answersLogoWhite

0


Best Answer

POP3

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which application layer protocol uses message types such as get put and post?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Types of email protocol?

types of e-mail protocol?


How many layers are in the OSI model?

The OSI 7 layer model descibes the theoretical levels of networking on a computer Layer 1 Physical Layer - actual network cable and connectors Layer 2 Data Link Layer - network address (MAC) and packet switching Layer 3 Network Layer - Internet Protocol (IP) - addressing and packet routing Layer 4 Transport Layer - Transmission Control Protocol (TCP) - packet sequencing & error correction Layer 5 Session Layer - Connection control for repeated send/receive (a session) Layer 6 Presentation Layer - presenting information to application in correct format LAyer 7 Application Layer - actual display/control of information, layout etc. for two computers to communicate -example chat program the following would occur user types into a chat program on computer A (7) application accepts input and decides what to do with it (6) a connection is requested to send to computer B (5) the message is broken into pieces and encpsulated within a packet (which includes the address to send to and the address from which it came) Packets are given a sequence number(4)(3) Packet sent across the network using the addressing information to determine where to go to(3)(2)(1) on Computer B the revers happens - packet is put back together - addressing information is removed and eventually displayed on the screen.


What is protocol independence?

Protocol independence means that an application or service is able to utilize more than one communications protocol. The most common protocol would be TCP/IP which actually encompasses different types of IP protocols such as IP or UDP. The TCP component is responsible for connection management and the IP component is the actual communications protocol. It is possible to use IP without the TCP component. This is also referred to as a connectionless protocol like UDP. These different types of IP communications could be considered different protocols. This could be an example protocol independence if either can be used for a specific application. There are less common protocols like Novell's IPX/SPX which do not interoperate with TCP/IP in any way. However, there are applications that can use either protocol making them completely protocol independent. Both TCP/IP and IPX followed the OSI model, and it is possible to load both protocols on the same network interface on a host, and even on a CISCO router as a sub-interface. Remember that the lower levels of the OSI model such as physical, data, network and transport are open and can be replaced with different media and or data frame size etc. Try to find a detailed OSI model and you will see more than one protocol within the transport layer. This would also help in understanding protocol independence. It is also possible to encapsulate or hide one protocol inside of another to allow say NetBIOS or IPX to be carried over an IP network within a pure IP packet. This requires that all the IP packet header and footer be stripped away and the inside or encapsulated protocol to be handed off to a higher OSI layer such as the Session layer. I forgot to login MPGMichael first answer


Which layer of the OSI model is the only one that does not provide services to other layers within the model?

Original Answer which is incorrect: Application Layer The answer is none. FTP(Layer/7: File Transfer Protocol) which is a daemon or service that lies on computers on micro, to mid, to mainframe computers all use this service. The service was designed during the original design of the 'internet' by DARPA(Defense Advanced Research Projects Agency) to transfer data between 'unlike' computer operating systems for redundancy reasons. Likewise, Microsoft Access or Microsoft Excel, which are also application levels of the OSI model or layer 7, can communicate to all levels of the OSI model. Microsoft Access can for instance talk though ODBC, then through an appropriate protocol like TCP/IP to a database anywhere in the world on a publicly addressed space. Therefore, Application layer programs, can in fact communicate through the lower six layers. I can see the argument that layer 7 does not provide services to lower layers, unless you have seen this on a protocol analyzer. When an FTP or Web(HTTP)request comes in, it travels up the OSI model from physical to application. It is dealt with on the local CPU, then sent down the OSI model from layer 7 to 1, then out the default router. You also have push functions on the internet that exist in code on many types of devices that originate on layer 7(like your uploading your camera photos through your email program), including web servers. So to argue that web servers only respond to client requests is not proper either. I hope this has cleared up this issue. The OSI model is meant to encompass all measures of communications. All are related. No exceptions except for dead packets. e


Types of peer to peer network?

Two types of peer-to-peer networks exist that are:• Pure peer-to-peer Network:All Peers act as equals mean to say that there is no dedicated server, all behaves equally• Hybrid peer-to-peer Network:It act as the client¬server model because it has a central peer act as server that keeps information on peers and responds to requests for that information. Central server (peer) knows what resources are shared and what are free. They are also responsible for hosting management of available resources.

Related questions

Does Simple Network Management Protocol have any types of message?

i want the answer for this question (i.e) is there any message types found in simple network management protocol


How many types of messages are used for client-server application?

Actually, there can be an unlimited number of different message types for any network application, because each application can define what messages they send and understand. Certain protocols use defined message types (as defined in the RFCs), but any user application is free to choose the form of the message they wish to use.


What is ARP request?

The address resolution protocol (arp) is a protocol used by theInternet Protocol (IP) , specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer. It is used when IPv4 is used over Ethernet.There are four types of arp messages that may be sent by the arp protocol. These are identified by four values in the "operation" field of an arp message. The types of message are:ARP requestARP replyRARP requestRARP replyARP request:If a host with the IPv4 address 10.10.10.123 and MAC address 00:09:58:D8:11:22 needs to send a packet to another host with the IP address 10.10.10.140, but does not have its MAC address, then the host sends an ARP request to resolve the unknown address.


Types of email protocol?

types of e-mail protocol?


Types of OSI reference model?

There are seven type of OSI reference model:-Layer 7: The application layer Layer 6: The presentation layer Layer 5: The session layer Layer 4: The transport layer Layer 3: The network layerLayer 2: The data-link layer Layer 1: The physical layer


Types technology using determnistic MAC protocol and Non Deterministic MAC protocol?

types technology using determnistic MAC protocol and Non Deterministic MAC protocol?


When you use a ping command in microsft if its successful 5 exclamations are displayed whereas it is different on cisco why?

The ICMP protocol is standardized, in the sense that a computer should reply with a certain message (called "echo-reply") if it receives a certain other message (the "echo-request"). How many echo-request messages are sent when the user types "ping" is NOT standardized - there is no need to.The ICMP protocol is standardized, in the sense that a computer should reply with a certain message (called "echo-reply") if it receives a certain other message (the "echo-request"). How many echo-request messages are sent when the user types "ping" is NOT standardized - there is no need to.The ICMP protocol is standardized, in the sense that a computer should reply with a certain message (called "echo-reply") if it receives a certain other message (the "echo-request"). How many echo-request messages are sent when the user types "ping" is NOT standardized - there is no need to.The ICMP protocol is standardized, in the sense that a computer should reply with a certain message (called "echo-reply") if it receives a certain other message (the "echo-request"). How many echo-request messages are sent when the user types "ping" is NOT standardized - there is no need to.


How many layers are in the OSI model?

The OSI 7 layer model descibes the theoretical levels of networking on a computer Layer 1 Physical Layer - actual network cable and connectors Layer 2 Data Link Layer - network address (MAC) and packet switching Layer 3 Network Layer - Internet Protocol (IP) - addressing and packet routing Layer 4 Transport Layer - Transmission Control Protocol (TCP) - packet sequencing & error correction Layer 5 Session Layer - Connection control for repeated send/receive (a session) Layer 6 Presentation Layer - presenting information to application in correct format LAyer 7 Application Layer - actual display/control of information, layout etc. for two computers to communicate -example chat program the following would occur user types into a chat program on computer A (7) application accepts input and decides what to do with it (6) a connection is requested to send to computer B (5) the message is broken into pieces and encpsulated within a packet (which includes the address to send to and the address from which it came) Packets are given a sequence number(4)(3) Packet sent across the network using the addressing information to determine where to go to(3)(2)(1) on Computer B the revers happens - packet is put back together - addressing information is removed and eventually displayed on the screen.


What is protocol independence?

Protocol independence means that an application or service is able to utilize more than one communications protocol. The most common protocol would be TCP/IP which actually encompasses different types of IP protocols such as IP or UDP. The TCP component is responsible for connection management and the IP component is the actual communications protocol. It is possible to use IP without the TCP component. This is also referred to as a connectionless protocol like UDP. These different types of IP communications could be considered different protocols. This could be an example protocol independence if either can be used for a specific application. There are less common protocols like Novell's IPX/SPX which do not interoperate with TCP/IP in any way. However, there are applications that can use either protocol making them completely protocol independent. Both TCP/IP and IPX followed the OSI model, and it is possible to load both protocols on the same network interface on a host, and even on a CISCO router as a sub-interface. Remember that the lower levels of the OSI model such as physical, data, network and transport are open and can be replaced with different media and or data frame size etc. Try to find a detailed OSI model and you will see more than one protocol within the transport layer. This would also help in understanding protocol independence. It is also possible to encapsulate or hide one protocol inside of another to allow say NetBIOS or IPX to be carried over an IP network within a pure IP packet. This requires that all the IP packet header and footer be stripped away and the inside or encapsulated protocol to be handed off to a higher OSI layer such as the Session layer. I forgot to login MPGMichael first answer


What are protocols for long distance communication?

There are 5 types pf protocols used in the computer network.


Are Microsoft Word and Microsoft Excel system softwares?

MS Word and MS Excel are examples of application software, because they allow the user to accomplish specific tasks. System software is software that runs in the background to make the system resources available to application software. An example of something system software does to assist applicatin software is allowing the computer to talk to the printer.


What are the different types of email mailboxes?

"Well, most email mailboxes use either POP3 or IMAP to retrieve your emails." Most email programs support both POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol) for pulling emails from a TCP/IP connection.