wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

profile
Chayan Bhattacharjee
Aug 08, 2017
0 Likes
0 Discussions
711 Reads

PROTOCOLS

"Protocols are to communications what algorithms or programming languages are to computations."

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE handles wired and wireless networking The International Organization for Standardization (ISO) other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

 

In modern protocol design, protocols are "layered". Layering is a design principle which divides the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task, and interacts with the other parts of the protocol only in a small number of well-defined ways.

 

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

 

Comments ()


Sign in

Read Next

10 Reasons to date your best friend

Blog banner

Deadlocks in operating system

Blog banner

What is Packet Filtering?

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Lucidchart

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Explain DBMS in Brief

Blog banner

Message Passing in OS

Blog banner

10 Interesting Facts about Death Note

Blog banner

Game Theory in Blockchain

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Sage

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

BUFFER OVERFLOW_142

Blog banner

Modern Operating System

Blog banner

Deadlock and Starvation

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Open Source Project By Google

Blog banner

NodeJs

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Apache Kafka

Blog banner

Social Engineering

Blog banner

10 Problems you face if you are an Otaku

Blog banner

The functions of operating system

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

What is E-commerce

Blog banner

Threads and concurrency

Blog banner

Jira service Management

Blog banner

Deadlock and Starvation

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

IO Buffers

Blog banner

What is a geographic information system (GIS)?

Blog banner

Disk cache

Blog banner

Memory Management

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

'Positivity in life'

Blog banner

Uniprocessor Scheduling

Blog banner

PYTHON

Blog banner