Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Textbook Question
Book Icon
Chapter 2, Problem R1RQ

List five nonproprietary Internet applications and the application-layer protocols that they use.

Expert Solution & Answer
Check Mark
Program Plan Intro

Application Layer:

In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.

Explanation of Solution

Non-Proprietary Internet Applications:

Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.

Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:

  • The web:
    • The web application is a client-server program in which the client runs in a web browser.
    • The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
    • HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
  • File Transfer:
  • The File Transfer web application is an application that allows services to the users to share files over the web.
  • The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
  • The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
  • Remote Login:
    • The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
    • The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
    • Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
  • E-mail:
  • E-mail applications are used to send emails over the internet.
  • The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
  • The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
  • Bit Torrent File Sharing:
  • Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
  • The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
  • The Bit Torrent Protocol is a protocol that is used for distributing electronic files.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
05:06
Students have asked these similar questions
(Short-answer) b. Continue from the previous question. Suppose part of the data you extracted from the data warehouse is the following.   Identify the missing values you think exist in the dataset. Use Column letter and Row number to refer to each missing value in the dataset. Please write down how you want to address each particular missing value (you can group them if they receive same treatment). For imputation, you do not need to calculate the exact imputed values but just describe what kind of value you want to use to impute.
Please original work Locate data warehousing solutions offered by IBM, Oracle, Microsoft, and Amazon Compare and contrast the capabilities of each solution and provide several names of some organizations that utilize each of these solutions. Please cite in text references and add weblinks
Need Help: Which of the following statements about confusion matrix is wrong A) Confusion matrix is a performance measure for probability prediction techniques B) Confusion matrix is derived based on classification rules with cut-off value 0.5 C) Confusion matrix is derived based on training partition to measure a model’s predictive performance D) None of the above

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Personal Information Write a program that displays the following information, each on a separate line: Your nam...

Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)

The beginning of a template is marked by a(n) __________.

Starting Out with C++ from Control Structures to Objects (9th Edition)

Write the declaration for class B. The classs members should be as follows: m, an integer. This variable should...

Starting Out with Java: From Control Structures through Data Structures (4th Edition) (What's New in Computer Science)

What is a ToolTip?

Starting Out With Visual Basic (8th Edition)

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
  • Text book image
    Systems Architecture
    Computer Science
    ISBN:9781305080195
    Author:Stephen D. Burd
    Publisher:Cengage Learning
    Text book image
    MIS
    Computer Science
    ISBN:9781337681919
    Author:BIDGOLI
    Publisher:Cengage
    Text book image
    Enhanced Discovering Computers 2017 (Shelly Cashm...
    Computer Science
    ISBN:9781305657458
    Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
    Publisher:Cengage Learning
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning