Skip to main content

What is the protocol? Describe different types of protocols?

Protocol: A protocol is a set of rules by which a computer communicates with another computer. Protocol is also called by some as the language of network. That is, the accepted rules for proper communication between networked computers are called protocols


Introduction to Communication Protocol : A computer network connects numerous computers. System means computer, terminal, remote sensor or device that can receive data. Now the equipment may not be manufactured by the same manufacturing company. After data is sent from one system and flows through the network, the system must be built, the network established, and the software developed to be received accurately and intelligibly by the other system, but following the rules. If the software vendor companies develop software following the protocol, it will be possible to communicate between the computers of all the companies. After all, the protocol is a standard for establishing communication between the computer and the terminal.



List of Common Protocols:

The most commonly used protocol is TCP/IP. A brief description of some of the main ones is given below--

(i) TCP/IP Protocol (Transmission Control Protocol internet Protocol TCP/IP): TCP/IP is a standard protocol used for the Internet all over the world. Here TCP/IP these two protocols work together. IP Network or Internet indicates the name or address of the computer Logical Address and TCP arranges to send data according to that address.

(ii) Telnet This protocol is used to control remote servers in TCP/IP network systems. A normal user can change his password using this protocol.

(iii) File Transfer Protocol (FTP): Data is collected using this protocol in TCP/IP network system. It is a client-server protocol, which establishes two-way communication between server and client computers. Such communication is maintained by modems.

(iv) Hyper Text Transfer Protocol (HTTP): In TCP/IP network system, communication between web server and web client is established using this protocol. Using this protocol, the web document is presented to the web browser in an attractive way, consisting of elements such as text, graphics, images, sound etc. Originally HTTP was used as the standard protocol for the World Wide Web.

(v) Synchronous Data Link Control (SDLC): A control protocol developed by IBM Corporation to coordinate various types of integrated components.

(vi) Xerox Networking System (XNS) : A protocol used in Local Area Network LAN developed by Xerox Corporation.

(vii) X.25: A protocol used to establish or disconnect information types, correct or incorrect information exchange between multiple computers. A standard protocol used to establish international communication via e-mail.

(viii) X. 400: CCITT data exchange technique in computer networking process.

(ix) IPX/SPX (internetwork Packet Exchange-IPX/Sequenced Packet Exchange-SPX): A standard protocol for data exchange in computer networks.

Principles and Functions of Protocols in Networks. Principles of Protocol: Communication Protocol accomplishes the following tasks for any computer network for error-free and efficient data flow-


(i) Data Sequencing: The software should have a system to do Data Sequencing by converting big information into small blocks from one computer to another computer and making it serial and parallel mode as needed.

(ii) Data Routing: Information from one computer can be sent to many computers simultaneously.

(iii) Flow Control: To control the speed of data transfer between two computers, there must be a flow control system in the communication.

(iv) Error Control (Error Control): In the case of data transmission, there should be necessary measures to control errors such as transmission error, address error, data error, etc.

(v) Precedence & Order of Transmission: Data should be transmitted in the same sequence as it is received.

(vi) Connection Establishment: When two systems want to exchange data with each other, the communication protocol establishes the communication between the systems and also checks whether the communication is established correctly or not. Establishing a connection between two systems is organized in three stages. such as--

(a) Establishing the connection, (b) Transferring the data, (c) Disconnecting when the data transfer is complete.

(vii) Data Security: Accessing the network is very easy. Some systems are used as sources of valuable information. Only authorized customers will have access to the answer source. Protocol provides such security of data.

(viii) Log Information: After establishing a connection between two computers, the Server Dialog Box provides some information to the user that the computer is ready to receive data. This type of information is called log information.

Functions of the protocol in the network: The protocol that is used by any network software, i.e. the functions that the protocol completes, is called the function of the protocol. A software protocol performs the following functions. Their description is given below--

(i) Segmentation & Re-Assembly: The work of the protocol is to exchange steam between two entities. Generally, the process of converting the data into messages or blocks of a specific size by blocks of a certain size is called segmentation and the process of reassembling the segmented data is called re-assembly. Each message unit is called a protocol data unit.

(ii) Encapsulation: Each piece of data consists of controlling information. The process of adding control information to data is called encapsulation.

(iii) Connection Control: An entity can send data to another entity without any communication and prior permission. The process of sending such data is called connectionless data transfer. In this case, the protocol establishes the connection between the entities, controls it, transfers the data and breaks the connection after the transmission.

(iv) Order Delivery: If two communications are connected in a network then the PDF can reach the other entity without reaching the specific entity. In this case the protocol is responsible for delivering the PDF to the specified entity.

(v) Flow Control: This function is determined by the customer entity. If the speed of data exchange between the source and destination is not equal, the protocol has a mechanism to match the speed of data exchange between the two. Such an arrangement is called a flow control protocol.

(vi) Synchronization: As data is exchanged between two entities. That's why the entity. Simultaneous location of initialization, check point and termination etc. is important for equality between All these terms are called synchronization. The protocol performs this synchronization task.

(vii) Addressing: When transferring data between two entities, they must identify each other. Protocols usually take responsibility for identifying entities by name and number.

(ix) Multiplexing (Multiplexing): Multiplexing is the method of transferring multiple data from one place to another through a transmission medium. Protocols perform multiple levels of multiplexing between different entities.

(x) Transmission Services: The protocol provides various extras between different entities. such as--

(a) Priorities between different entities are determined through priority protocols.

(b) Grade of Service: In this case some specific class of data is used within the minimum Through Put.

(c) Security and protocols provide different types of security at system and user level.



Method of determining IP Address: Internet Address has two parts. The Internet address consisting of User ID and Domain is usually different characters. Actually the internet address is made up of different numbers. Local servers are identified internationally with that number. The numbers used by local servers are referred to as IP addresses. The IP address is usually used for data exchange. Generally, users receive and send information through an Internet address based on the IP address. IP addresses can be identified with numbers instead of different characters. For example, the IP address of s3ranjan@gmail.com is s3ranjan@203.190.1.2. That part of the internet address is called Domain Name System or DNS for short.

Comments

Popular posts from this blog

Unlocking Online Success: Why Justoctane SEO Services are the Best Choice for Businesses in Boca Raton, Florida.

Best Justoctane SEO Services Boca Raton in Florida Are you looking for the best SEO services in Boca Raton, Florida? Look no further than Justoctane SEO services. As a leading provider of SEO services, Justoctane has helped numerous businesses in the Boca Raton area achieve top rankings on search engine results pages. In this blog post, we will explore why Justoctane is the best choice for SEO services in Boca Raton. Experience and Expertise Justoctane has a team of experienced and highly skilled SEO professionals who have a deep understanding of search engine algorithms and the latest SEO techniques. Their expertise allows them to create customized SEO strategies that are tailored to the specific needs of each client. The Justoctane team has worked with businesses in various industries and niches, providing them with a wealth of knowledge and experience to draw from when creating effective SEO strategies. Comprehensive Services Justoctane offers a wide range of SEO services, incl

What is cryptocurrency? How Bitcoin Works ?

What is cryptocurrency? Cryptocurrency is a type of cryptocurrency; Which has no real form. It only exists in the internet world; Transactions using it are only possible online not offline. Whose entire activities are carried out in a secure process called cryptography; It is software based only, you can't touch even if you want to. Some shopping sites now offer cryptocurrency transactions. You can buy things from those sites using cryptocurrency. It is hoped that in the near future cryptocurrency will be used everywhere. How many types of cryptocurrencies are there? There are currently about 17,499+ types of cryptocurrencies on the market according to coinmarketcap.com . The most popular of these are: Bitcoin, Etherium, Lightcoin, etc .; Bitcoin is the world's first successful cryptocurrency. We will first calculate the total value of Bitcoin because it is simple. As of February 11, 2022, the value of all bitcoins in the world was  $851,455,626,804 USD , according to CoinMarke

কম্পিউটার আর্কিটেকচার কি? কম্পিউটার আর্কিটেকচার কয় প্রকার ও কী কী?

কম্পিউটার আর্কিটেকচার (Computer Architecture) কম্পিউটার ইঞ্জিনিয়ারিং-এ কম্পিউটার আর্কিটেকচার হচ্ছে কম্পিউটার সিস্টেমের কনসেপচুয়াল নকশা এবং কম্পিউটারের বেসিক অপারেশনের গঠন বিন্যাস। কম্পিউটার সিস্টেমে যে-সব বৈশিষ্ট্য প্রোগ্রামারের কাছে দৃশ্যমান অথবা প্রোগ্রামের লজিক্যাল এক্সিকিউশনের উপর যে-সব বৈশিষ্ট্যের সরাসরি প্রভাব আছে, তাকে কম্পিউটার আর্কিটেকচার বলে। উদাহরণস্বরূপ বলা যায় আর্কিটেকচারাল বৈশিষ্ট্যের মধ্যে আছে ইনস্ট্রাকশন সেট, বিভিন্ন ডাটাটাইপ রিপ্রেজেন্ট করতে ব্যবহৃত বিটের সংখ্যা, ইনপুট আউটপুট মেকানিজম এবং মেমরি অ্যাড্রেসিং-এর জন্য বিভিন্ন পদ্ধতি । কম্পিউটার আর্কিটেকচারের দুটি ধারা প্রচলিত আছে। একটি হলো হার্ভার্ড আর্কিটেকচার ও অপরটি ভন নিউম্যান বা প্রিন্সটন আর্কিটেকচার। আধুনিক কম্পিউটার আর্কিটেকচার (Modern Computer Architecture) আধুনিক কম্পিউটারের মৌলিক আর্কিটেকচার । হার্ভার্ড আর্কিটেকচার দ্বিতীয় বিশ্বযুদ্ধ চলাকালে হার্ভার্ড বিশ্ববিদ্যালয়ে এই আর্কিটেকচার নিয়ে গবেষণা করা হয়। হাওয়ার্ড আইকেন প্রথম এই আর্কিটেকচার প্রস্তাব করেন। দূরপাল্লার ক্ষেপণাস্ত্র নিয়ন্ত্রণে এই আর্কিটেকচার