Professional Documents
Culture Documents
1.Communication
2.Management
3.Security
1. Communication
Communication protocols are really important for the
functioning of a network. They are so crucial that it is not
possible to have computer networks without them. These
protocols formally set out the rules and formats through which
data is transferred. These protocols handle syntax, semantics,
error detection, synchronization, and authentication.
Examples of Communication Protocols:
2. Management
These protocols assist in describing the procedures and
policies that are used in monitoring, maintaining, and
managing the computer network. These protocols also help in
communicating these requirements across the network to
ensure stable communication. Network management protocols
can also be used for troubleshooting connections between a
host and a client.
Examples of Management Protocols:
1. ICMP: It is a layer 3 protocol that is used by network
devices to forward operational information and error
messages. It is used for reporting congestions, network
errors, diagnostic purposes, and timeouts.
3. Security:
These protocols secure the data in passage over a
network. These protocols also determine how the network
secures data from any unauthorized attempts to extract or
review data. These protocols make sure that no unauthorized
devices, users, services can access the network data.
Primarily, these protocols depend on encryption to secure
data.
Protocols
Protocols are a fundamental aspect of digital communication as they
dictate how to format, transmit and receive data. They are a set of
rules that determines how the data will be transmitted over the
network.
Levels of a Protocol
There are mainly three levels of a protocol, they are as follows:
Types of Protocols
Protocols can be broadly divided into the following two types:
1. Standard Protocols
2. Proprietary Protocols
Let's learn one by one:
Standard Protocols:
Standard protocols are not vendor-specific i.e. they are not specific
to a particular company or organization. They are developed by a
group of experts from different organizations .
These protocols are publicly available, and we need not pay for
them.
Proprietary Protocols:
Proprietary protocols are developed by an individual organization for
their specific devices. We have to take permission from the
organization if we want to use their protocols.
1. Syntax
2. Semantics
3. Timing
Syntax:
Syntax refers to the structure or format of data and signal levels. It
indicates how to read the data in the form of bits or fields. It also
decides the order in which the data is presented to the receiver.
Example: A protocol might expect that the size of a data packet will
be 16 bits. In which, the first 4 bits are the sender’s address, the next
4 bits are the receiver’s address, the next 4 bits are the check-sum
bits, and the last 4 bits will contain the message. So, every
communication that is following that protocol should send 16-bit
data.
Semantics:
Semantics refers to the interpretation or meaning of each section of
bits or fields. It specifies which field defines what action. It defines
how a particular section of bits or pattern can be interpreted, and
what action needs to be taken. It includes control information for
coordination and error handling.
Timing
Timing refers to two characteristics:
Example: A sender can send the data at a speed of 100 Mbps, but the
receiver can consume it only at a speed of 20 Mbps, then there may
be data losses or the packets might get dropped. So, proper
synchronization must be there between a sender and a receiver.
Functions of protocols
Following are the main functionalities of a protocol: