wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

profile
Chayan Bhattacharjee
Aug 08, 2017
0 Likes
0 Discussions
711 Reads

PROTOCOLS

"Protocols are to communications what algorithms or programming languages are to computations."

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE handles wired and wireless networking The International Organization for Standardization (ISO) other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

 

In modern protocol design, protocols are "layered". Layering is a design principle which divides the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task, and interacts with the other parts of the protocol only in a small number of well-defined ways.

 

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

 

Comments ()


Sign in

Read Next

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Importance Of Education.

Blog banner

Operating system evolution

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Threads

Blog banner

Data Analytics in Data Science

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Why is ITSM important in IT organization?

Blog banner

Types of Hackers.

Blog banner

Memory Management - operating system

Blog banner

Threats To Computer System

Blog banner

Drawing tips for a beginner

Blog banner

Smitten Kitchen Keepers

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Steganography

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Memory management

Blog banner

City of Mumbai (Bombay):

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

HTML vs HTML5

Blog banner

Visualization in Data Science

Blog banner

Memory management

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Financial Fraud Detection

Blog banner

Importance of self defence for girls

Blog banner

Meshoo

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Cyber Security in Data Breaching

Blog banner

Wiretapping

Blog banner

Music helps reduce stress

Blog banner

File management

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Texting is actually better than talking in person

Blog banner

BharatPe

Blog banner

Firewall in Computer Network

Blog banner

E-mail security

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Direct Memory Access

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

INTERNET SECURITY

Blog banner