0% found this document useful (0 votes)
19 views16 pages

Protocols For Computer Networking

This document provides an overview of computer network protocols. It discusses the history of modern networking beginning with ARPANET in 1969. Network protocols allow connected devices to communicate by establishing common rules and languages. Examples of key protocols include TCP/IP, FTP, IP, HTTP and HTTPS. TCP/IP is a transport layer protocol that provides reliable data transmission. FTP enables file sharing. IP handles addressing and routing. HTTP is used for web content and HTTPS secures communication using TLS encryption. Overall, network protocols are essential for digital communication and have transformed how people connect globally.

Uploaded by

Rimi Trivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views16 pages

Protocols For Computer Networking

This document provides an overview of computer network protocols. It discusses the history of modern networking beginning with ARPANET in 1969. Network protocols allow connected devices to communicate by establishing common rules and languages. Examples of key protocols include TCP/IP, FTP, IP, HTTP and HTTPS. TCP/IP is a transport layer protocol that provides reliable data transmission. FTP enables file sharing. IP handles addressing and routing. HTTP is used for web content and HTTPS secures communication using TLS encryption. Overall, network protocols are essential for digital communication and have transformed how people connect globally.

Uploaded by

Rimi Trivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

PROTOCOLS FOR

COMPUTER
NETWORKING
INTRODUCTION

HISTORY

Agenda WHAT IS NETWORK


PROTOCOLS

REQUIREMENT OF
PROTCOLS

TYPES OF PROTOCOLS
Introduction
Network protocols are a set of rules
outlining how connected devices
communicate across a network to
exchange information easily and
safely. Protocols serve as a
common language for devices to
enable communication irrespective
of differences in software,
hardware, or internal processes.

3
HISTORY
• The history of modern computer networking technology goes back to
1969, when ARPANET (Advanced Research Projects Agency Network)
became the first connected computer network. It implemented the TCP/IP
protocol suite, which later became the Internet. ARPANET was developed
by the Advanced Research Projects Agency (ARPA), a subset of the US
Department of Defense
What is network protocols?

• A network protocol is an established set of rules that


determine how data is transmitted between different devices in
the same network. Essentially, it allows connected devices to
communicate with each other, regardless of any differences in
their internal processes, structure or design. Network protocols
are the reason you can easily communicate with people all
over the world, and thus play a critical role in modern digital
communications.

5
How Network Protocols Work
Network protocols take large-scale
processes and break them down into small,
specific tasks or functions. This occurs at
every level of the network, and each
function must cooperate at each level to
complete the larger task at hand. The term
protocol suite refers to a set of smaller
network protocols working in conjunction
with each other.
Network protocols are typically created
according to industry standard by various
networking or information technology
organizations.

6
IRWIN COREY

"Today we must all be aware that protocol


takes precedence over procedure."

7
Requirements for Network Protocol
• A good network protocolwill meet the following requirements −
• Addressing − A unique address is assigned (names can also be assigned to computers) to each
computer. This address is used in the communication packet.
• Data Exchange Format − Data should be formatted in well-defined packets and sent across the
network. Data packet header area contains the fields with relevance to the operation of the
protocol. Payload contains the message sent by the application running on the computers.
• Error Recovery − Error detection is must on networks where data corruption is possible.
Network protocols suggest the use of CRC to detect and recover network errors.
• Routing − When systems are not directly connected, intermediary systems forward messages to
the receiver. These are called routers.

8
Types of protocols FILE TRANSFER PROTOCOL
(FTP)

TRANSMISSION CONTROL
PROTOCOL (TCP)

INTERNET PROTOCOL (IP)

HYPER TEXT TRANSFER


HYPER TEXT TRANSFER PROTOCOL SECURE
PROTOCOL (HTTP) (HTTPS)
TCP/IP
Transmission Control Protocol/Internet Protocol
TCP IS A TRANSPORT LAYER PROTOCOL THAT PROVIDES A RELIABLE STREAM DELIVERY AND
VIRTUAL CONNECTION SERVICE TO APPLICATIONS THROUGH THE USE OF SEQUENCED
ACKNOWLEDGEMENT. TCP IS A CONNECTION-ORIENTED PROTOCOL, AS IT REQUIRES A
CONNECTION TO BE ESTABLISHED BETWEEN APPLICATIONS BEFORE DATA TRANSFER.
THROUGH FLOW CONTROL AND ACKNOWLEDGEMENT OF DATA, TCP PROVIDES EXTENSIVE
ERROR CHECKING. TCP ENSURES SEQUENCING OF DATA, MEANING THE DATA PACKETS
ARRIVE IN ORDER AT THE RECEIVING END. RETRANSMISSION OF LOST DATA PACKETS IS
ALSO FEASIBLE WITH TCP

ADVANTAGES
•TCP ensures three things: data reaches the destination,
reaches it on time, and reaches it without duplication.
•TCP AUTOMATICALLY BREAKS DATA INTO
PACKETS BEFORE TRANSMISSION.

20XX 10
File Transfer Protocol (FTP)
WHAT IS FTP ?????? ADVANTAGES
o File Transfer Protocol enables file
• Enables sharing large files and
sharing between hosts, both local and
remote, and runs on top of TCP. For
multiple directories at the same
file transfer, FTP creates two TCP time.
connections: control and data • Lets you resume file sharing if it
connection. The control connection is was interrupted.
used to transfer control information • Lets you recover lost data, and
like passwords, commands to retrieve schedule a file transfer.
and store files, etc., and the data
connection is used to transfer the
actual file. Both of these connections
run in parallel during the entire file
transfer process.

20XX presentation title 11


Internet Protocol (IP)
WHAT IS IP?????? ADVANTAGES
o IP is a network layer protocol that contains
addressing and control information, which • IP encrypts data to
helps packets be routed in a network. IP
works in tandem with TCP to deliver data ensure privacy and
packets across the network. Under IP, each security.
host is assigned a 32-bit address comprised
of two major parts: the network number and
• With IP, routing
host number. The network number identifies data becomes more
a network and is assigned by the internet,
while the host number identifies a host on scalable and
the network and is assigned by a network economical.
admin. The IP is only responsible for
delivering the packets, and TCP helps puts
them back in the right order.

20XX presentation title 12


Hyper Text Transfer Protocol (HTTP)
WHAT IS HTTP?????????? ADVANTAGES
o HTTP is an application layer
• Memory usage and
protocol used for distributed,
collaborative, and hypermedia CPU usage are low
information systems. It works on
a client-server model, where the
because of lesser
web browser acts as the client. concurrent
Data such as text, images, and
other multimedia files are shared
connections.
over the World Wide Web using • Errors can be reported
HTTP. As a request and response
type protocol, the client sends a
without closing
request to the server, which is connections.
then processed by the server
before sending a response back to
• Owing to lesser TCP
the client. connections, network
congestion is reduced.

20XX presentation title 13


HYPER TEXT TRANSFER SECURE
WHAT IS HTTPS???

o Hypertext Transfer o What protocol is HTTPS secured


Protocol Secure (HTTPS) by?
is a protocol that secures o HTTPS encrypts all data that
communication and data passes between the browser and
transfer between a user's server using an encryption
web browser and a protocol called Transport Layer
website. HTTPS is the Security (TLS), preceded by
secure version of HTTP. Secure Sockets Layer (SSL
The protocol protects
users against
eavesdroppers and man-
in-the-middle (MitM)
attacks.

20XX presentation title 14


summary
Although the older idea of the network is
usually foundational in almost all parts of
culture, Computer Networks and Protocols
possess permanently transformed the way
human beings work, perform and connect.
Forging strongly into parts of existence that
nobody had predicted, digital networking also
strengthens us in the future. New protocols and
requirements will emerge, new applications can
be developed, and our lifetimes will probably
be transformed and improved.​

20XX presentation title 15


thank you
VEDIKA BALANI
8TH C

You might also like