Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Textbook Question
Book Icon
Chapter 2, Problem R1RQ

List five nonproprietary Internet applications and the application-layer protocols that they use.

Expert Solution & Answer
Check Mark
Program Plan Intro

Application Layer:

In the OSI (Open Systems Interconnection) model and TCP/IP (Transfer Control Protocol) model, the topmost layer is the Application layer. This layer is used for applications involving communication systems.

Explanation of Solution

Non-Proprietary Internet Applications:

Non-Proprietary Internet Applications are those internet applications which are not registered or protected as a trademark or brand name and they use certain application layer protocols.

Some of the Non-proprietary Internet applications along with the application layer protocols are mentioned below:

  • The web:
    • The web application is a client-server program in which the client runs in a web browser.
    • The web application uses Hyper Text Transfer Protocol (HTTP) as application layer protocol.
    • HTTP is an application protocol for distributive, collaborative, and hypermedia information systems.
  • File Transfer:
  • The File Transfer web application is an application that allows services to the users to share files over the web.
  • The File Transfer web application uses the File Transfer Protocol (FTP) as application layer protocol.
  • The FTP is a standard application layer tool in a computer network which is used to transfer files between client and server.
  • Remote Login:
    • The Remote login related applications are the applications that are used to control one computer from another computer by the use of a remote.
    • The Remote login related application uses the Telecommunications Network (Telnet) as application layer protocol.
    • Telnet is a bidirectional interactive text oriented communication facility which is used as a protocol on the internet by using a virtual terminal connection.
  • E-mail:
  • E-mail applications are used to send emails over the internet.
  • The Simple Mail Transfer Protocol (SMTP) is used in E-mail related applications.
  • The SMTP is only an application layer delivery protocol which is an internet standard for electronic mail transformation.
  • Bit Torrent File Sharing:
  • Bit Torrent file sharing application is a communication protocol that is used for peer to peer file sharing to share and distribute files and data over the internet.
  • The Bit Torrent File sharing applications use Bit Torrent Protocol as application layer protocol.
  • The Bit Torrent Protocol is a protocol that is used for distributing electronic files.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
05:06
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY