wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

profile
Chayan Bhattacharjee
Aug 08, 2017
0 Likes
0 Discussions
711 Reads

PROTOCOLS

"Protocols are to communications what algorithms or programming languages are to computations."

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE handles wired and wireless networking The International Organization for Standardization (ISO) other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

 

In modern protocol design, protocols are "layered". Layering is a design principle which divides the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task, and interacts with the other parts of the protocol only in a small number of well-defined ways.

 

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

 

Comments ()


Sign in

Read Next

Odoo

Blog banner

What is Data, Information and Knowledge?

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Process Description

Blog banner

From Model Mistakes to Metrics

Blog banner

Modern Operating System

Blog banner

Cloud Computing

Blog banner

Electronic Funds Transfer

Blog banner

I/O Buffering

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Computer security techniques

Blog banner

Memory management

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Memory Management of Operating System(OS)

Blog banner

A Heartfelt Act of Kindness

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Memory Management in Operating System

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Corporate Discipline.

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Supervised and Unsupervised Learning

Blog banner

Virtual Machine

Blog banner

"Life as a Part-time Student"

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

De-Coding Love

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

The Evolution of Operating Systems

Blog banner

Pink sauce pasta

Blog banner

RAID_142

Blog banner

Wiretapping

Blog banner

Mobile Security

Blog banner

Direct memory access (DMA)

Blog banner

Different types of scam frauds

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Memory hierarchy

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Types of email

Blog banner

Indian Culture and Tradition

Blog banner

Socket Programming in Java

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Social Engineering

Blog banner