You are on page 1of 12

My protocol Rules Objectives

a) Relate computer network protocols to the rules that


you use every day for various forms of communication
A network protocol is an accepted set of rules that
govern data communication between different devices in the
network. It determines what is being communicated, how it is
being communicated, and when it is being communicated.
Types of protocols
The protocols can be broadly classified into three major
categories-

1.Communication
2.Management
3.Security

1. Communication
Communication protocols are really important for the
functioning of a network. They are so crucial that it is not
possible to have computer networks without them. These
protocols formally set out the rules and formats through which
data is transferred. These protocols handle syntax, semantics,
error detection, synchronization, and authentication.
Examples of Communication Protocols:

1. HTTP: It is a layer 7 protocol that is designed for


transferring a hypertext between two or more systems.
HTTP works on a client-server model, most of the data
sharing over the web are done through using HTTP.
2. TCP: It lay-outs a reliable stream delivery by using
sequenced acknowledgment. It is a connection-
oriented protocol i.e., it establishes a connection
between applications before sending any data. It is
used for communicating over a network. It has many
applications such as emails, FTP, streaming media,
etc.
3. UDP: It is a connectionless protocol that lay-out a
basic but unreliable message service. It adds no flow
control, reliability, or error-recovery functions. UPD is
functional in cases where reliability is not required. It is
used when we want faster transmission, for
multicasting and broadcasting connections, etc.
4. BGP: It is a routing protocol that controls how packets
pass through the router in an independent system one
or more networks run by a single organization and
connect to different networks. It connects the endpoints
of a LAN with other LANs and it also connects
endpoints in different LANs to one another.
5. ARP: ARP is a protocol that helps in mapping Logical
addresses to the Physical addresses acknowledged in
a local network. For mapping and maintaining a
correlation between these logical and physical
addresses a table known as ARP cache is used.
6. IP: It is a protocol through which data is sent from one
host to another over the internet. It is used for
addressing and routing data packets so that they can
reach their destination.
7. DHCP: it’s a protocol for network management and it’s
used for the method of automating the process of
configuring devices on IP networks. A DHCP server
automatically assigns an IP address and various other
configurational changes to devices on a network so
they can communicate with other IP networks. it also
allows devices to use various services such as NTP,
DNS, or any other protocol based on TCP or UDP.

2. Management
These protocols assist in describing the procedures and
policies that are used in monitoring, maintaining, and
managing the computer network. These protocols also help in
communicating these requirements across the network to
ensure stable communication. Network management protocols
can also be used for troubleshooting connections between a
host and a client.
Examples of Management Protocols:
1. ICMP: It is a layer 3 protocol that is used by network
devices to forward operational information and error
messages. It is used for reporting congestions, network
errors, diagnostic purposes, and timeouts.

2. SNMP: It is a layer 7 protocol that is used for


managing nodes on an IP network. There are three
main components in SNMP protocol i.e., SNMP agent,
SNMP manager, and managed device. SNMP agent
has the local knowledge of management details, it
translates those details into a form that is compatible
with the SNMP manager. The manager presents data
acquired from SNMP agents, thus helping in
monitoring network glitches, network performance, and
troubleshooting them.

3. Gopher: It is a type of file retrieval protocol that


provides downloadable files with some description for
easy management, retrieving, and searching of files.
All the files are arranged on a remote computer in a
stratified manner. It is an old protocol and it is not
much used nowadays.

4. FTP: FTP is a Client/server protocol that is used for


moving files to or from a host computer, it allows users
to download files, programs, web pages, and other
things that are available on other services.

5. POP3: It is a protocol that a local mail client uses to


get email messages from a remote email server over a
TCP/IP connection. Email servers hosted by ISPs also
use the POP3 protocol to hold and receive emails
intended for their users. Eventually, these users will
use email client software to look at their mailbox on the
remote server and to download their emails. After the
email client downloads the emails, they are generally
deleted from the servers.

6. Telnet: It is a protocol that allows the user to connect


to a remote computer program and to use it i.e., it is
designed for remote connectivity. Telnet creates a
connection between a host machine and a remote
endpoint to enable a remote session.

3. Security:
These protocols secure the data in passage over a
network. These protocols also determine how the network
secures data from any unauthorized attempts to extract or
review data. These protocols make sure that no unauthorized
devices, users, services can access the network data.
Primarily, these protocols depend on encryption to secure
data.

Examples of Security Protocols:


1. SSL: It is a network security protocol mainly used for
protecting sensitive data and securing internet
connections. SSL allows both servers to server and
client to server communication. All the data transferred
through SSL is encrypted thus stopping any
unauthorized person from accessing it.
2. HTTPS: It is the secured version of HTTP; this protocol
ensures secure communication between two
computers where one sends the request through the
browser and the other fetches the data from the
webserver.
3. TSL: It is a security protocol designed for data security
and privacy over the internet, its functionality is
encryption, checking the integrity of data i.e., whether it
has been tampered with or not and Authentication. It is
generally used for encrypted communication between
servers and web apps, like a web browser loading a
website, it can also be used for encryption of
messages, emails, VoIP.
c)explain what would happen if the sender and receiver did not
agree on the details of the protocol.

Protocols
Protocols are a fundamental aspect of digital communication as they
dictate how to format, transmit and receive data. They are a set of
rules that determines how the data will be transmitted over the
network.

It can also be defined as a communication standard followed by the


two key parties(sender and receiver) in a computer network to
communicate with each other.

It specifies what type of data can be transmitted, what commands are


used to send and receive data, and how data transfers are confirmed.

In simple terms, a protocol is similar to a language. Every language


has its own rules and vocabulary. Protocols have their own rules,
specifications, and implementations. If two people share the same
language, they can communicate very easily and effectively.
Similarly, two hosts implementing the same protocol can connect
and communicate easily with each other. Hence, protocols provide a
common language for network devices participating in data
communication.

Levels of a Protocol
There are mainly three levels of a protocol, they are as follows:

1. Hardware Level: In this level, the protocol enables the hardware


devices to connect and communicate with each other for various
purposes.
2. Software Level: In the software level, the protocol enables
different software to connect and communicate with each other to
work collaboratively.
3. Application Level: In this level, the protocol enables the
application programs to connect and communicate with each other
for various purposes.
Hence protocols can be implemented at the hardware, software, and
application levels.

Types of Protocols
Protocols can be broadly divided into the following two types:

1. Standard Protocols
2. Proprietary Protocols
Let's learn one by one:

Standard Protocols:

A standard protocol is a mandated protocol for all devices. It


supports multiple devices and acts as a standard.

Standard protocols are not vendor-specific i.e. they are not specific
to a particular company or organization. They are developed by a
group of experts from different organizations .

These protocols are publicly available, and we need not pay for
them.

Some of the examples of Standard Protocols are FTP, DNS, DHCP,


SMTP, TELNET, TFTP, etc.

Proprietary Protocols:
Proprietary protocols are developed by an individual organization for
their specific devices. We have to take permission from the
organization if we want to use their protocols.

It is not a standard protocol and it supports only specific devices. We


may have to pay for these protocols.

Some of the examples of Proprietary Protocols are IMessage, Apple


Talk, etc.

Key Elements of protocols

The key elements of the protocol determine what to be


communicated, how it is communicated, and when it is
communicated.

There are mainly three key elements of a protocol, they are as


follows:

1. Syntax
2. Semantics
3. Timing

Let's learn these elements in detail.

Syntax:
Syntax refers to the structure or format of data and signal levels. It
indicates how to read the data in the form of bits or fields. It also
decides the order in which the data is presented to the receiver.

Example: A protocol might expect that the size of a data packet will
be 16 bits. In which, the first 4 bits are the sender’s address, the next
4 bits are the receiver’s address, the next 4 bits are the check-sum
bits, and the last 4 bits will contain the message. So, every
communication that is following that protocol should send 16-bit
data.

Semantics:
Semantics refers to the interpretation or meaning of each section of
bits or fields. It specifies which field defines what action. It defines
how a particular section of bits or pattern can be interpreted, and
what action needs to be taken. It includes control information for
coordination and error handling.

Example: It interprets whether the bits of address identify the route


to be taken or the final destination of the message or something else.

Timing
Timing refers to two characteristics:

1. when the data should be sent?


2. what will be the speed of sending and receiving the data?
It performs speed matching, sequencing and flow control of the data
items.

Example: A sender can send the data at a speed of 100 Mbps, but the
receiver can consume it only at a speed of 20 Mbps, then there may
be data losses or the packets might get dropped. So, proper
synchronization must be there between a sender and a receiver.

Functions of protocols
Following are the main functionalities of a protocol:

 Data Sequencing: It mainly refers to dive data into packets i.e.


it divided the whole data into some packets.
 Data Flow: It mainly deals with sending data to the correct
destination i.e. the flow of the data is correct or not.
 Data Routing: It refers to select the best path for data
transmission between a sender and a receiver because there can
be many routes from sender to receiver and you should select
the best possible route.
 Encapsulation: It refers to the process of taking one protocol
and transferring it to some other another protocol.
 Segmentation & Reassembly: It deals with segmenting the
data message i.e. diving the data into packets when data flows
from the upper protocol layer to lower, and reassembly is vice-
versa of segmentation i.e. all the segmented packets are
recollected in the correct order at the receiver side.
 Connection Control: It ensures connection oriented data
transfer for lengthy data items.
 Multiplexing: It allows combining multiple transmission unit
signals or channels of higher-level protocols in one
transmission unit of a lower-level protocol. Multiplexing can
be upward or downward.
 Ordered Delivery: Protocol facilitates ordered delivery of
data, by providing a unique sequence number to each data
packet. It is the function of the sender to maintain ordered
delivery. By doing so, the receiver will receive the data in the
same order as sent by the sender.
 Transmission Services: It mainly deals with priority, Quality
of Service (QoS), and security of data packets.
 Addressing: It mainly deals with addressing levels, addressing
scope, communication identifiers, and addressing modes.
 Flow Control: It facilitates to limit the flow of data. It is the
function of the receiver's end to maintain flow control of data.
 Error Control: It deals with error detection (using the
checksum bits) and its control. If any error is detected during
the transmission of the data, a request for retransmission of
data is sent to the sender by the receiver, and the corrupt data
packet is discarded.

You might also like