ART Terminology STM : Short term memory ! ! Refers to the dynamics of neural units (recognition, matching) Refers to the adaptation of weights (learning) control structure to activate/deactivate search and matching ! LTM : Long term memory ! ! Gain control : ! 1 ART Basic Architecture F2 gain + ! ART Basic Architecture F2 layer: ! ! ! STM F2 LTM + ! Each node represents a prototype (template) Competitive dynamics (winner takes all) Performs template selection Performs template matching Matches template from layer F2 with the input Just stores the input to F1, no dynamics + STM F1 F1 gain F2 reset ! F1 layer: ! ! Input layer : ! Inputs ART Basic Algorithm ! !...

Words: 1571 - Pages: 7

Free Essay

Become a Web Developer

...Project Objectives! Our aim is to design and develop a simple site design with a modern layout that's conducive to CMS systems like WordPress. We won't be applying any wild and crazy style effects in our design (the point here is to keep it simple), but we are going to approach the entire process, from start to finish, as a study in layout and a proper use of margins and padding. We'll be using the 960 grid system from start to finish, so if you've ever wondered what it's like to use the system, now's a great time to learn! We'll be making a few deviations from the norm, but for the most part we'll be using 960gs in the design and coding phases. Once you guys/gals are done, you're welcome to customize the design all you want with your own fonts, colors, styles and textures! Remember, this is just a starting out point - you're welcome to go as nuts as you want when it comes to the personality of your own version of the design. A Brief Course Outline. We might break this up differently once we hit the coding phase, but this should give you a good idea of where we're heading with this series: • The Design Phase • Session 1: Laying The Groundwork and Designing the Homepage • Session 2: Designing the Support Pages (Available Next Week) • The Coding Phase • Session 3: Slicing and XTHML Coding (Available Soon) • Session 4: Convert To a Wordpress Theme (Available Soon) Resources Used For This Project You can use your own resources if you'd like, but here's the full list of...

Words: 2814 - Pages: 12

Free Essay

Future

...PHOTOSHOP INSTRUCTIONS PHOTOSHOP INSTRUCTIONS 1. Open Photoshop TIPS Use the layers and ‘rasterize’ the layer for each image you use! TIPS Use the layers and ‘rasterize’ the layer for each image you use! To open a blank page:- 1. Click on File / New 2. Rename it Poster To Insert an image from your folder :- 1. File / Place and look for your image – double click on the image 2. Right click on the layer and choose rasterize layer – do this for all your images 3. Click on control and T to resize the image To get rid of the background of your image:- 1. Click on the Magic Wand tool to get rid of the background 2. CTRL and + to make bigger – use eraser to make neat To soften the edges of an image 1. Click on the layer of the image you want to change 2. Click on eraser tool and make sure the opacity is low (at the top) and rub around the edges (you can also use the smudge tool) To change colours / style of an image 1. Click on the layer of the image you want to change 2. Click on Image / Adjustments / Gradient map 3. Click on some of the others and experiment! Add Text 1. Add text 2. Right click to warp 3. Change styles of text More changes to style of text ….. Right click on the layer the text is on and choose blending options – experiment!! To add a background image 1. File / new 2. File / Place and look for your background image 3...

Words: 301 - Pages: 2

Premium Essay

Head & Shoulders Benefits

...Head and shoulders is the best Shampoo against Dandruff because its market share increases year by year Did you know that your skin is the largest organ in your body – and one that’s constantly replenishing itself?  It’s made up of four layers. New cells are created at the base layer and move up through the four layers over a period of 25-30 days. When they reach the surface, we shed the cells.  This never stops: each day, you shed thousands of microscopic flakes of skin known as ‘squames’. Over a year, these add up to around 4kg in total!  As an area of skin, the scalp is a bit different. It produces the most visible hairs – you’d find between 100,000 – 150,000 if you counted them. And if you were to measure shoulder-length hair as a single strand, it would stretch up to 30km!  This warm, sheltered environment made up of loose skin flakes and hair makes an ideal home for micro-organisms. And here’s where the scalp differs again: it has a natural defence system against these organisms called sebum, a lightly greasy substance.  However, one organism, has adapted to live off sebum. It’s as a consequence of this that it causes the shedding process to speed up – as quickly as four days in extreme cases. When this happens, the small flakes clump together and we see them as the flakes associated with dandruff.  So while your scalp is pretty efficient at looking after itself, it sometimes needs a little help. And that’s as easy as using head & shoulders regularly...

Words: 349 - Pages: 2

Premium Essay

Analysis of Wireless Protocols

...com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security (Protocols.com) * Transport Layer Protocols * WDP or Wireless Datagram Protocol (Protocols.com) Protocols are necessary for communications between systems, different...

Words: 285 - Pages: 2

Premium Essay

It Paper

...Lab Assessment Questions & Answers 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regards to physical location and back-end security for privacy data and credit card data? I would place the e-commerce server in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will...

Words: 276 - Pages: 2

Free Essay

Autocad Layer Standards

...Architectural Layer Standards The CAD Layer Guidelines are organized as hierarchy. This arrangement accommodates expansion and addition 0f user-defined extensions to the layer list. Layer names are alphanumeric and use abbreviations that are easy to remember. This legibility is particularly important when CAD files are distributed among architects, consultants, and clients. Layer names consist of a Discipline Code-Major Group-Minor Group-Status Field. The format for the CAD Standard is as follows: Discipline Code Discipline is the primary method of classification for layer names. The discipline code provides a path back to the originator of the data and provides a logical categorization of CAD information. The discipline code is intended primarily to identify the author of the graphic information. Thus, a structural column placed by an architect would be A-COLS rather than S-COLS. The existence of both sets of information can in fact indicate the need for coordination. The Discipline Code is a one or two-character field with the second character either a hyphen or a user-defined modifier. The discipline codes are listed below. A Architectural M Mechanical C Civil P Plumbing E Electrical Q Equipment F Fire Protection R Resource G General S Structural H Hazardous Materials T Telecommunications I Interiors X Other L Landscape Z Contractor/shop Drawings Major Group The Major Group designation identifies the building system. This field must contain...

Words: 1415 - Pages: 6

Free Essay

Cashier

...the file “hungryOwl_video” b. Set the file format to Photoshop (.psd) c. Save ! the background Creating ! 1. Rename the first layer “background” 2. Double-click on foreground color and set it to #242424 3. Select the bucket tool (G) 4. Click anywhere on the canvas to fill it with dark grey ! the text Creating ! 1. Select the type tool (T) 2. Set the font-family to Righteous, Size to 320px, Color to #4d4d4d 3. Click anywhere on the canvas and type “hungry owl” a. Click on the Check Mark in the top options bar to commit 4. To center the text on the canvas: a. Select All (Cmd + A) b. Activate the move tool c. Use the centering icons in the top option bar d. Deselect (Cmd + D) 5. Make 2 copies of the font layer (Cmd + J) 6. Rename the layers “font1”, “font2”, “font3” 7. Add noise to each layer: a. Activate the “font1” layer b. Filter > Noise > Add Noise i. OK the rasterize alert window ii. Set the amount to 20 iii. OK c. Activate the “font2” layer d. Filter > Noise > Add Noise i. OK the rasterize alert window ii. Set the amount to 21 iii. OK e. Activate the “font3” layer f. Filter > Noise > Add Noise i. OK the rasterize alert window ii. Set the amount to 22 iii. OK ! the stars Adding 1. Create a new layer above each font layer (Cmd + Shift + N) 2. Rename them relative to their font layer (“stars1”, “stars2”, “stars 3”) 3. Load the star brush: a. Activate the brush tool (B) b....

Words: 1947 - Pages: 8