Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Textbook Question
Book Icon
Chapter 2, Problem R1RQ

List five nonproprietary Internet applications and the application-layer protocols that they use.

Expert Solution & Answer
Check Mark
Program Plan Intro

Application Layer:

In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.

Explanation of Solution

Non-Proprietary Internet Applications:

Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.

Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:

  • The web:
    • The web application is a client-server program in which the client runs in a web browser.
    • The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
    • HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
  • File Transfer:
  • The File Transfer web application is an application that allows services to the users to share files over the web.
  • The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
  • The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
  • Remote Login:
    • The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
    • The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
    • Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
  • E-mail:
  • E-mail applications are used to send emails over the internet.
  • The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
  • The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
  • Bit Torrent File Sharing:
  • Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
  • The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
  • The Bit Torrent Protocol is a protocol that is used for distributing electronic files.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
05:06
Students have asked these similar questions
Can you help me with this problem
Given the following addresses, which two addresses conflict in the cache: The numb of locations in the cache is 2048, the cahche is indexed by address bits 15 to 5 and the tag bits are from 31 to 16.  (a) 0x0000 0100 (b) 0x0000 1400 (c) 0x0010 0100 (d) 0x0100 0140
5. RetailItem ClassWrite a class named RetailItem that holds data about an item in a retail store. The class should store the following data in attributes: item description, units in inventory, and price. Once you have written the class, write a program that creates three RetailItem objects and stores the following data in them: Description    Units in Inventory    PriceItem #1    Jacket    12    59.95Item #2    Designer Jeans    40    34.95Item #3    Shirt    20    24.95

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Personal Information Write a program that displays the following information, each on a separate line: Your nam...

Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)

The beginning of a template is marked by a(n) __________.

Starting Out with C++ from Control Structures to Objects (9th Edition)

Write the declaration for class B. The classs members should be as follows: m, an integer. This variable should...

Starting Out with Java: From Control Structures through Data Structures (4th Edition) (What's New in Computer Science)

What is a ToolTip?

Starting Out With Visual Basic (8th Edition)

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY