Вы находитесь на странице: 1из 7

Network Protocol Foundation:

Protocol : Human intercommunication (in pairs or larger groups) requires rules of conversation (do not speak if someone else is speaking) to function effectively. If the two people talk at the same time then we get what is known (in networking terms) as data collision. Computers are no different. Therefore, we need regulations and rules to how we communicate over a computer network. or e!ample to remote login (telnet), T" or email. The set of rules and regulations is called a "rotocol. Protocol is a standard procedure and format that two data communication devices must understand, accept and use to #e a#le to talk to each other.. $ey %lements of a "rotocol &. 'ynta! a. (ata formats #. 'ignal levels ). 'emantics a. Control information #. %rror handling *. Timing a. 'peed matching #. 'equencing +ne of the most popular protocol suites is TCP/IP , which is the heart of Internetworking communications. Internet Protocol : The Internet "rotocol, is responsi#le for e!changing information #etween routers so that the routers can select the proper path for network traffic.Internet "rotocol (I") The Internet "rotocol is a network,layer protocol that contains addressing information and some control information that ena#les packets to #e routed . -long with the Transmission Control "rotocol (TC"), I" represents the heart of the Internet protocols. "roviding connectionless, #est,effort delivery of data through an internet work.

Transmission Control Protocol (TCP) . It is responsi#le to ensure the data packets are transmitted across the network relia#ly and error free. /-0 and 1-0 protocols are also critical protocols in the network communications.the Transmission Control "rotocol (TC") is one of the core protocols of the Internet protocol suite (I"), and is so common that the entire suite is often called TC"2I". TC" provides relia#le, ordered, error,checked delivery of a stream of octets #etween programs running on computers connected to a local area network, intranet or the pu#lic Internet. It resides at the transport layer. 1e# #rowsers use TC" when they connect to servers on the 1orld 1ide 1e#, and it is used to deliver email and transfer files from one location to another. -pplications that do not require the relia#ility of a TC" connection may instead use the connectionless 3ser (atagram "rotocol (3("), which emphasi4es low,overhead operation and reduced latency rather than error checking and delivery validation /-0 protocols suite is for the physical and data link layers communications over various /-0 media such as %thernet wires and wireless waves.

1-0 protocol suite is for the lowest three layers and defines communication over various wide,area media such as fi#er optic and ca#le. Hard ware Protocol are specifically used to configure and maintain hard ware devices.%ach manufacturer has developed #ased on I%%% standard.. Border gateway Protocol : 5order 6ateway "rotocol (56") is the protocol which is #acking the core routing decisions on the Internet. It maintains a ta#le of I" networks or prefi!es which designate network reach,a#ility among autonomous systems (-').It is descri#ed as a path vector protocol (which maintains the path information that gets updated dynamically) 56" is one of the most important protocols of the Internet.56" was created to replace the %!terior 6ateway "rotocol(%6") to allow 56" is used internally #etween the fully decentrali4ed routing. 6ateways to determine which gateway offers the #est route to a given destination network. Cisco Discovery Protocol: 1hen a Cisco device #oots up, C(" starts up automatically and allows the device to detect neigh#or devices that use C(".C(" allows two systems to learn a#out each other, even if they use different network layer protocols. he Cisco (iscovery "rotocol (C(") is a proprietary (ata /ink /ayer and 0etwork /ayer protocol developed #y Cisco 'ystems. It is used to share information a#out other directly connected Cisco equipment, such as the operating system version and I" address. C(" can also #e used for +n, (emand 7outing, which is a method of including routing information in C(" announcements so that dynamic routing protocols do not need to #e used in simple networks. Connection less network service: 'hort for Connection /ess 0etwork 'ervice, C/0' was developed #y I'+ and is part of +'I at /ayer *, and does not require a circuit #efore transmitting the packet. (packet is a segment of data sent from one computer or network device to another computer or network device over a network. - packet contains the source, destination, si4e, type, data, and other useful information that helps packet get to its destination and then read) Connectionless means does not set up connection with destination #efore sending packet. Hot stand y router Protocol:

HT7" "rovides fault tolerance and 5ackup and load sharing.The protocol esta#lishes a framework #etween network routers in order to achieve default gateway failover if the primary gateway #ecomes inaccessi#le in close association with a rapid,converging routing protocol.

!n"anced interior gateway /#outing Protocol $ %#P/!I%#P %I67" is an advanced distance,vector routing protocol that relies on features commonly associated with link,state protocols. (some times called a hy#rid routing protocol). 5ased on I67" and developed to allow easy transition from I67" to %I67" 0ote. The Hy#rid term sometimes misleads people into thinking %I67" has the topology #enefits of a link state routing protocol. It does not. %I67" is a distance vector routing protocol and suffers from all of the same disadvantages of any other distance vector routing protocol, i.e. routing loops &ulti'rotocol (a el )witc"ing *&P()) : 8ultiprotocol /a#el 'witching (8"/') is a standards,approved technology for speeding up network traffic flow and making it easier to manage. 8"/' involves setting up a specific path for a given sequence of packets, identified #y a la#el put in each packet, thus saving the time needed for a router to look up the address to the ne!t node to forward the packet to. 8"/' is called multiprotocol #ecause it works with the Internet "rotocol (I"), -synchronous Transport 8ode (-T8), and frame relay network protocols. 1ith reference to the standard model for a network (the +pen 'ystems Interconnection, or +'I model), 8"/' allows most packets to #e forwarded at the /ayer ) (switching) level rather than at the /ayer * (routing) level. In addition to moving traffic faster overall, 8"/' makes it easy to manage a network for quality of service (9o'). or these reasons, the technique is e!pected to #e readily adopted as networks #egin to carry more and different mi!tures of traffic. Intermediate )ystem to Intermediate )ystem , I)$I) : Intermediate 'ystem to Intermediate 'ystem (I',I') is a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this #y determining the #est route for datagrams through a packet,switched network. The protocol was defined in I'+2I%C &:;<=.)::) as an international standard within

the +pen 'ystems Interconnection (+'I) reference design. I',I' (pronounced >i,s i,s>) is an interior gateway protocol, designed for use within an administrative domain or network. This is in contrast to %!terior 6ateway "rotocols, primarily 5order 6ateway "rotocol (56"), which is used for routing #etween autonomous systems (7 C &=*:).I',I' is a link,state routing protocol, operating #y relia#ly flooding link state information throughout a network of routers. %ach I',I' router independently #uilds a data#ase of the network?s topology, aggregating the flooded network information.

+)PF , +'en )"ortest Pat" First It is Interior 6ateway "rotocol It does 7outs Information in an autonomous system.7outers maintain data#ase with link state information, weights computed using link state, I" address etc. This data#ase in each router is updated #y transmitting /ink 'tate -dvertisements throughout the autonomous system.- shortest path tree is constructed #y each router with itself as the root node and #ased on weights in the data#ase. #outing In-ormation 'rotocol: 7I" is a routing protocol for e!changing routing ta#le information #etween routers. 7outing updates must #e passed #etween routers so that they can make the proper choice on how to route a packet. %ach router sends all or part of its routing ta#le in routing updates. However, the updates are only sent to neigh#oring routers. The 7outing Information "rotocol (7I") is a distance,vector routing protocol, which employs the hop count as a routing metric. 7I" prevents routing loops #y implementing a limit on the num#er of hops allowed in a path from the source to a destination. The ma!imum num#er of hops allowed for 7I" is &; .uality o- )ervice *.+)) : I%T groups are working on proposals to provide 9+' control in I" networks, i.e., going #eyond #est effort to provide some assurance for 9+'. In the field of computer networking and other packet, switched telecommunication networks, the traffic engineering term refers to resource reservation control mechanisms rather than the achieved service quality. 9uality of service is the a#ility to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. or e!ample, a required #it rate, delay, @itter, packet dropping pro#a#ility and2or #it error rate may #e guaranteed. 9uality of

service guarantees are important if the network capacity is insufficient, especially for real,time streaming multimedia applications such as voice over I", online games and I",TA, since these often require fi!ed #it rate and are delay sensitive, and in networks where the capacity is a limited resource, for e!ample in cellular data communication. )o-tware Protocol: -pplication /ayer "rotocol . -pplication layer "rotocol strives for Interopera#ility , "recision , %!tensi#ility , %fficiency , 8inimality.

Hy'erte/t Trans-er Protocol *HTTP) : The Hyperte!t Transfer "rotocol (HTT") is an application protocol for distri#uted, colla#orative, hypermedia information systems.B&C HTT" is the foundation of data communication for the 1orld 1ide 1e# .Hyperte!t is structured te!t that uses logical links (hyperlinks) #etween nodes containing te!t. HTT" is the protocol to e!change or transfer hyperte!t. HTT" functions as a request,response protocol in the client,server computing model. - we# #rowser, for e!ample, may #e the client and an application running on a computer hosting a we# site may #e the server. The client su#mits an HTT" request message to the server. The server, which provides resources such as HT8/ files and other content, or performs other functions on #ehalf of the client, returns a response message to the client. The response contains completion status information a#out the request and may also contain requested content in its message #ody. - we# #rowser is an e!ample of a user agent (3-). +ther types of user agent include the inde!ing software used #y search providers (we# crawlers), voice #rowsers, mo#ile apps and other software that accesses, consumes or displays we# content. HTT" is designed to permit intermediate network elements to improve or ena#le communications #etween clients and servers. High,traffic we#sites often #enefit from we# cache servers that deliver content on #ehalf of upstream servers to improve response time. 1e# #rowsers cache previously accessed we# resources and reuse them when possi#le to reduce network traffic. File Trans-er Protocol *FTP) : It is a standard network protocol used to transfer files from one host to another host over a TC",#ased network, such as the Internet.

T" is #uilt on a client,server architecture and uses separate control and data connections #etween the client and the server. B&C T" users may authenticate themselves using a clear,te!t sign,in protocol, normally in the form of a username and password, #ut can connect anonymously if the server is configured to allow it. or secure transmission that hides (encrypts) the username and password, and encrypts the content, T" is often secured with ''/2T/' (> T"'>). ''H ile Transfer "rotocol (>' T">) is sometimes also used instead, #ut is technologically different. The first T" client applications were command,line applications developed #efore operating systems had graphical user interfaces, and are still shipped with most 1indows, 3ni!, and /inu! operating systems.B)CB*C (o4ens of T" clients and automation utilities have since #een developed for desktops, servers, mo#ile devices, and hardware, and T" has #een incorporated into hundreds of productivity applications, such as 1e# page editors.

)im'le &ail Trans-er Protocol *)&TP) : It is an Internet standard for electronic mail (e,mail) transmission across Internet "rotocol (I") networks. '8T" was first defined #y 7 C <)&. 1hile electronic mail servers and other mail transfer agents use '8T" to send and receive mail messages, user,level client mail applications typically use '8T" only for sending messages to a mail server for relaying. or receiving messages, client applications usually use either the "ost +ffice "rotocol ("+") or the Internet 8essage -ccess "rotocol (I8-") or a proprietary system (such as 8icrosoft %!change or /otus 0otes2(omino) to access their mail #o! accounts on a mail server.

Вам также может понравиться