wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

profile
Chayan Bhattacharjee
Aug 08, 2017
0 Likes
0 Discussions
711 Reads

PROTOCOLS

"Protocols are to communications what algorithms or programming languages are to computations."

Internet communication protocols are published by the Internet Engineering Task Force (IETF). The IEEE handles wired and wireless networking The International Organization for Standardization (ISO) other types. The ITU-T handles telecommunications protocols and formats for the public switched telephone network (PSTN). As the PSTN and Internet converge, the standards are also being driven towards convergence.

 

In modern protocol design, protocols are "layered". Layering is a design principle which divides the protocol design into a number of smaller parts, each of which accomplishes a particular sub-task, and interacts with the other parts of the protocol only in a small number of well-defined ways.

 

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.

 

Comments ()


Sign in

Read Next

Understanding - Proof of Work!

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

What is Packet Filtering?

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

An Overview of Virtual Machines

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Virtual Memory

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Business Engineering

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Financial Fraud Detection

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

All you need to know about Website Traffic

Blog banner

Deadlock and Starvation

Blog banner

MySQL

Blog banner

OS- Assignnment 1

Blog banner

You'll get to know about Pankaj Negi

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Modern Operating System

Blog banner

DURGA POOJA

Blog banner

Paging

Blog banner

semaphores

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Memory Management

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

PROCESS STATE:

Blog banner

Processing Crime and Incident Scenes

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Evolution of the Microprocesor

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Synchronization

Blog banner

HTML vs HTML5

Blog banner

Kafka - A Framework

Blog banner

Getting started with Android Studio

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Types of threads

Blog banner

Different Types of Data

Blog banner

Steganography

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner