Professional Documents
Culture Documents
Installandmanagenetworkprotocols 221219130255 40dcfff3
Installandmanagenetworkprotocols 221219130255 40dcfff3
Email:- jaletosunkemo2019@gmail.com
LO1 INTRODUCTION TO NETWORK PROTOCOL
by jaleto S. 2
LO1 INTRODUCTION TO NETWORK PROTOCOL
by jaleto S. 3
CONT...
• a protocol is a standardized set of rules for formatting and
processing data. Protocols enable computers to communicate
with one another.
• Network protocols are a set of rules, conventions, and data
structures that dictate how devices exchange data across
networks.
• Network Protocols are a set of rules governing exchange of
information in an easy, reliable and secure way.
• In order for two computers to talk to each other, they must be
speaking the same language.
by jaleto S. 4
List of Network Protocols
by jaleto S. 5
Communication
• Communication protocols allow different network devices to communicate with
each other. They are used in both analog and digital communications and can be
used for important processes, ranging from transferring files between devices to
accessing the internet.
• Common types of communication protocols include the following:
• Automation: These protocols are used to automate different processes in both
commercial and personal settings, such as in smart buildings, cloud technology or
self-driving vehicles.
• Instant messaging: Instantaneous, text-based communications on smartphones and
computers occur because of a number of different instant messaging network
protocols.
• Routing: Routing protocols permit communication between routers and other
network devices. There are also routing protocols specifically for ad hoc networks.
• Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and
computers — work due to a variety of different Bluetooth protocols.
• File transfer: If you have ever moved files from one device to another, either via a
physical or digital medium, you’ve used file transfer protocols (FTP).
• Internet Protocol: Internet Protocolby(IP) allows
jaleto S. data to be sent between devices via6
the internet. The internet could not operate as it currently does without IP.
Network management
• protocols define and describe the various procedures needed to effectively
operate a computer network. These protocols affect various devices on a
single network — including computers, routers and servers — to ensure
each one, and the network as a whole, perform optimally.
by jaleto S. 7
Security
• Security protocols, also called cryptographic protocols, work to
ensure that the network and the data sent over it are protected from
unauthorized users.
• Common functions of security network protocols include the
following:
• Encryption: Encryption protocols protect data and secure areas by
requiring users to input a secret key or password in order to access
that information.
• Entity Authentication: Entity authentication protocols create a
system that requires different devices or users on a network to verify
their identity before accessing secure areas.
• Transportation: Transportation security protocols protect data
while it is transported from one network device to another.
by jaleto S. 8
Here are a few examples of the most commonly used network
protocols:
by jaleto S. 11
Levels of a Protocol
by jaleto S. 13
Standard Protocols
• A standard protocol is a mandated protocol for all
devices. It supports multiple devices and acts as a
standard.
• Standard protocols are not vendor-specific i.e.
they are not specific to a particular company or
organization. They are developed by a group of
experts from different organizations .
• These protocols are publicly available, and we
need not pay for them.
• Some of the examples of Standard Protocols
are FTP, DNS, DHCP, SMTP, TELNET, TFTP, etc.
by jaleto S. 14
Proprietary Protocols
by jaleto S. 15
Key Elements of protocols
by jaleto S. 16
Syntax
• Syntax refers to the structure or format of data and
signal levels. It indicates how to read the data in the
form of bits or fields. It also decides the order in which
the data is presented to the receiver.
• Example: A protocol might expect that the size of a
data packet will be 16 bits. In which, the first 4 bits are
the sender’s address, the next 4 bits are the receiver’s
address, the next 4 bits are the check-sum bits, and the
last 4 bits will contain the message. So, every
communication that is following that protocol should
send 16-bit data.
by jaleto S. 17
Semantics
by jaleto S. 19
Functions of protocols
by jaleto S. 22
cont...
by jaleto S. 23
There are various types of protocols that support a major and compassionate
role in communicating with different devices across the network. These are:
by jaleto S. 25
Cont..
• User Datagram Protocol (UDP): UDP is a substitute
communication protocol to Transmission Control
Protocol implemented primarily for creating loss-
tolerating and low-latency linking between different
applications.
• Post office Protocol (POP): POP3 is designed for
receiving incoming E-mails.
• Simple mail transport Protocol (SMTP): SMTP is
designed to send and distribute outgoing E-Mail.
• File Transfer Protocol (FTP): FTP allows users to
transfer files from one machine to another. Types of
files may include program files, multimedia files, text
files, and documents, etc.
by jaleto S. 26
Cont…
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating links.
These links may be in any form like text or images.
– HTTP is designed on Client-server principles which allow a client system for
establishing a connection with the server machine for making a request.
– The server acknowledges the request initiated by the client and responds
accordingly.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as
Hyper Text Transfer Protocol Secure is a standard protocol to secure the
communication among two computers one using the browser and other fetching
data from web server.
– HTTP is used for transferring data between the client browser (request) and the web
server (response) in the hypertext format, same in case of HTTPS except that the
transferring of data is done in an encrypted format.
– So it can be said that https thwart hackers from interpretation or modification of
data throughout the transfer of packets.
by jaleto S. 27
Cont…
by jaleto S. 29
Cont…
• some other popular protocols act as co-functioning protocols
associated with these primary protocols for core functioning.
These are:
• ARP (Address Resolution Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• IMAP4 (Internet Message Access Protocol)
• SIP (Session Initiation Protocol)
• RTP (Real-Time Transport Protocol)
• RLP (Resource Location Protocol)
• RAP (Route Access Protocol)
• L2TP (Layer Two Tunneling Protocol)
• PPTP (Point To Point Tunneling Protocol)
by jaleto S. 30
• SNMP (Simple Network Management Protocol)
cont...
• ARP (Address Resolution Protocol)
– is a procedure for mapping a dynamic IP address to a permanent physical
machine address in a local area network (LAN). Or IP into MAC
• (RARP) Reverse Address Resolution Protocol is a protocol a
physical machine in a local area network (LAN) can use to request
its IP address.
– It does this by sending the device's physical address to a specialized RARP
server that is on the same LAN and is actively listening for RARP requests.
by jaleto S. 31
Cont..
by jaleto S. 32
Border Gateway Protocol (BGP)
• BGP:- version 4 is widely used on the public internet
and by Internet Service Providers (ISP) to maintain
very large routing tables and traffic processing. BGP
is one of the few protocols that have been designed to
deal with the astronomically large routing tables that
must exist on the public Internet.
• User Datagram Protocol (UDP) is a Transport Layer
protocol. UDP is a part of the Internet Protocol suite,
referred to as UDP/IP suite. Unlike TCP, it is
an unreliable and connectionless protocol.
• RDP:-
– It enables you to establish a connection with a remote
computer.
by jaleto S. 33
SSL
by jaleto S. 34
What is protocol port
by jaleto S. 35
Some protocols within their ports
HTTPS 443
POP3 110
NetBIOS 137/138/139
by jaleto S. 37
THE END OF LO1
ANY QUESTION
by jaleto S. 38