11
Dr. C.V. Suresh Babu
Application Layer
It's an abstraction layer
service that masks the rest of
the application from the
transmission process.
2
The application layer is a component
within an application that controls the
communication method to other
devices
3
4
• Application layer is used exchange messages.
• It provides access for global information about
various services.
• It helps us to access files and manages it.
This layer has many responsibilities, including
• error handling and recovery,
• data flow over a network and full network flow.
It is also used to develop network-based
applications.
5
Functions of Application Layer
• Mail Services: This layer provides the basis for
E-mail forwarding and storage.
• Network Virtual Terminal: It allows a user to
log on to a remote host.
• Directory Services: This layer provides access
for global information about various services.
• File Transfer, Access and Management
(FTAM): Users can access files in a remote
computer and manage it.
6
7
Protocol is a set
of rules and
regulations that
determine how
data is
transmitted in
telecommunica
tions and
computer
networking.
Application Layer
• Domain Name Space (DNS)
• SMTP
• FTP
• HTTP
• WWW
• Security
• Cryptography 8
9
The Domain Name System (DNS) is the phonebook
of the Internet. Humans access information online
through domain names, like google.com or
facebook.com. Web browsers interact through
Internet Protocol (IP) addresses.
DNS translates domain names to IP addresses so
browsers can load Internet resources.
10
SMTP is a set of communication guidelines that allow
software to transmit an electronic mail over the internet is
called Simple Mail Transfer Protocol. It is a program used for
sending messages to other computer users based on e-mail
addresses.
11
FTP (File
Transfer
Protocol) is the
commonly used
protocol for
exchanging files
over the
Internet
FTP works in the same way as HTTP and SMTP.
12
HTTP (Hyper Text Transfer Protocol) is the underlying
protocol used by the World Wide Web and this protocol
defines how messages are formatted and transmitted, and
what actions Web servers and browsers should take in
response to various commands.
13
The World Wide Web (WWW) is a
network of online content that is
formatted in HTML and accessed via
HTTP. The term refers to all the
interlinked HTML pages that can be
accessed over the Internet
14
Network security is a broad term that covers a multitude of
technologies, devices and processes.
In its simplest term, it is a set of rules and
configurations designed to protect the integrity,
confidentiality and accessibility of computer networks
and data using both software and hardware
technologies
15
Cryptography not only protects data from theft or alteration,
but can also be used for user authentication.
It refers to secure information and communication
techniques derived from mathematical concepts and a set
of rule-based calculations called algorithms to transform
messages in ways that are hard to decipher.

Introduction to Application layer

  • 1.
    11 Dr. C.V. SureshBabu Application Layer
  • 2.
    It's an abstractionlayer service that masks the rest of the application from the transmission process. 2 The application layer is a component within an application that controls the communication method to other devices
  • 3.
  • 4.
    4 • Application layeris used exchange messages. • It provides access for global information about various services. • It helps us to access files and manages it. This layer has many responsibilities, including • error handling and recovery, • data flow over a network and full network flow. It is also used to develop network-based applications.
  • 5.
  • 6.
    Functions of ApplicationLayer • Mail Services: This layer provides the basis for E-mail forwarding and storage. • Network Virtual Terminal: It allows a user to log on to a remote host. • Directory Services: This layer provides access for global information about various services. • File Transfer, Access and Management (FTAM): Users can access files in a remote computer and manage it. 6
  • 7.
    7 Protocol is aset of rules and regulations that determine how data is transmitted in telecommunica tions and computer networking. Application Layer
  • 8.
    • Domain NameSpace (DNS) • SMTP • FTP • HTTP • WWW • Security • Cryptography 8
  • 9.
    9 The Domain NameSystem (DNS) is the phonebook of the Internet. Humans access information online through domain names, like google.com or facebook.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
  • 10.
    10 SMTP is aset of communication guidelines that allow software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol. It is a program used for sending messages to other computer users based on e-mail addresses.
  • 11.
    11 FTP (File Transfer Protocol) isthe commonly used protocol for exchanging files over the Internet FTP works in the same way as HTTP and SMTP.
  • 12.
    12 HTTP (Hyper TextTransfer Protocol) is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
  • 13.
    13 The World WideWeb (WWW) is a network of online content that is formatted in HTML and accessed via HTTP. The term refers to all the interlinked HTML pages that can be accessed over the Internet
  • 14.
    14 Network security isa broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies
  • 15.
    15 Cryptography not onlyprotects data from theft or alteration, but can also be used for user authentication. It refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms to transform messages in ways that are hard to decipher.