Application layer of the OSI model and its functions

len Alfred Ajibola - 27th October, 2021 @ 08:50 AM

Topics in ICT

Functions of the network layer of the OSI model Network layer of the OSI model Transport layer of the OSI model and its characteristics Session layer of the OSI model: Functions of session layer What is presentation layer of the OSI model? Functions of presentation layer Application layer of the OSI model and its functions Three-way handshake in TCP Stateless connection in UDP explained with examples Transport Layer: Functions of layer 4 in networking Transport layer: Layer 4 of the OSI model


Academic Questions in ICT

Please check out our Questions and Answers here

What is the first step towards disabling automatic image download on WhatsApp?

  • A. Click on the three dots on the top right hand corner

  • B. Click on the WhatsApp logo

  • C. Click on the settings icon on the top right corner

  • D. Click on the settings icon located on the to top-center of the app

  • E. Click directly on the storage and data icon located on the top right corner

  • F. Click on the mobile data usage icon located on the top right corner

The followings are ways to conserve data on android phones except _____.

  • A. Turning on data saving mode

  • B. Activating background apps

  • C. Use of Wi-Fi to update apps

  • D. Disable automatic image download on WhatsApp

  • E. Watch low resolution videos on youtube

  • F. Utilizing a reputable data saving app on google playstore

Twitter was launched in _____.

  • A. 2003

  • B. 2004

  • C. 2005

  • D. 2006

  • E. 2007

  • F. 2008


Application Layer:

The application layer or layer 7 of the open systems interconnection (OSI) model is the first point of contact when a user interacts with the internet or intranet. Simply put, it is the first point of network communication from the perspective of the end user. As an instance, you were able to read this article on LenAcad because the application layer on your phone or computer device had been put into use through your web browser.

Please read an introduction to the OSI model here.

To buttress the above paragraph, take a look at the Uniform Resource Locator (URL), which happens to be the link of this page on your browser. It should look something like this: https://www.lenacad.com/topic/5/Application-layer-and-its-functions

 

Notice the 'https' protocol from the above URL. It may be http in some other websites. The 'https' protocol is always present on the application layer whenever we access the web. In fact, it is the application layer protocol for the web.

HTTP stands for 'HyperText Transfer Protocol' while the 's' in https means that the protocol is secure.

HTTPS means HyperText Transfer Protocol Secure

Other protocols found at the application layer include:

  • Telnet

  • File Transfer Protocol (FTP)

  • Secure Shell (SSH)

  • Domain Name Service (DNS)
    Please read on DNS and how it works here.

  • Dynamic Host Configuration Protocol (DHCP)

  • Simple Network Management Protocol (SNMP)

  • Trivial File Transfer Protocol (TFTP) and so on.

You can read on the transport layer of the OSI model here.

 

The application layer is also responsible for various application services like email, remote file access, facebook app and other apps (on your phone or computer) requiring the internet to function.

Understand that application services require an internet or intranet to function properly. Recall that the internet is a global and public network while the intranet is considered a private network within an organization.

Please read more on the internet and world wide web here.

 

Functions of the application layer

  1. The application layer provides an interface for various services like email and network file control.

  2. Users are able to view their internet activities via the application layer.

  3. Various protocols present at this layer aid the users to interface with one another in a communication network.

  4. This layer is responsible for the synchronization of communicating partners, while also presenting their identity to one another.

  5. Application layer brings about the utilization and usage of various softwares by different users.

  6. In a attempt to access local or remote files, users can login through the application layer.

  7. Security of the users and their devices are ensured since each application interacts specifically with an operating system.

  8. Various application protocols like https, DHCP and DNS are required for internet access.

  9. Application users are able to access, read, write and retrieve files from a remote computer within or outside a network through the application layer.

  10. Generally, the application layer provides access for global information on a variety of services.


Kindly share this article via the links below:


len

Alfred Ajibola is a Medical Biochemist, a passionate Academician with over 7 years of experience, a Versatile Writer, a Web Developer, a Cisco Certified Network Associate and a Cisco CyberOps Associate.



Amazing facts in ICT

YouTube is a video-sharing platform which commenced operations on February 14, 2005 (Valentine's day). Three former PayPal employees -> Chad Hurley, Steve Chen and Jawed Karim created the YouTube service (as a dating app) until Google bought it in November 2006 for US$1.65 billion

Smoking near a Mac device - Len Academy

Smoking near an Apple (Mac) computer voids the warranty.

When you add /4 to the end of Facebook's URL, it will take you to Mark Zuckerberg.

You can try it on you own; or better still, try the link below:

facebook.com/4

Apple iPad retina - Len Academy

Apple iPad retina display is actually manufactured by Samsung


NOTABLE POINTS IN ICT

Computer hardware is the collection of physical parts of a computer system.

Physical parts of a computer are those parts that you can see and touch. It may also be referred to as the 'equipment of the computer'.

When the computer case is opened (with a screwdriver), one would see the different hardware components inside of it. It's important to state that some other hardware components are present outside the computer case; and these are termed peripherals.

Below are hardware components seen inside the computer case:

  • Motherboard

  • Central Processing Unit (CPU)

  • Graphics Processing Unit (GPU)

  • Power supply Unit (PSU)

  • Northbridge

  • Southbridge

  • Peripheral Component Interconnect (PCI) slots

  • Network Interface Card (NIC)

  • Random Access Memory (RAM)

  • Ventilation fans

  • Heat sink

  • Hard Disc Drive (external present)
  • Solid State Drive (SSD)

  • CMOS battery

  • Optical Disc Drives (external present)

  • USB port, PS2 port, Ethernet port and other ports

  • Expansion Ports / Slots

Please read more on computer hardware here

Hardware components seen outside the computer case are called peripherals. The peripherals are grouped into the following:

  1. Input devices: They provide information to the computer.

  2. Output devices: Brings out information from the computer.

  3. Storage devices: They store information or data.

Below are examples of some peripherals:

  • Keyboard (input)

  • Monitor (output)

  • Mouse (input)

  • Webcam (input)

  • Touch Pad (input)

  • Universal Serial Bus (USB) flash drive or memory card (storage)

  • Hard disc drive (storage)

  • Stylus (input)

  • Joystick(input)

  • Printer (output)

  • Speaker (output)

  • Headphones (output)