
List five nonproprietary Internet applications and the application-layer protocols that they use.

Application Layer:
In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.
Explanation of Solution
Non-Proprietary Internet Applications:
Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.
Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:
- The web:
- The web application is a client-server program in which the client runs in a web browser.
- The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
- HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
- File Transfer:
- The File Transfer web application is an application that allows services to the users to share files over the web.
- The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
- The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
- Remote Login:
- The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
- The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
- Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
- E-mail:
- E-mail applications are used to send emails over the internet.
- The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
- The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
- Bit Torrent File Sharing:
- Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
- The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
- The Bit Torrent Protocol is a protocol that is used for distributing electronic files.
Want to see more full solutions like this?
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Additional Engineering Textbook Solutions
Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
Introduction To Programming Using Visual Basic (11th Edition)
Starting Out with C++ from Control Structures to Objects (9th Edition)
Java: An Introduction to Problem Solving and Programming (8th Edition)
Starting Out with Java: From Control Structures through Data Structures (4th Edition) (What's New in Computer Science)
Starting Out With Visual Basic (8th Edition)
- Can you please show me how I can do this on google sheets. For the spreadsheet you need to create a multi page sheets thing that uses all the techniques of counts/sums and graph showing how many contracts have been returned for each grade...you can make up the data (let's say in grade 9 I got 15 contracted back with fake data that I want you to show me how to create on google spreadsheet) For grade 10 i got 20 contracts signed, for grade 11 I got 16 contracts and for grade 12 I got 25 contracts back. Can you help me pls. Thanks so much. Make sure you have graphs on the page and also the sum written as a formula and the numbers filled in the columns.arrow_forwardI need help with this problem and an step by step explanation of the solution from the image described below. (Introduction to Signals and Systems)arrow_forwardGoal: Understand how to build a concurrent server and deal with signals Description: Use TCP socket programming in C to implement a pair of client and server programs. The client simply asks the user to enter a string (null-terminated), and then displays a menu for the user to select an operation on that string. The string and the type of operation are sent to the child server which performs the required operation and returns the result back to the client. That is, the server (parent) creates a child for each request of the client (you need to print the port and IP address of the client on the server terminal). Then it waits for the child to finish processing client's request and prints the process ID of the terminated child. The connection between your client and server should stay open, so that the client can send another request. However, the exit will happen when the user sends the client program the SIGQUIT signal. The handler will print a notifying message (for example, "Good…arrow_forward
- I need help with this problem and an step by step explanation of the solution from the image described below. (Introduction to Signals and Systems)arrow_forwardI need help with this problem and an step by step explanation of the solution from the image described below. (Introduction to Signals and Systems)arrow_forwardI need help with this problem and an step by step explanation of the solution from the image described below. (Introduction to Signals and Systems)arrow_forward
- I need help with this problem and an step by step explanation of the solution from the image described below. (Introduction to Signals and Systems)arrow_forwardI need help with this problem and an step by step explanation of the solution from the image described below. (Introduction to Signals and Systems)arrow_forwardQ1.A. Sketch a graph of f(x), then find the Fourier series of f(x) for three values and has a period of 2π. (8 marks) f(x) = { x² x²sin 3x -π≤ x ≤ 0) 0 ≤ x ≤ narrow_forward
- Q3.A. Given the flow graph below, Find the H(z)? x(z) y(z) (7 marks) z-1 ↓arrow_forwardQ2.A. Find the inverse Z-Transforms using partial fraction method of the following function: (8 marks) Z-1 F(z) = 2+3Z-1 + (1-2-1) (1-12-12arrow_forwardI've been having trouble solving this problem from my engineering analysis class textbook.arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY





