3. Application Layer Protocols
• TCP/IP suite consists of a number application layer
protocols.
• For example, HTTP, HTTPS, FTP, Telnet and others.
4. Application Layer Protocols
• TCP/IP suite consists of a number application layer
protocols.
• For example, HTTP, HTTPS, FTP, Telnet and others.
5. Application Layer Protocols
HTTP:
• It is a protocol used to access the
data on the World Wide Web
(www).
• The HTTP protocol can be used to
transfer the data in the form of plain
text, hypertext, audio, video, and so
on.
• Its efficiency that allows us to use in
a hypertext environment where
there are rapid jumps from one
• HTTP is like the FTP as it also transfers
the files from one host to another host.
But HTTP is simpler than FTP.
• HTTP is like SMTP as the data is
transferred between client and server.
• SMTP messages are stored and
forwarded while HTTP messages are
delivered immediately.
6. Application Layer Protocols
Features of HTTP:
• Port number is 80.
• HTTP is the standard protocol for·
requesting a URL defined web-page
resource, and for sending a response
to the web server.
• The connection between client and
server exist only during the current
request and response time only.
• Stateless: HTTP is a stateless protocol as
both the client and server know each
other only during the current request.
• Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.
7. Application Layer Protocols
Features of HTTP:
• Port number is 80.
• HTTP is the standard protocol for·
requesting a URL defined web-page
resource, and for sending a response
to the web server.
• The connection between client and
server exist only during the current
request and response time only.
• Stateless: HTTP is a stateless protocol as
both the client and server know each
other only during the current request.
• Due to this nature of the protocol, both
the client and server do not retain the
information between various requests of
the web pages.
9. Application Layer Protocols
• Status codes add in the response and
caching of a resource provided at a
server (and proxy).
• For example, status code returned as
response when 400 means a bad
request (the request not responding),
• 401 unauthorized request
• 402 means request requires a
• payment before response feasible,
403 means request is for a forbidden
resource and
• 404 means URL resource not found
by the server.
10. Application Layer Protocols
Uniform Resource Locator
(URL):
• A client that wants to access the
document in an internet needs an
address and to facilitate the access of
documents, the HTTP uses the
concept of Uniform Resource
Locator (URL).
• The URL defines four parts: method,
host computer, port, and path.
11. Application Layer Protocols
Method: The method is the protocol
used to retrieve the document from a
server. For example, HTTP.
Host: The host is the computer where
the information is stored, Web pages
are mainly stored in the computers and
the computers are given an alias name
that begins with the characters "www".
12. Application Layer Protocols
Port: The URL can also contain the port
number of the server, but it's an
optional field.
Path: Path is the pathname of the file
where the information is stored. The
path itself contain slashes that separate
the directories from the subdirectories
and files.
13. Application Layer Protocols
HTTPS:
• HTTPS stands for Hyper Text
Transfer Protocol Secure. It is highly
advanced and secure version of
HTTP.
• It uses the port no. 443 for Data
Communication.
• It allows the secure transactions by
encrypting the entire
communication with SSL. It is a
• HTTP also allows you to create a
secure encrypted connection
between the server and the browser.
• It offers the bi-directional security of
Data. This helps you to protect
potentially sensitive information
from being stolen.
14. Application Layer Protocols
Advantages of HTTPS:
• In most cases, sites running over
HTTPS will have a redirect in place.
Therefore, even if you type in
HTTP:// it will redirect to an https
over a secured connection
• It allows users to perform secure e-
commerce transaction, such as
online banking.
• SSL technology protects any users
and builds trust
• An independent authority verifies
the identity of the certificate owner.
So, each SSL Certificate contains
unique, authenticated information
about the certificate owner.
15. Application Layer Protocols
Limitations of HTTPS:
• HTTPS protocol can't stop stealing
confidential information from the
pages cached on the browser
• SSL data can be encrypted only
during transmission on the network.
So, it can't clear the text in the
browser memory
• HTTPS can increase computational
overhead as well as network
overhead of the organization
16. Application Layer Protocols
FTP:
• FTP is a standard internet protocol
provided by TCP/IP used for
transmitting the files from one host to
another.
• It is mainly used for transferring the
web page files .
• It is also used for downloading the
files to computer from other servers.
Objectives of FTP:
• It provides the sharing of files.
• It is used to encourage the use of
remote computers.
• It transfers the data more reliably and
efficiently.
18. Application Layer Protocols
Control Connection:
• The control connection uses very
simple rules for communication.
Through control connection,
• The control connection remains
connected during the entire
interactive FTP session.
19. Application Layer Protocols
Data Connection:
• The Data Connection uses very
complex rules as data types may
vary.
• The data connection opens when a
command comes for transferring the
files and closes when the file is
transferred.
20. Application Layer Protocols
Advantages:
• Speed: The FTP is one of the fastest way
to transfer the files.
• Efficient: We do not need to complete
all the operations to get the entire file.
• Security: To access the FTP server, we
need to login with the username and
password.
• Back & forth movement: Send some
information to all and they all send
information back on the same server.
Disadvantages:
• FTP serves two operations, i.e., to
send and receive large files on a
network.
• It also doesn't allow you to run
simultaneous transfers to multiple
receivers.
• Passwords and file contents are sent
in clear text that allows unwanted
eavesdropping.
• It is not compatible with every
21. Application Layer Protocols
TELNET:
• The main task of the internet is to
provide services to users.
• For example, users want to run different
application programs at the remote site
and transfers a result to the local site.
• This requires a client-server program
such as FTP, SMTP. But this would not
allow us to create a specific program for
each demand.
• The better solution is to provide a
general client-server program that
lets the user access any application
program on a remote computer.
• Therefore, a program that allows a
user to log on to a remote computer.
A
• Popular client-server program Telnet
is used to meet such demands. Telnet
is an abbreviation for Terminal
24. Application Layer Protocols
Advantages:
• Telnet client is versatile
• Can be used cross-platform
• Unlimited access to target resources
Disadvantages:
• Unencrypted data exchange
• Full access makes it easier for hackers
• Only few servers can be reached via
Telnet