The application layer is primarily responsible for setting up a model to identify communication methods to allow users and hosts to interact with the software applications available on the internet.
Several application layer protocols help in the efficient working of our application layer in the network model. The protocols work similarly in different network models that have come into existence. The most common application layer protocols are HTTP , TELNET , DNS , SMTP , and so on. These protocols mechanize a way for users to communicate and interact over the World Wide Web.
Protocols in the application layer work similarly in both network models.
We need a model to enable applications to communicate with each other over the Internet. For the same, we have two models.
Each layer follows its different protocols for its efficient working. The topmost layer in both the models is known as the application layer & it facilitates users to interact with each other over the internet through different services.
Note:
The application layer and its protocol work similarly in both models.
Protocols in each layer of the network model provide a mechanism for devices to identify and connect. They also contain formatting rules specifying how data is packaged when the messages are sent and received.
There are several protocols in the application layer used for different services like email services, file transfers, etc. We will look at each one of them one by one.
A service that is used to translate domain names ( google.com ) to their corresponding IP addresses ( 8.8.8.8 ).
DNS stands for "domain name system". It is used for an effective translation of internet domain names into internet protocol addresses. What does this mean? As humans, we work with a name to identify a particular website. However, that is not how computer networks understand. For viable communication between humans and systems, we need DNS.
For example, the public IP address 1.1.1.1 is used through which the computer locates our desired website i.e. cloudflare.com. An IP address is a 32 -bit number similar in structure to 227.82.157.177 .
The following are some characteristics of DNS:
Most activities on the web rely on DNS to quickly make a connection between our computer & remote hosts of our desired location on the internet. The DNS service can be mapped to a phone book service where we receive the phone number using the name of the person we are looking to communicate with.
To understand the simple working of the DNS service, look at the image below:
As we can see, if we want to redirect to Google, we will type google.com & DNS will translate it to 216.58.200.206 for connecting our local system to the remote host.
Note:
A domain name can have multiple IP addresses. For example, google.com corresponds to 216.58.200.206 , 142.250.193.78 , and many more IP addresses. To understand more about the working of DNS, refer to this article
TELNET provides communication facilities between two hosts using the CLI.
TELNET is used for communication through the command line interface between remote device(s) or server(s). It stands for TELetype NETwork & configures elements of networking hardware.
Some characteristic features of TELNET are:
The two hosts can communicate over the TELNET user interface through two means:
line-by-line or character-by-character basis.
The below image helps us to understand the working of this protocol:
It can be used for testing and diagnosing remote web/mail servers. It is also used by other protocols like FTP to form protocol control channels. Let us look at some advantages and disadvantages of this protocol :
Advantages | Disadvantages |
---|---|
1. It is versatile. | 1. The data exchange is unencrypted, which makes sharing of delicate information like passwords and user IDs unsafe. |
2. It can be used cross-platform. | 2. Full access makes it easier for hackers to enter. |
3. It provides unlimited access to target resources. | 3. Using TELNET, only a few servers can be reached. |
It models a protocol to download, upload, and transfer files between two devices over the internet.
FTP stands for "File Transfer Protocol" and connects two computer systems to transfer files over a network. Users need to grant access using FTP to receive and send files. Transferring files is a straightforward mechanism, so why do we need FTP? Because it overcomes these problems between two systems :
But how does it overcome these problems? By establishing two connections between the hosts :
These are the common characteristics of FTP protocol:
The basic client model of FTP contains three components:
the user interface, control process, and data transfer process whereas the server model contains two units: the server control process and the server data transfer process.
The below image depicts the mechanism of FTP:
FTP is one of the fastest ways to transfer files, is efficient, and needs a username & password to access the server which makes it secure. However, it is not compatible with every system and doesn’t allow running concurrent transfers to multiple receivers.
A concise version of FTP, it provides a lightweight file transfer mechanism.
A simplified version of FTP, Trivial File Transfer Protocol (TFTP) is mainly used for reading and writing files to or from a remote server. It also facilitates file transfer, however, with no user authentication. Major characteristics of TFTP are :
It is often used on private local networks where adapting FTP can be expensive in its implementation or cost. It comes in handy where there are no hard disk drives or storage devices as the implementation is easy using a small amount of memory.
The other common uses can be depicted by the image below:
The five types of messages used in the TFTP protocol are:
It provides a model to share files remotely between servers over a network.
The Network File System (NFS) is a distributed file system protocol that is portable across different machines, operating systems, network architectures, and transport protocols. The distributed file architectures look like this:
The protocol mounts a file system present in a network & enables interactions with it as though that system is mounted locally. Users can use CLI commands to create, remove, read, write & perform other functions on the remote files accessed using NFS.
Some of the common characteristics to look at are:
The below table signifies the advantages and disadvantages of NFS:
Advantages | Disadvantages |
---|---|
1. Multiple users can access the same file simultaneously. | 1. They are vulnerable to internet threats unless used on a trusted network behind a firewall. |
2. Centralization of data reduces system admin overhead. | 2. Parallel file access is not supported by a lot of clients to date. |
It is a protocol defined for print servers between UNIX systems and remote printers.
LPD stands for Line Printer Daemon, and is made for printer sharing. It is used for sending and receiving print jobs on a print server. The LPD print server is either connected to a print device directly or a network print device that supports this protocol.
Let us look at the common characteristics of LPD:
In the old days, it was commonly used between UNIX systems and remote printers. Today’s modern Linux distribution uses CUPS (Common Unix Printing System). In addition to supporting LPD , CUPS also supports IPP (Internet Printing Protocol).
For using it on a Windows system, the LPD needs to be accessed through software to receive requests from any other system (Unix, Linux, Windows, etc.). After that, it is simply printed through the printer associated with the windows system.
Look at the image below:
Here, the LPD print server receives the request and sends it forward to one of the host’s print servers.
A computer system software for writing graphical user interface applications.
It is a network protocol providing GUI (Graphical User Interface) for networks in interconnected mainframes. It is used for creating GUI applications based on client & server models.
The picture below shows a basic interaction between X Window applications & various other desktop machines.
Here the system does not directly interact with the machines. Rather, it uses a network protocol. It gives us the added advantage of applications not having to run on the same machine where they are displayed.
Here are some common characteristics to look at:
The SMTP protocol is necessary for the completion of email-related jobs.
Email services have been used extensively since their emergence in the late 1960s at the Massachusetts Institute of Technology when a message was sent from one device to another using ARPANET .
Hence, it becomes crucial to understand SMTP . It stands for Simple Mail Transfer Protocol and assists in sending mail over the Internet.
The SMTP protocol uses two basic models to work efficiently:
Let us now look at some characteristics of this protocol:
Master the complexities of computer networking with our Free Computer Networking course. Join now & learn to navigate the world of data transmission & protocols.