Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Textbook Question
Book Icon
Chapter 2, Problem R1RQ

List five nonproprietary Internet applications and the application-layer protocols that they use.

Expert Solution & Answer
Check Mark
Program Plan Intro

Application Layer:

In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.

Explanation of Solution

Non-Proprietary Internet Applications:

Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.

Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:

  • The web:
    • The web application is a client-server program in which the client runs in a web browser.
    • The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
    • HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
  • File Transfer:
  • The File Transfer web application is an application that allows services to the users to share files over the web.
  • The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
  • The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
  • Remote Login:
    • The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
    • The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
    • Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
  • E-mail:
  • E-mail applications are used to send emails over the internet.
  • The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
  • The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
  • Bit Torrent File Sharing:
  • Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
  • The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
  • The Bit Torrent Protocol is a protocol that is used for distributing electronic files.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
05:06
Students have asked these similar questions
(connection)? Q1: Define the BGP ? Ebgp vs I bgp, and how do I advertise? With a drawing example QT: Explain how to make messages in the BGP protocol. Q: What is concept the hot potato routing in BGP? Q: What are the criteria for BGP route selection? Qo: Define the concept of Spanning Tree Protocol. Explain in detail and draw the figures. Q1: What happens when STP is disabled? QV: Define the concept of broadcast storm. QA: List and explain the Steps to a Loop-Free Topology when using the Spanning Tree Algorithm and Spanning Tree Protocol in a four-step process. I want a typical and concise Solution
WATCH THE VIDEO ABOUT MODELLING OR SPECIFICATION PHASE AND ANSWER THE FOLLOWING QUESTIONS: https://www.youtube.com/watch?v=uoIxDeAyfdo 1.- DEFINE SPECIFICATION OR MODELLING 2.- WRITE DOWN THE  3 REQUIREMENTS SPECIFICATION TECHNIQUES OR FORMATS 3.-DEFINE USE CASES 4.-DEFINE SRS 5.-DEFINE USER STORIES 6.- IS IT RECOMMENDABLE TO USE SRS DOCUMENTS IN AGILE METHODOLOGY? WHY? 7.- HOW DO YOU KNOW WHICH TECHNIQUE OR FORMAT TO USE? 8.- WRITE DOWN THE USE CASE COMPONENTS
READING AND LISTENING ACTIVITIES BASED ON THE VIDEO: “REQUIREMENT ELICITATION “ Watch the following video and look for the answer to the following questions: https://www.youtube.com/watch?v=pSQRetBoaRE&t=24s 1.-NAME THE 2 PHASES OF THE REQUIREMENT ENGINEERING PROCESS 2.-NAME AT LEAST 7 ELICITATION TECHNIQUES TO COLLECT THE INFORMATION REQUIRED 3.-REFER TO THE NUMBER OF QUESTIONS AND TYPE OF QUESTIONS THAT SHOULD BE ASKED TO THE DIFFERENT STAKEHOLDERS. 4.-NAME THE DIFFERENT TYPES OF PROBLEMS YOU CAN ENCOUNTER DURING THE REQUIREMENT ELICITATION PROCESS 5.- ACCORDING TO THE VIDEO, WHICH TYPES OF TECHNIQUES SHOULD YOU USE, WHICH ONES WOULD YOU USE ACCORDING TO PROFESSOR SHERRIFF ‘S RECOMMENDATIONS?

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Personal Information Write a program that displays the following information, each on a separate line: Your nam...

Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)

The beginning of a template is marked by a(n) __________.

Starting Out with C++ from Control Structures to Objects (9th Edition)

Write the declaration for class B. The classs members should be as follows: m, an integer. This variable should...

Starting Out with Java: From Control Structures through Data Structures (4th Edition) (What's New in Computer Science)

What is a ToolTip?

Starting Out With Visual Basic (8th Edition)

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY