SlideShare a Scribd company logo
1 of 27
Download to read offline
Tahmina Akter
L Lecturer, Department at CSE
Por port city international university
APPLICATION LAYER
Application layer
Application layer protocols:
The protocols of application layer are following :
1. Telnet
2. FTP
3. TFTP
4. NFS
5. SMTP
6. LPD
7. X Window
8. SNMP
9. DNS
10. DHCP/BootP
Telnet:
• Telnet is the chameleon of protocols.
• Its specialty is terminal emulation.
• It allows a user on a remote client machine , called the
Telnet client, to access the resources of another machine ,
the telnet server.
• Telnet achieves this by pulling a fast one on the Telnet
server and making the client machine appears as though it
were a terminal directly attached to the local network.
o This projection is actually a software image – a virtual terminal that can
interact with the chosen remote host.
o Telnet client uses the ephemeral port number while the server uses
port number 23 on TCP
File Transfer Protocol:
 File Transfer Protocol is the protocol that actually lets us transfer files
and it can accomplish this between any two machines using it.
 But FTP isnot a protocol, its also a program.
 Operating as a protocol, FTP also allows for access to both directories
and files and can accomplish certain types of directory operation such
as relocating into different ones
 FTP is a client-server protocol where a client will ask for a file, and a
local or remote server will provide it.
 The end-users machine is typically called the local host machine, which
is connected via the internet to the remote host—which is the second
machine running the FTP software.
 Although a lot of file transfer is now handled using HTTP, FTP is still
commonly used to transfer files "behind the scenes" for other
applications -- e.g., hidden behind the user interfaces of banking, a
service that helps build a website, such as Wix or SquareSpace, or
other services. It is also used, via Web browsers, to download new
applications.
 Trivial File Transfer Protocol (TFTP) is a simple protocol used for
transferring files. TFTP uses the User Datagram Protocol (UDP) to
transport data from one end to another. TFTP is mostly used to read
and write files/mail to or from a remote server.

 TFTP is the stripped- down, stock version of FTP, but it’s the protocol of
choice if you know the exactly what you want and where to find it, plus
its so easy to use and its fast too.
Trivial File Transfer Protocol (TFTP)
 Trivial File Transfer Protocol is very simple in design and has limited
features as compared to File Transfer Protocol (FTP).
 TFTP provides no authentication and security while transferring files. As
a result, it is usually used for transferring boot files or configuration files
between machines in a local setup.
 Because of its simple design, it is rarely used interactively by users in a
computer network. Its lack of security also makes it dangerous for use
over the Internet.
Network File System:
• Network File System (NFS) is a distributed file system protocol
originally developed by Sun Microsystems (Sun) in 1984
• allowing a user on a client computer to access files over
a computer network much like local storage is accessed.
• A network file system (NFS) is a type of file system mechanism
that enables the storage and retrieval of data from multiple disks
and directories across a shared network.
• A network file system enables local users to access remote data
and files in the same way they are accessed locally.
Simple Mail Transfer Protocol (SMTP)
 Simple Mail Transfer Protocol (SMTP) is the standard protocol for
email services on a TCP/IP network. SMTP provides the ability to
send and receive email messages.
 SMTP is an application-layer protocol that enables the transmission
and delivery of email over the Internet. SMTP is created and
maintained by the Internet Engineering Task Force (IETF).
 Simple Mail Transfer Protocol is also known as RFC 821 and RFC
2821.
Line Printer Daemon:
• The Line Printer Daemon protocol/Line Printer Remote
protocol (or LPD, LPR) is a network printing protocol for
submitting print jobs to a remote printer. The original
implementation of LPD was in the Berkeley printing system in
the BSD UNIX operating system; the LPRng project also
supports that protocol.
• The line printer Daemon protocol is designed for printer
sharing.
 The LPD, along with the line printer (LPR) program, allows
print jobs to be spooled and sent to the networks printers
using TCP/IP
X Window:
• The X Window System (X11) is an open source, cross platform,
client-server computer software system that provides a GUI in a
distributed network environment.
• Used primarily on Unix variants, X versions are also available for
other operating systems. Features of the X window system include
network transparency, the ability to link to different networks, and
customizable graphical capabilities.
• The X window system was first developed in 1984, as part of
project Athena, a collaboration between Stanford University and
MIT. X.Org Foundation, an open group, manages the development
and standardization of the X window system.
• The X Window System is also known simply as X, X11 or X
Windows.
Simple Network Management Protocol (SNMP)
 Simple Network Management Protocol (SNMP) is a set of
protocols for network management and monitoring.
 These protocols are supported by many typical network
devices such as routers, hubs, bridges, switches, servers,
workstations, printers, modem racks and other network
components and devices.
 Supported devices are all network-attached items that
must be monitored to detect conditions.
 These conditions must be addressed for proper, appropriate
and ongoing network administration.
 SNMP standards include an application layer protocol, a set of
data objects and a methodology for storing, manipulating and
using data objects in a database schema.
Domain Name Service(DNS):
The Domain Network System (DNS) protocol helps
Internet users and network devices discover
websites using human-readable hostnames, instead
of numeric IP addresses.
DHCP:
 DHCP (Dynamic Host Configuration Protocol) is a network
management protocol used to dynamically assign an Internet
Protocol (IP) address to any device, or node, on a network so they
can communicate using IP.
 DHCP automates and centrally manages these configurations rather
than requiring network administrators to manually assign IP
addresses to all network devices. DHCP can be implemented on
small local networks as well as large enterprise networks.
THANK YOU

More Related Content

What's hot

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecturevenkateswarlu G
 
logical addressing
logical addressinglogical addressing
logical addressingSagar Gor
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTPMahfuzRahman94
 
COMPUTER ERROR BEEPS SOUND
COMPUTER ERROR BEEPS SOUNDCOMPUTER ERROR BEEPS SOUND
COMPUTER ERROR BEEPS SOUNDMan Mat
 
Semaphores and Monitors
 Semaphores and Monitors Semaphores and Monitors
Semaphores and Monitorssathish sak
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilitiestumetr1
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Data transfer system
Data transfer systemData transfer system
Data transfer systemSajan Sahu
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process CommunicationAdeel Rasheed
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 

What's hot (20)

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Dhcp
DhcpDhcp
Dhcp
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
logical addressing
logical addressinglogical addressing
logical addressing
 
Backup tools
Backup toolsBackup tools
Backup tools
 
Telnet
TelnetTelnet
Telnet
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 
COMPUTER ERROR BEEPS SOUND
COMPUTER ERROR BEEPS SOUNDCOMPUTER ERROR BEEPS SOUND
COMPUTER ERROR BEEPS SOUND
 
Ip address
Ip addressIp address
Ip address
 
Semaphores and Monitors
 Semaphores and Monitors Semaphores and Monitors
Semaphores and Monitors
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Data transfer system
Data transfer systemData transfer system
Data transfer system
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 

Similar to Application Layer Protocols Explained

A Presentation on Servers & Splunk
A Presentation on Servers & SplunkA Presentation on Servers & Splunk
A Presentation on Servers & SplunkAvinash Kumar
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Modelmayday1429
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Modelmayday1429
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Modelguestedf71bf
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxEdJulleza
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adiAdiseshaK
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptxVivekTripathi684438
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduillaabdulllam
 

Similar to Application Layer Protocols Explained (20)

A Presentation on Servers & Splunk
A Presentation on Servers & SplunkA Presentation on Servers & Splunk
A Presentation on Servers & Splunk
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Model
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Model
 
Osi Seven Layer Model
Osi Seven Layer ModelOsi Seven Layer Model
Osi Seven Layer Model
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
Ip
IpIp
Ip
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Avani
AvaniAvani
Avani
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Deeps
DeepsDeeps
Deeps
 

Recently uploaded

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024innovationoecd
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationColumbia Weather Systems
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 

Recently uploaded (20)

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather Station
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 

Application Layer Protocols Explained

  • 1. Tahmina Akter L Lecturer, Department at CSE Por port city international university
  • 3.
  • 4.
  • 5.
  • 7. Application layer protocols: The protocols of application layer are following : 1. Telnet 2. FTP 3. TFTP 4. NFS 5. SMTP 6. LPD 7. X Window 8. SNMP 9. DNS 10. DHCP/BootP
  • 8. Telnet: • Telnet is the chameleon of protocols. • Its specialty is terminal emulation. • It allows a user on a remote client machine , called the Telnet client, to access the resources of another machine , the telnet server. • Telnet achieves this by pulling a fast one on the Telnet server and making the client machine appears as though it were a terminal directly attached to the local network.
  • 9. o This projection is actually a software image – a virtual terminal that can interact with the chosen remote host. o Telnet client uses the ephemeral port number while the server uses port number 23 on TCP
  • 10. File Transfer Protocol:  File Transfer Protocol is the protocol that actually lets us transfer files and it can accomplish this between any two machines using it.  But FTP isnot a protocol, its also a program.  Operating as a protocol, FTP also allows for access to both directories and files and can accomplish certain types of directory operation such as relocating into different ones  FTP is a client-server protocol where a client will ask for a file, and a local or remote server will provide it.
  • 11.  The end-users machine is typically called the local host machine, which is connected via the internet to the remote host—which is the second machine running the FTP software.  Although a lot of file transfer is now handled using HTTP, FTP is still commonly used to transfer files "behind the scenes" for other applications -- e.g., hidden behind the user interfaces of banking, a service that helps build a website, such as Wix or SquareSpace, or other services. It is also used, via Web browsers, to download new applications.
  • 12.
  • 13.  Trivial File Transfer Protocol (TFTP) is a simple protocol used for transferring files. TFTP uses the User Datagram Protocol (UDP) to transport data from one end to another. TFTP is mostly used to read and write files/mail to or from a remote server.   TFTP is the stripped- down, stock version of FTP, but it’s the protocol of choice if you know the exactly what you want and where to find it, plus its so easy to use and its fast too. Trivial File Transfer Protocol (TFTP)
  • 14.  Trivial File Transfer Protocol is very simple in design and has limited features as compared to File Transfer Protocol (FTP).  TFTP provides no authentication and security while transferring files. As a result, it is usually used for transferring boot files or configuration files between machines in a local setup.  Because of its simple design, it is rarely used interactively by users in a computer network. Its lack of security also makes it dangerous for use over the Internet.
  • 15.
  • 16. Network File System: • Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems (Sun) in 1984 • allowing a user on a client computer to access files over a computer network much like local storage is accessed. • A network file system (NFS) is a type of file system mechanism that enables the storage and retrieval of data from multiple disks and directories across a shared network. • A network file system enables local users to access remote data and files in the same way they are accessed locally.
  • 17.
  • 18. Simple Mail Transfer Protocol (SMTP)  Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/IP network. SMTP provides the ability to send and receive email messages.  SMTP is an application-layer protocol that enables the transmission and delivery of email over the Internet. SMTP is created and maintained by the Internet Engineering Task Force (IETF).  Simple Mail Transfer Protocol is also known as RFC 821 and RFC 2821.
  • 19.
  • 20. Line Printer Daemon: • The Line Printer Daemon protocol/Line Printer Remote protocol (or LPD, LPR) is a network printing protocol for submitting print jobs to a remote printer. The original implementation of LPD was in the Berkeley printing system in the BSD UNIX operating system; the LPRng project also supports that protocol. • The line printer Daemon protocol is designed for printer sharing.
  • 21.  The LPD, along with the line printer (LPR) program, allows print jobs to be spooled and sent to the networks printers using TCP/IP
  • 22. X Window: • The X Window System (X11) is an open source, cross platform, client-server computer software system that provides a GUI in a distributed network environment. • Used primarily on Unix variants, X versions are also available for other operating systems. Features of the X window system include network transparency, the ability to link to different networks, and customizable graphical capabilities. • The X window system was first developed in 1984, as part of project Athena, a collaboration between Stanford University and MIT. X.Org Foundation, an open group, manages the development and standardization of the X window system. • The X Window System is also known simply as X, X11 or X Windows.
  • 23. Simple Network Management Protocol (SNMP)  Simple Network Management Protocol (SNMP) is a set of protocols for network management and monitoring.  These protocols are supported by many typical network devices such as routers, hubs, bridges, switches, servers, workstations, printers, modem racks and other network components and devices.  Supported devices are all network-attached items that must be monitored to detect conditions.
  • 24.  These conditions must be addressed for proper, appropriate and ongoing network administration.  SNMP standards include an application layer protocol, a set of data objects and a methodology for storing, manipulating and using data objects in a database schema.
  • 25. Domain Name Service(DNS): The Domain Network System (DNS) protocol helps Internet users and network devices discover websites using human-readable hostnames, instead of numeric IP addresses.
  • 26. DHCP:  DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.  DHCP automates and centrally manages these configurations rather than requiring network administrators to manually assign IP addresses to all network devices. DHCP can be implemented on small local networks as well as large enterprise networks.