wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

profile
Chayan Bhattacharjee
Aug 08, 2017
0 Likes
0 Discussions
711 Reads

PROTOCOLS

"Protocols are to communications what algorithms or programming languages are to computations."

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE handles wired and wireless networking The International Organization for Standardization (ISO) other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

 

In modern protocol design, protocols are "layered". Layering is a design principle which divides the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task, and interacts with the other parts of the protocol only in a small number of well-defined ways.

 

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

 

Comments ()


Sign in

Read Next

IO Buffers

Blog banner

Deadlock

Blog banner

Why Data Security Is Important

Blog banner

Why we should do reading

Blog banner

Modern operating system

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

indian premier league

Blog banner

Metasploit

Blog banner

Health is Wealth

Blog banner

Types of OS

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

This too shall pass

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Multiprocessor and Multicore Organization

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Evolution of Operating System

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

What is OS Fingerprinting?

Blog banner

INTERNET SECURITY

Blog banner

Direct Memory Access

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

About myself

Blog banner

Operating system

Blog banner

Street foods

Blog banner

Footprinting

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

DIGITAL TECHNOLOGY

Blog banner

PYTHON

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Brain wash of social media

Blog banner

Evolution of the Microprocesor

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Quality check in IT services

Blog banner

Travel: Everything Everywhere!

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

File management

Blog banner

File and File System Structure

Blog banner

Access management

Blog banner

Why Friendship at Work is Important

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner