SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Seminor on
Network protocols
 Introduction
 history
 What is network protocols
 Requirements of protocols
 Functions of protocols
 Need of protocols
 Types of protocols
 Benefits of protocols
 conclusion
 computers use network protocols to
communicate in computer networks. There are
many network protocols in existence; TCP/IP
is a family of network protocols that are used
for the Internet.
 A network protocol is a standard written
down on a piece of paper (or, more precisely,
with a text editor in a computer). The
standards that are used for the Internet are
called Requests For Comment (RFC).
 The Internet base protocols and systems were
mainly devised in the 1970s and 1980s.
 TCP/IP describes a protocol which will work
on any sort of computer and operating system
for transportation of data across the internet
between different systems
 TCP/IP has proven to be remarkably robust,
but is very basic.
 The word protocol comes from the
Greek protocollon, meaning a leaf of paper glued to
a manuscript volume that describes the contents.
 Network Protocol is a set of rules that governs the
communications between computers on a network.
Network protocols are formal standards and
policies comprised of rules, procedures and
formats that define communication between two
or more devices over a network.
 Network protocols govern the end-to-end
processes of timely, secure and managed data or
network communication.
 Data formats for data exchange
 Flow control
 Routing
 Acknowledgements
 Loss of information
 Sequence control
 Identifies errors
 Applies compression techniques
 Decides on:
How to announce sent data
How to announce receive data
How to address data
How data is to be sent
 Protocols are needed for predetermined
understandings for communications
 It helps the smooth functioning of a
system,such contribution to a system may
benefit or offend you from where you stand
 TCP : Transmission Control Protocol
 HTTP : Hypertext Transfer Protocol
 FTP : File Transfer Protocol
 SMTP: Simple Mail Transfer Protocol
 UDP : User Datagram Protocol
 ICMP : Internet Control Message Protocol
 SCTP : Stream Control Transmission Protocol
 ARP : Address Resolution Protocol
 TCP/IP:
TCP/IP is a set of rules (protocols) governing
communications among all computers on the Internet.
TCP/IP was developed in 1978 and driven by Bob
Kahn and Vint Cerf.
TCP/IP is a combination of two separate protocols:
Transmission Control Protocol (TCP) and Internet
Protocol (IP).
The Transmission Control Protocol is responsible for
ensuring the reliable transmission of data across
Internet-connected networks.
TCP checks packets for errors and submits requests for
re-transmissions if any are found.
HTTP:
The Hypertext Transfer Protocol (HTTP) is
an application protocol for distributed,
collaborative, hypermedia information
systems.HTTP is the foundation of data
communication for the World Wide Web.
Development of HTTP was initiated by Tim
Berners-Lee at CERN in 1989
HTTP is an application layer protocol designed
within the framework of the Internet protocol
suite.
 FTP:
 File Transfer Protocol (FTP) is a standard
Internet protocol for transmitting files between
computers on the Internet
over TCP/IP connections.
 FTP is a client-server protocol that relies on two
communications channels between client and
server: a command channel for controlling the
conversation and a data channel for
transmitting file content.
 SMTP:
 Simple Mail Transfer Protocol is used to transport
mail. Simple Mail Transport Protocol is used on
the internet, it is not a transport layer protocol but
is an application layer protocol.
 UDP:
 - An unreliable connection less protocol used to
control the management of application level
services between computers. It is used for
transport by some applications which must
provide their own reliability.
 ICMP:
 Internet control message protocol provides
management and error reporting to help
manage the process of sending data between
computers. (Management).
 ARP:
 Address Resolution Protocol enables the
packaging of IP data into ethernet packages. It
is the system and messaging protocol that is
used to find the ethernet (hardware) address
from a specific IP number
 POP:
 POP stands for Post Office Protocol. It is
generally used to support a single client. There
are several versions of POP but the POP 3 is the
current standard.
 POP is an application layer internet standard
protocol.
 POP does not allow search facility.
 It is not suitable for accessing non mail data.
 Some important benefits are;
 They provide the path to increase the network
connections
 Enhance the speed of the connection,
 Enhance the data transmission rate and
provide easy working to the users
 Computer Networks and Protocols have
forever changed the way humans will work,
play, and communicate.
 New protocols and standards will emerge, new
applications will be conceived, and our lives
will be further changed and enhanced.
Network protocals

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Basic components of a computer network
Basic components of a computer  networkBasic components of a computer  network
Basic components of a computer network
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
IP Address
IP AddressIP Address
IP Address
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Network topology
Network topologyNetwork topology
Network topology
 
Application Layer
Application Layer Application Layer
Application Layer
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 

Ähnlich wie Network protocals

Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer scienceAnushida1
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentationNoor Khalid
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IPfarhan516
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptxVivekTripathi684438
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxSamyakJain710491
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationKANNANKR12
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based pptIMEI
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxSunilNirmal9
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 

Ähnlich wie Network protocals (20)

Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Protocols
ProtocolsProtocols
Protocols
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
Ip
IpIp
Ip
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Hardware8
Hardware8Hardware8
Hardware8
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 

Mehr von reddivarihareesh (15)

Jquery
JqueryJquery
Jquery
 
Java script
Java scriptJava script
Java script
 
J servlets
J servletsJ servlets
J servlets
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Hibernate
HibernateHibernate
Hibernate
 
Hadoop
HadoopHadoop
Hadoop
 
Google glass
Google glassGoogle glass
Google glass
 
Firewall
FirewallFirewall
Firewall
 
Filezilla
FilezillaFilezilla
Filezilla
 
Cashcading stylesheets
Cashcading stylesheetsCashcading stylesheets
Cashcading stylesheets
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Blue brain
Blue brainBlue brain
Blue brain
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Apache
ApacheApache
Apache
 
Ajax
AjaxAjax
Ajax
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Network protocals

  • 2.  Introduction  history  What is network protocols  Requirements of protocols  Functions of protocols  Need of protocols  Types of protocols  Benefits of protocols  conclusion
  • 3.  computers use network protocols to communicate in computer networks. There are many network protocols in existence; TCP/IP is a family of network protocols that are used for the Internet.  A network protocol is a standard written down on a piece of paper (or, more precisely, with a text editor in a computer). The standards that are used for the Internet are called Requests For Comment (RFC).
  • 4.  The Internet base protocols and systems were mainly devised in the 1970s and 1980s.  TCP/IP describes a protocol which will work on any sort of computer and operating system for transportation of data across the internet between different systems  TCP/IP has proven to be remarkably robust, but is very basic.
  • 5.  The word protocol comes from the Greek protocollon, meaning a leaf of paper glued to a manuscript volume that describes the contents.  Network Protocol is a set of rules that governs the communications between computers on a network. Network protocols are formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network.  Network protocols govern the end-to-end processes of timely, secure and managed data or network communication.
  • 6.  Data formats for data exchange  Flow control  Routing  Acknowledgements  Loss of information  Sequence control
  • 7.  Identifies errors  Applies compression techniques  Decides on: How to announce sent data How to announce receive data How to address data How data is to be sent
  • 8.  Protocols are needed for predetermined understandings for communications  It helps the smooth functioning of a system,such contribution to a system may benefit or offend you from where you stand
  • 9.  TCP : Transmission Control Protocol  HTTP : Hypertext Transfer Protocol  FTP : File Transfer Protocol  SMTP: Simple Mail Transfer Protocol  UDP : User Datagram Protocol  ICMP : Internet Control Message Protocol  SCTP : Stream Control Transmission Protocol  ARP : Address Resolution Protocol
  • 10.  TCP/IP: TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet. TCP/IP was developed in 1978 and driven by Bob Kahn and Vint Cerf. TCP/IP is a combination of two separate protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). The Transmission Control Protocol is responsible for ensuring the reliable transmission of data across Internet-connected networks. TCP checks packets for errors and submits requests for re-transmissions if any are found.
  • 11. HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.HTTP is the foundation of data communication for the World Wide Web. Development of HTTP was initiated by Tim Berners-Lee at CERN in 1989 HTTP is an application layer protocol designed within the framework of the Internet protocol suite.
  • 12.  FTP:  File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections.  FTP is a client-server protocol that relies on two communications channels between client and server: a command channel for controlling the conversation and a data channel for transmitting file content.
  • 13.  SMTP:  Simple Mail Transfer Protocol is used to transport mail. Simple Mail Transport Protocol is used on the internet, it is not a transport layer protocol but is an application layer protocol.  UDP:  - An unreliable connection less protocol used to control the management of application level services between computers. It is used for transport by some applications which must provide their own reliability.
  • 14.  ICMP:  Internet control message protocol provides management and error reporting to help manage the process of sending data between computers. (Management).  ARP:  Address Resolution Protocol enables the packaging of IP data into ethernet packages. It is the system and messaging protocol that is used to find the ethernet (hardware) address from a specific IP number
  • 15.  POP:  POP stands for Post Office Protocol. It is generally used to support a single client. There are several versions of POP but the POP 3 is the current standard.  POP is an application layer internet standard protocol.  POP does not allow search facility.  It is not suitable for accessing non mail data.
  • 16.  Some important benefits are;  They provide the path to increase the network connections  Enhance the speed of the connection,  Enhance the data transmission rate and provide easy working to the users
  • 17.  Computer Networks and Protocols have forever changed the way humans will work, play, and communicate.  New protocols and standards will emerge, new applications will be conceived, and our lives will be further changed and enhanced.