List five nonproprietary Internet applications and the application-layer protocols that they use.
Application Layer:
In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.
Explanation of Solution
Non-Proprietary Internet Applications:
Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.
Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:
- The web:
- The web application is a client-server program in which the client runs in a web browser.
- The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
- HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
- File Transfer:
- The File Transfer web application is an application that allows services to the users to share files over the web.
- The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
- The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
- Remote Login:
- The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
- The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
- Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
- E-mail:
- E-mail applications are used to send emails over the internet.
- The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
- The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
- Bit Torrent File Sharing:
- Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
- The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
- The Bit Torrent Protocol is a protocol that is used for distributing electronic files.
Want to see more full solutions like this?
Chapter 2 Solutions
Computer Networking: A Top-Down Approach (7th Edition)
Additional Engineering Textbook Solutions
Prelude to Programming
Engineering Mechanics: Statics & Dynamics (14th Edition)
Introduction to Programming Using Visual Basic (10th Edition)
Modern Database Management
Problem Solving with C++ (10th Edition)
Applied Fluid Mechanics (7th Edition)
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY