Skip to content

Protocols

# What is meant by Protocols in computer networks and examples

Network Protocol

Network Protocol (Taken from https://www.youtube.com/watch?v=MVwLiVkOZWY)

What is Protocol?

In networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common language for computers. The computers within a network may use vastly different software and hardware; however, the use of protocols enables them to communicate with each other regardless.

Standardized protocols are like a common language that computers can use, similar to how two people from different parts of the world may not understand each other's native languages, but they can communicate using a shared third language. If one computer uses the Internet Protocol (IP) and a second computer does as well, they will be able to communicate. But if one computer uses IP and the other does not know this protocol, they will be unable to communicate.

In my(Nandi) opinion, computer network protocols are a rule that exists in a computer network and these rules must be obeyed by the sender. The goal is that recipients can communicate with each other and exchange information even though they have different systems. Protocols define the format, order of messages sent and received among network entities, and actions taken on msg transmission, receipt. The function of computer network protocols in general is to connect senders and receivers in communicating and exchanging information so that it can run accurately and smoothly.

What are the layers of the OSI model?

The Open Systems Interconnection (OSI) model is an abstract representation of how the Internet works. It contains 7 layers, with each layer representing a different category of networking functions.

alt text if the image fails to load

Protocols make these networking functions possible. For instance, the Internet Protocol (IP) is responsible for routing data by indicating where data packets* come from and what their destination is. IP makes network-to-network communications possible. Hence, IP is considered a network layer (layer 3) protocol.

As another example, the Transmission Control Protocol (TCP) ensures that the transportation of packets of data across networks goes smoothly. Therefore, TCP is considered a transport layer (layer 4) protocol.

There are several types of computer network protocols, including:

  1. Ethernet is a network that falls into the category of Local Area Network (LAN) or local area network and enables the device (that connected with LAN) to communicate with each other through protocols.
  2. LocalTalk is a LAN and special implementation of Apple Computer's AppleTalk network system physical layer. Transmission speeds of LocalTalk are very low (230.4 Kbits/sec), but LocalTalk is important because most Macintosh computers have LocalTalk support built in.
  3. Tokenring is a type of protocol developed by the IBM company with an access method for sending information within a protocol loop. The Token Ring protocol can operate at transmission speeds from 4 Mbps to 16 Mbps.
  4. FDDI (Fiber Distributed Data Interface) is Data communication standards use fiber optic on LANs with a length of up to 200 km. The FDDI protocol is based on the Token Ring protocol. The speed of FDDI is the major advantage that can operating at speeds up to 100 Mbps.
  5. TCP/IP (Transmission Control Protocol/Internet Protocol) is a communication standard that can be used to exchange data between computers by a community that is joined through the internet network. TCP/IP has 4 layers which each layer is defined to a specific function to perform, Application Layer, Transport Layer, Internet Layer, and Network Interface.
  6. UDP (User Datagram Protocol) is one of the TCP / IP transport layer protocols that supports unreliable, connectionless communication between hosts in a network using TCP / IP. UDP was designed by David Reed in 1980, defined in RFC 768.
  7. ICMP (Internet Control Message Protocol) also used to give error messages if a service requested does not exist, or if the computer or router that is trying to reach cannot be reached.
  8. HTTP (Hypertext Transfer Protocol) is a type of protocol used by the WWW (World Wide Web) as a primary identity in the internet network to access a site or website.
  9. HTTPS (Hypertext Transfer Protocol Secure) is a type of protocol that is a secure version of HTTP which is used as a communication protocol from the WWW.
  10. FTP (File Transfer Protocol) is a type of internet protocol that runs within the application layer as a standard for sending computer files between machines in an internetwork.
  11. SSH (Secure Shell) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
  12. TFTP (Trivial File Transfer Protocol) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network
  13. ARP (Address Resolution Protocol) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address. This mapping is a critical function in the Internet protocol suite.
  14. UDP (User Datagram Protocol) In computer networking, the User Datagram Protocol is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768.

References

  • https://www.speedcheck.org/wiki/ethernet/
  • https://www.geeksforgeeks.org/tcp-ip-model/
  • http://mitchg3.blogspot.com/2009/08/what-is-ethernet-local-talk-token-ring.html
  • https://www.linktionary.com/l/localtalk.html