wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

profile
Chayan Bhattacharjee
Aug 08, 2017
0 Likes
0 Discussions
711 Reads

PROTOCOLS

"Protocols are to communications what algorithms or programming languages are to computations."

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE handles wired and wireless networking The International Organization for Standardization (ISO) other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

 

In modern protocol design, protocols are "layered". Layering is a design principle which divides the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task, and interacts with the other parts of the protocol only in a small number of well-defined ways.

 

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

 

Comments ()


Sign in

Read Next

Inventory management software system

Blog banner

Linux Memory Management

Blog banner

1.1 basic elements

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Sage business cloud accounting

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Importance of Education

Blog banner

10 Unknown facts about India's Independence

Blog banner

The Role of cryptography in cyber security

Blog banner

Virtual memory in Operating System

Blog banner

SQL Injection Techniques

Blog banner

Friendship

Blog banner

Dal Bafla Recipe

Blog banner

ahh wait a min

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

PERSONAL STORIES

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Music

Blog banner

Uniprocessor Scheduling

Blog banner

Microsoft Word

Blog banner

Mendeley (management software)

Blog banner

Business Engineering

Blog banner

GOOGLE

Blog banner

Data Visualization in Decision-Making

Blog banner

Technological Advancement

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

An Overivew Of Cache Memory

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Embaded operating system

Blog banner

Direct memory access (DMA)

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Cache Memory(142)

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Culture Of Ladakh

Blog banner

Iphone or Android which is the best smartphone?

Blog banner

Memory management

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Social Media Sentiment Analysis

Blog banner

"Audit" In Data Science

Blog banner