0% found this document useful (0 votes)
8 views

Application Layer Protocols Presented by KHANZADI

The document discusses Application Layer Protocols, which are essential for communication over the internet and networks, detailing their functions, workings, and examples. Key protocols include HTTP, HTTPS, FTP, SMTP, and DNS, each serving specific roles such as web browsing, file transfer, and email management. Understanding these protocols is crucial for networking, cybersecurity, and IT infrastructure management.

Uploaded by

ffazal019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Application Layer Protocols Presented by KHANZADI

The document discusses Application Layer Protocols, which are essential for communication over the internet and networks, detailing their functions, workings, and examples. Key protocols include HTTP, HTTPS, FTP, SMTP, and DNS, each serving specific roles such as web browsing, file transfer, and email management. Understanding these protocols is crucial for networking, cybersecurity, and IT infrastructure management.

Uploaded by

ffazal019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

APPLICATION LAYER PROTOCOLS

MA’AM AQSA NOREEN


(COMPUTER NETWORK)

Submitted By:

IQRA KHAN :)
Application Layer Protocols:
The Application Layer is the topmost layer in the OSI (Open Systems Interconnection) model and
TCP/IP model. It provides services and protocols that directly interact with end-users and
applications. Application Layer Protocols enable communication over the internet and networks by
defining how data is formatted, transmitted, and received.

Number of Application Layer Protocols


There are numerous Application Layer Protocols, but the exact number keeps evolving as new
protocols are developed. However, some of the most commonly used protocols include:

1. HTTP (HyperText Transfer Protocol)


2. HTTPS (HyperText Transfer Protocol Secure)
3. FTP (File Transfer Protocol)
4. SFTP (Secure File Transfer Protocol)
5. SMTP (Simple Mail Transfer Protocol)
6. POP3 (Post Office Protocol v3)
Explanation of Each Protocol
HTTP (HyperText Transfer Protocol)
Function: Used for transferring web pages and other content over the internet.
Working: The client (browser) requests a webpage, and the web server
responds with the requested data.
Example : Browsing websites using URLs like http://www.example.com.

Charecteristics:
• Port no 80
• Itself not reliable but use TCP to achieve reliability
• Inband protocol
• Stateless
• Types of HTTP:
• HTTP 1.0 Non-Persistent . HTTP 1.1 Persistent
• Commands(Head, Get, Put, Post, Delete, Connect )
7. IMAP (Internet Message Access Protocol)
8. DNS (Domain Name System)
9. DHCP (Dynamic Host Configuration Protocol)
10. SNMP (Simple Network Management Protocol)
11. Telnet
12. SSH (Secure Shell Protocol)
13. NTP (Network Time Protocol)
14. LDAP (Lightweight Directory Access Protocol)
15. RDP (Remote Desktop Protocol)
16. MQTT (Message Queuing Telemetry Transport)
HTTPS (HyperText Transfer Protocol Secure)
Function : A secure version of HTTP that encrypts data using SSL/TLS.
Working : Encrypts communication between the web browser and the server
to protect sensitive data.
Example : Online banking and shopping websites use https://

FTP (File Transfer Protocol)


Function : Transfers files between computers over a network.
Working : Uses two channels (control and data) to upload/download files.
Example : Uploading a website's files to a web server.

Charecteristics:
• port no 20(Data) & 21(Control)
• Data connection is non-persistent
• Control connection is persistent
• Not inband
• Reliable
• Stateful

SFTP (Secure File Transfer Protocol)


Function : Secure file transfer over SSH (Secure Shell).
Working : Encrypts file transfers to prevent unauthorized access.
Example : Secure file transfer for remote system backups.
SMTP (Simple Mail Transfer Protocol)

Function : Sends emails from an email client to an email server.


Working : Uses port 25 (or 587 with encryption) to deliver emails to
mail servers.
Example : Sending an email using Gmail.

POP3 (Post Office Protocol v3)


Function : Retrieves emails from a mail server to a client.
Working : Downloads emails from the server and deletes them after
retrieval.
Example : Accessing email on Outlook or Thunderbird.
Charecteristics of SMTP & POP
• FTP is synchronous but SMTP & POP is both synchronous &
• asynchronous
• SMTP use port no 25 for pushing the mail
• By defult, the POP3 protocol works on two pors:
• Port 110-this is the non-encrypted port
• Port 995-this is the port you need to use if you want to connect using POP3
securely.
• MIME(Multipurpose Internet Mail Extension)

IMAP (Internet Message Access Protocol)


Function : Retrieves and manages emails on a remote mail server.
Working : Allows multiple devices to access emails without downloading them.
Example : Using Gmail on a phone and laptop simultaneously.
DNS (Domain Name System)
Function: Resolves domain names to IP addresses.
Working: When a user enters a website address, DNS translates it
into the corresponding IP address.
Example: Converting www.google.com to 8.8.8.8.

DHCP (Dynamic Host Configuration Protocol)


Function: Assigns IP addresses dynamically to devices in a network.
Working: A DHCP server assigns IP addresses, subnet masks, and
gateway addresses.
Example: When a device connects to Wi-Fi, it gets an IP address
automatically.
SNMP(Simple Network Management Protocol)
Function: Monitors and manages network devices like
routers and switches.
Working: A central SNMP manager collects data from network devices
using SNMP agents.
Example: Network monitoring tools like PRTG use SNMP.

Telnet
Function: Allows remote login to another computer.
Working: Sends commands from a local system to a remote system
using a text-based interface.
Example: Remote access to a Linux server (but insecure).
SSH (Secure Shell Protocol)
Function: Secure remote login and command execution.
Working: Encrypts commands sent over the network for
secure communication.
Example: Using SSH to manage a cloud server.

NTP (Network Time Protocol)


Function: Synchronizes time across networked devices.
Working: Communicates with NTP servers to ensure
accurate timekeeping.
Example: Keeping accurate time on servers and routers.
LDAP (Lightweight Directory Access Protocol)
Function: Manages user authentication and directory
services.
Working: Centralizes user account management in large
organizations.
Example: Logging into corporate systems using a single
username/password.
RDP (Remote Desktop Protocol)
Function: Provides remote desktop access to a computer.
Working: Transmits the graphical interface and user inputs
between devices.
Example: Use to access a work computer from home.
MQTT (Message Queuing Telemetry Transport)
Function: Lightweight messaging protocol for IoT devices.
Working: Uses a publish-subscribe model for communication.
Example: Smart home devices communicating with a central hub.

Conclusion:
Application Layer Protocols enable communication between devices and
applications on the internet and networks. Each protocol has a specific role,
from browsing websites to sending emails, transferring files, and managing
network devices. Understanding these protocols helps in networking,
cybersecurity, and IT infrastructure management.
L A H : )
ZA K A L
JA R ega rd
A
s
N
:

_Z A D I :)
K H

You might also like