List five nonproprietary Internet applications and the application-layer protocols that they use.
Application Layer:
In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.
Explanation of Solution
Non-Proprietary Internet Applications:
Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.
Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:
- The web:
- The web application is a client-server program in which the client runs in a web browser.
- The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
- HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
- File Transfer:
- The File Transfer web application is an application that allows services to the users to share files over the web.
- The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
- The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
- Remote Login:
- The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
- The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
- Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
- E-mail:
- E-mail applications are used to send emails over the internet.
- The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
- The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
- Bit Torrent File Sharing:
- Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
- The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
- The Bit Torrent Protocol is a protocol that is used for distributing electronic files.
Want to see more full solutions like this?
Chapter 2 Solutions
EBK COMPUTER NETWORKING
Additional Engineering Textbook Solutions
Prelude to Programming
Engineering Mechanics: Statics & Dynamics (14th Edition)
Introduction to Programming Using Visual Basic (10th Edition)
Modern Database Management
Problem Solving with C++ (10th Edition)
Applied Fluid Mechanics (7th Edition)
- Define HTTP and HTTPS protocols and their differences.arrow_forwardThe distinction between network applications and application layer protocols is discussed in detail in this section.arrow_forwardThe distinction between network applications and application layer protocols is explained in detail below.arrow_forward
- A more in-depth discussion of network applications and application layer protocols is provided in the following sections.arrow_forwardThe difference between network applications and application layer protocols is explained in further detail in the sections that follow.arrow_forwardExplain the advantages and disadvantages of connectionless protocols relative to connection-based protocols in the present state of the industry.arrow_forward
- The subsequent sections differentiate between network applications and application layer protocols.arrow_forwardExplain the key characteristics of transport layer protocols, such as TCP and UDP, and their respective use cases.arrow_forwardFollowing sections of this article describe network applications and application layer protocols in more depth.arrow_forward
- The sections that follow explain the distinction between network applications and application layer protocols.arrow_forwardThis section explains the distinction between network applications and application layer protocols in further detail.arrow_forwardExplain the functions of transport layer protocols like TCP and UDP, and their respective use cases.arrow_forward
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning