EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Textbook Question
Book Icon
Chapter 2, Problem R1RQ

List five nonproprietary Internet applications and the application-layer protocols that they use.

Expert Solution & Answer
Check Mark
Program Plan Intro

Application Layer:

In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.

Explanation of Solution

Non-Proprietary Internet Applications:

Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.

Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:

  • The web:
    • The web application is a client-server program in which the client runs in a web browser.
    • The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
    • HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
  • File Transfer:
  • The File Transfer web application is an application that allows services to the users to share files over the web.
  • The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
  • The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
  • Remote Login:
    • The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
    • The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
    • Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
  • E-mail:
  • E-mail applications are used to send emails over the internet.
  • The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
  • The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
  • Bit Torrent File Sharing:
  • Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
  • The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
  • The Bit Torrent Protocol is a protocol that is used for distributing electronic files.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
05:06
Students have asked these similar questions
Network applications and application layer protocols are discussed in further detail in the following sections.
Network applications and application layer protocols are explored in depth below.
Provide examples of application-layer protocols and their specific use cases.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
  • Text book image
    Systems Architecture
    Computer Science
    ISBN:9781305080195
    Author:Stephen D. Burd
    Publisher:Cengage Learning
    Text book image
    Enhanced Discovering Computers 2017 (Shelly Cashm...
    Computer Science
    ISBN:9781305657458
    Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
    Publisher:Cengage Learning
    Text book image
    MIS
    Computer Science
    ISBN:9781337681919
    Author:BIDGOLI
    Publisher:Cengage
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage