Application layer - computer network, Computer Networking

Application Layer

The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols such as  the HTTP ( which provides for web  document request and transfer) SMTP ( which  provides for the  transfer of e mail message) and FTP ( which  provides for the transfer of tiles between  two end systems. We ii se that certain network functions such as the translation of  human  friendly names for internet end  systems like  Gaia. Cs yahoo. Com to a 32 bits  networks  address are also  done  with the  help  of an  applications layer  protocol the domain  name  systems ( DNS).

 

Posted Date: 3/4/2013 1:40:39 AM | Location : United States







Related Discussions:- Application layer - computer network, Assignment Help, Ask Question on Application layer - computer network, Get Answer, Expert's Help, Application layer - computer network Discussions

Write discussion on Application layer - computer network
Your posts are moderated
Related Questions
Prepare the Network Step 1: Cable a network that is similar to the one in the topology diagram.  You can use any current switch in your lab as long as it has the needed inte

Database servers connected as a cluster to the main server There could be three database servers connected as a cluster to the main server to provide better connectivity and se


Fully connected : It is the most powerful interconnection topology.  In this every node is directly associated to all other nodes. The limitation of this network is that it needs t

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Explain about the Browser A program that allows the user to access and read information on the World Wide Web. Netscape® Navigator and Microsoft Explorer® are the best known

Firewall is a device or a component that restricts access between a protected or an internal network from an external or untrustworthy network .A firewall basically limits unautho

When a P is returned when a Trace is run, it means the Protocol is unreachable.

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

What is virtual channel? Virtual channel is normally a connection from single source to one destination, although multicast connections are also allowed. The other name for vir