Skip to main content

Short notes on Application Layer in OSI model

 In the Open Systems Interconnection (OSI) model, Layer 7 is the Application Layer. It is the topmost layer and is responsible for providing network services to user applications. This layer interacts directly with the software applications that users interact with, providing the interface for them to access network resources.

Functions of the Application Layer:

  • User Interface: Provides a way for users to interact with network services through applications like web browsers, email clients, and file transfer programs.
  • Application Services: Offers services like file transfer, email, remote login, and directory services.
  • Service Identification: Identifies and distinguishes between different types of network services (e.g., HTTP for web browsing, SMTP for email).
  • Data Representation: Ensures that data is in a format that can be understood by both the sending and receiving applications.
  • Encryption and Decryption: Handles encryption and decryption of data for security purposes.
  • Session Management: Establishes, maintains, and terminates communication sessions between applications.

Examples of Protocols and Applications at Layer 7:

  • HTTP (Hypertext Transfer Protocol): Used for web browsing.
  • SMTP (Simple Mail Transfer Protocol): Used for email communication.
  • FTP (File Transfer Protocol): Used for transferring files between systems.
  • Telnet: Used for remote terminal access.
  • DNS (Domain Name System): Used for resolving domain names to IP addresses.
  • SSH (Secure Shell): Used for secure remote login and file transfer.

Comments

Popular posts from this blog

Safety property that a deadlock can never occur

Identified four necessary conditions for a deadlock to occur 1. Mutual Exclusion. The nodes claim exclusive control of the resources they require. 2. Wait for. Tasks hold resources already allocated to them while waiting for additional resources. 3. No preemption. Resources cannot be forcibly removed from the tasks holding them until the resources are used to completion. 4. Cyclic Wait. A cyclic chain of tasks exists, such that each task holds one or more resources that are being requested by the next task in the chain. References: For information about system deadlocks please refer: E. G. Coffman, M. Elphick, and A. Shoshani. System Deadlocks

OWASP API Security Top 10 vulnerabilities 2023

API Security Do's and Don'ts Don't trust input data for an API and do validate all inputs. Ensure you understand security and keep sensitive data out of code. Don't hardcode keys/tokens Don't reveal useful info in error messages. Don't have hidden/unadvertised features. Don't filter data in UI - control at app level Don't confuse authentication and authorization Always use API gateways to control access and traffic Do require API documentation. Do expect users/hackers to find and use undocumented endpoints Do continuous testing - attack simulation, test configs, fuzzing, injections OWASP API Security Top 10 Vulnerabilities 2023 API-1:2023 - Broken Object Level Authorization: BOLA is still the leading vulnerability that plagues APIs. When data objects do not have sufficient access controls in place, resources can be accessed by unauthorized users. API-2:2023 - Broken Authentication  Broken Authentication contains all vulnerabilities associated with auth...
Program to print items in single linkedlist in Pendulum order  Single linked list pendulum in java There are sequence of numbers in a single linked list and display the result in pendulum format Input : 1 2 3 4 5 6 7 8 Output : 1 8 2 7 3 6 5 4 Solution :  https://github.com/Bonu/datastructures/blob/main/SingleLinkedListPendulum.java Below is the manual approach: Input: 1 2 3 4 5 6 7 Iteration 1: 1 2 3 4 5 6 7 Iteration 2: 1 7 2 3 4 5 6 Iteration 3: 1 7 2 6 3 4 5 Iteration 4: 1 7 2 6 3 5 4