Important features of application layer, Computer Network Security

Assignment Help:

Describe the important features of application layer.

The features of the application layer are as follows.

1. Efficient User Interface Design is explained below:

Application layer, the top layer of the OSI model serves as Interface between the user and application and also between the user and the network. It gives the user, a way of accessing information present on the network through an application. Since the application layer is closest to the end user, both the user and the application layer can interact directly with the application.

2.   Identification of Communicating Parties is explained below:

Application layer defines the way ‘how’ an application running on one system communicates with an application on another system.  In addition to this, the layer also determines ‘who’ the communicating partners are and whether they are ready for communication or not (that is their identity and availability) whenever there is an application which has the data to transmit.

3.   Determination of Resource Availability is explained below:

For the communication to be successful a number of resources are needed. So, whenever the communication request is made, the application layer checks whether the existing network resources  are  sufficient  for  handling  the  communication  request or not.  Thus, it determines the availability of the resources.

4.   Synchronization of communication is explained below:

The application layer is responsible for checking either the two communicating parties are synchronized or not. It performs this by ensuring that both the parties employ the similar network protocols and that the communication is done in the cooperative manner.

5. Implementation of Protocols is explained below:

The application layer implements the various protocols like Telnet, FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol), SMTP (Simple Mail Transfer Protocol) and many more.  Among which the most broadly used one is HTTP. This protocol is basis for the World Wide Web. When the users require accessing some web pages of the website, then they specify name of the page in the URL and then send it to the servers using the browser. This request is sent as the HTTP request and response is also sent back to the user using HTTP protocol.

Then the communication protocols of application layer are used by, various applications which are responsible for providing the network functionality. The other protocols are made in use for purposes like emails, file transfer and network news.


Related Discussions:- Important features of application layer

Pcm encoder, You have been asked to setup a remote temperature sensing syst...

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

[email protected], Re: Website Google Ranking Hello! Hope yo...

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Direct sequence modulation, Question 1 a) Provide three advantages of ...

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Distinguish between passive and active attacks, Problem (a) Distinguis...

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Difference between a class profile and a child profile sheet, QUESTION ...

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Ip datagram header format, IP DATAGRAM HEADER FORMAT:  It is given in...

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Distinguish between a mobile agent state and code, Question: (a) Disti...

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd