Application Layer Protocols Presented by KHANZADI
Application Layer Protocols Presented by KHANZADI
Submitted By:
IQRA KHAN :)
Application Layer Protocols:
The Application Layer is the topmost layer in the OSI (Open Systems Interconnection) model and
TCP/IP model. It provides services and protocols that directly interact with end-users and
applications. Application Layer Protocols enable communication over the internet and networks by
defining how data is formatted, transmitted, and received.
Charecteristics:
• Port no 80
• Itself not reliable but use TCP to achieve reliability
• Inband protocol
• Stateless
• Types of HTTP:
• HTTP 1.0 Non-Persistent . HTTP 1.1 Persistent
• Commands(Head, Get, Put, Post, Delete, Connect )
7. IMAP (Internet Message Access Protocol)
8. DNS (Domain Name System)
9. DHCP (Dynamic Host Configuration Protocol)
10. SNMP (Simple Network Management Protocol)
11. Telnet
12. SSH (Secure Shell Protocol)
13. NTP (Network Time Protocol)
14. LDAP (Lightweight Directory Access Protocol)
15. RDP (Remote Desktop Protocol)
16. MQTT (Message Queuing Telemetry Transport)
HTTPS (HyperText Transfer Protocol Secure)
Function : A secure version of HTTP that encrypts data using SSL/TLS.
Working : Encrypts communication between the web browser and the server
to protect sensitive data.
Example : Online banking and shopping websites use https://
Charecteristics:
• port no 20(Data) & 21(Control)
• Data connection is non-persistent
• Control connection is persistent
• Not inband
• Reliable
• Stateful
Telnet
Function: Allows remote login to another computer.
Working: Sends commands from a local system to a remote system
using a text-based interface.
Example: Remote access to a Linux server (but insecure).
SSH (Secure Shell Protocol)
Function: Secure remote login and command execution.
Working: Encrypts commands sent over the network for
secure communication.
Example: Using SSH to manage a cloud server.
Conclusion:
Application Layer Protocols enable communication between devices and
applications on the internet and networks. Each protocol has a specific role,
from browsing websites to sending emails, transferring files, and managing
network devices. Understanding these protocols helps in networking,
cybersecurity, and IT infrastructure management.
L A H : )
ZA K A L
JA R ega rd
A
s
N
:
_Z A D I :)
K H