Important features of application layer, Computer Network Security

Describe the important features of application layer.

The features of the application layer are as follows.

1. Efficient User Interface Design is explained below:

Application layer, the top layer of the OSI model serves as Interface between the user and application and also between the user and the network. It gives the user, a way of accessing information present on the network through an application. Since the application layer is closest to the end user, both the user and the application layer can interact directly with the application.

2.   Identification of Communicating Parties is explained below:

Application layer defines the way ‘how’ an application running on one system communicates with an application on another system.  In addition to this, the layer also determines ‘who’ the communicating partners are and whether they are ready for communication or not (that is their identity and availability) whenever there is an application which has the data to transmit.

3.   Determination of Resource Availability is explained below:

For the communication to be successful a number of resources are needed. So, whenever the communication request is made, the application layer checks whether the existing network resources  are  sufficient  for  handling  the  communication  request or not.  Thus, it determines the availability of the resources.

4.   Synchronization of communication is explained below:

The application layer is responsible for checking either the two communicating parties are synchronized or not. It performs this by ensuring that both the parties employ the similar network protocols and that the communication is done in the cooperative manner.

5. Implementation of Protocols is explained below:

The application layer implements the various protocols like Telnet, FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol), SMTP (Simple Mail Transfer Protocol) and many more.  Among which the most broadly used one is HTTP. This protocol is basis for the World Wide Web. When the users require accessing some web pages of the website, then they specify name of the page in the URL and then send it to the servers using the browser. This request is sent as the HTTP request and response is also sent back to the user using HTTP protocol.

Then the communication protocols of application layer are used by, various applications which are responsible for providing the network functionality. The other protocols are made in use for purposes like emails, file transfer and network news.

Posted Date: 7/20/2012 5:49:46 AM | Location : United States







Related Discussions:- Important features of application layer, Assignment Help, Ask Question on Important features of application layer, Get Answer, Expert's Help, Important features of application layer Discussions

Write discussion on Important features of application layer
Your posts are moderated
Related Questions
(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

Ask question #Minimum 100 words are there non parasitic viruses

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske