Network Protocols
Network Protocols
CMP 414
Network Protocol
A network protocol is a set of established rules that specify how to format, send and
receive data so that computer network endpoints, including computers, servers,
routers and virtual machines, can communicate despite differences in their
underlying infrastructures, designs or standards.
To successfully send and receive information, devices on both sides of a
communication exchange must accept and follow protocol conventions.
In network , support for protocols can be built into the software, hardware or both.
Without network protocols, computers and other devices would not know how to
engage with each other. As a result, except for specialty networks built around a
specific architecture, few networks would be able to function, and the internet as we
know it wouldn't exist. Virtually all network end users rely on network protocols for
connectivity.
How Network Protocols work: The OSI Model
Network protocols break larger processes into discrete, narrowly defined function
sends tasks across every level of the network. In the standard model, known as the
Open Systems Interconnection (OSI) model, one or more network protocols govern
activities at each layer in the telecommunication exchange. Lower layers deal with
data transport, while the upper layers in the OSI model deal with software and
applications.
To understand how network protocols function, it's crucial to understand the workings
of the seven layers of the OSI model:
The OSI Model
1. Physical layer. The physical layer is the initial layer that physically connects two interoperable systems. It
controls simplex or duplex modem transmissions and transfers data in bits. Additionally, it oversees the
hardware that connects the network interface card (NIC) to the network, including the wiring, cable
terminators, topography and voltage levels.
2. Data-link layer. The data. Link layer is responsible for the error-free delivery of data from one node to another
over the physical layer. It's also the firmware layer of the NIC. It puts datagrams together into frames and gives
each frame the start and stop flags. Additionally, it fixes issues brought on by broken, misplaced or duplicate
frames.
3. Network layer. The network layer is concerned with information flow regulation, switching and routing
between workstations. Additionally, it divides up datagrams from the transport layer into error-free and
smaller datagrams.
4. Transport layer. The transport layer transfers services from the network layer to the application layer and
breaks down data into data frames for error checking at the network segment level. This also ensures that a fast
host on a network doesn't overtake a slower one. Essentially, the transport layer ensures that the entire message
is delivered from beginning to end. It also confirms a successful data transmission and retransmitting of the
data if an error is discovered.
OSI Model Conti….
5. Session layer. The Session Layer establishes a connection between two workstations that need
to communicate. In addition to ensuring security, this layer oversees connection establishment,
session maintenance and
6. Presentation layer. The Presentation layer is also known as the translation layer because it
retrieves the data from the application layer and formats it for transmission over the network. It
addresses the proper representation of data, including the syntax and semantics of information.
The presentation layer is also in charge of managing file level security and transforming data to
network standards.
7. Application layer. The Application layer, which is the top layer of the network, oversees relaying
user application requests to lower levels. File transfer, email, remote login, data entry and other
common applications take place at this layer.
TCP/IP Model
Generally speaking, there are three types of protocols in networking: communication, such as Ethernet;
management, such as SMTP; and security, such as Secure Shell, or SSH.
Falling into these three broad categories are thousands of network protocols that uniformly handle an
extensive variety of defined tasks, including authentication, automation, correction, compression, error
handling, file retrieval, file transfer, link aggregation, routing, semantics, synchronization and syntax.
The following are the three types of protocols used in network communications:
1. Network communication protocols. The efficiency of a network is determined by the communication
protocols used. The formats and regulations that govern how data is exchanged between networks are
formally described by these protocols. This applies to both hardware and software and is a requirement
for communicating between computing systems and telecommunication systems. In addition to handling
syntax, synchronization and semantic requirements that both analog and digital communications must
meet to work, communication protocols also handle authentication and error detection. HTTP, UDP, TCP
and Internet Relay Chat are network communication protocols.
2. Network management protocols. To ensure steady communication and optimal performance throughout
the network, network management protocols help specify the policies and processes needed to monitor,
administer and maintain a computer network. They also assist in communicating these demands across
the network. Simple Network Management Protocol (SNMP) and ICMP are network management
protocols.
Types of Network Protocols Conti…
Network security protocols. The primary responsibility of network
security protocols is to ensure that the data in transit over the network
connections are kept safe and secure. These protocols also specify how
the network protects data from any unauthorized efforts to inspect or
extract it. This ensures that unauthorized users, services or devices don't
have access to the network. Protocols such as Secure Sockets Layer
(SSL), Secure FTP and HTTP Secure HTTPS operate at this level.