SlideShare uma empresa Scribd logo
1 de 22
University of Mysore
Dos in Library and Information Science
Seminar Topic:
“Network protocol”
Presented To,
Prof. Chandrashekar M.
Dos in LISc
Presented by,
Swamy nayaka C K
2nd year MLISc
Dos in LISc
Network Protocol
A protocol is a set of rules that governs the
communications between computers on a network.
These rules include guidelines that regulate the
following characteristics of a network: access method,
allowed physical topologies, types of cabling, and
speed of data transfer.
What is a Protocol?
 Protocol is a controlled sequence of messages that
is exchanged between two or more systems to
accomplish a given task.
 Protocol specifications define this sequence
together with the format or layout of the messages
that are exchanged.
Definition
 A communications protocol is a system of digital rules
for message exchange within or between computers.
Communicating systems use well-defined formats for
exchanging messages. Each message has an exact
meaning intended to provoke a particular response of
the receiver. ...
History
 The Internet protocol suite resulted from research and
development conducted by the Defense Advanced
Research Projects Agency (DARPA) in the late 1960s. After
initiating the pioneering ARPANET in 1969, DARPA started
work on a number of other data transmission technologies.
In 1972, Robert E. Kahn joined the DARPA Information
Processing Technology Office, where he worked on both
satellite packet networks and ground-based radio packet
networks, and recognized the value of being able to
communicate across both. In the spring of 1973, Vinton
Cerf, the developer of the existing ARPANET Network
Control Program (NCP) protocol, joined Kahn to work on
open-architecture interconnection models with the goal of
designing the next protocol generation for the ARPANET.
Protocol development
 For communication to take place, protocols have to be
agreed upon. Recall that in digital computing systems,
the rules can be expressed by algorithms and data
structures, raising the opportunity of hardware
independence. Expressing the algorithms in a portable
programming language, makes the protocol software
operating system independent. The source code could
be considered a protocol specification. This form of
specification, however is not suitable for the parties
involved.
Common types of protocols
The Internet Protocol is used in concert with other
protocols within the Internet Protocol Suite.
Prominent members of which include:
 Transmission Control Protocol (TCP)
 User Datagram Protocol (UDP)
 Internet Control Message Protocol (ICMP)
 Hypertext Transfer Protocol (HTTP)
 Post Office Protocol (POP)
 File Transfer Protocol (FTP)
 Internet Message Access Protocol (IMAP)
Types of Network Protocols
 Ethernet
 Local Talk
 Token Ring
 FDDI
 ATM
Ethernet
 The Ethernet protocol is by far the most widely used.
Ethernet uses an access method called CSMA/CD
(Carrier Sense Multiple Access/Collision Detection).
This is a system where each computer listens to the
cable before sending anything through the network.
Local Talk
 Local Talk is a network protocol that was
developed by Apple Computer, Inc. for Macintosh
computers. The method used by Local Talk is
called CSMA/CA (Carrier Sense Multiple Access
with Collision Avoidance). It is similar to
CSMA/CD except that a computer signals its intent
to transmit before it actually does so. Local Talk
adapters and special twisted pair cable can be used
to connect a series of computers through the serial
port.
Token Ring
 The Token Ring protocol was developed by IBM in the
mid-1980s. The access method used involves token-
passing. In Token Ring, the computers are connected
so that the signal travels around the network from one
computer to another in a logical ring. A single
electronic token moves around the ring from one
computer to the next.
FDDI
 Fiber Distributed Data Interface (FDDI) is a network
protocol that is used primarily to interconnect two or more
local area networks, often over large distances. The access
method used by FDDI involves token-passing. FDDI uses a
dual ring physical topology.
ATM
 Asynchronous Transfer Mode (ATM) is a network
protocol that transmits data at a speed of 155 Mbps
and higher. ATM works by transmitting all data in
small packets of a fixed size; whereas, other
protocols transfer variable length packets. ATM
supports a variety of media such as video, CD-
quality audio, and imaging. ATM employs a star
topology, which can work with fiber optic as well
as twisted pair cable.
Benefits
 Communicating over a network is a complicated task.
Different hardware elements in the network need to be
informed of the process in hand and instructed in their
role. Each element has its own requirements and a set
format for receiving instructions. Both the sender and
receiver must communicate in the same language and all
connecting hardware and software must be able to
exchange control information. The benefits of using
network protocols are that all these tasks have already
been mapped out by someone else, and they have
published their knowledge for others to share.
Needs
 Human intercommunication (in pairs or larger groups)
requires rules of conversation (do not speak if
someone else is speaking) to function effectively.
 Computers are no different. Consider the following
simplistic analogy:
 Therefore, we need regulations and rules to how we
communicate over a computer network. For example
to remote login (telnet), FTP or email.
 The set of rules and regulations is called a Protocol.
Functions
The function of protocols in a network and how each
protocol works in one or more layers of the open
systems interconnection (OSI) model, why protocols
are needed to enable computer communications, and
describe common protocol suites.
Objectives
 Appreciate the role of measurement in building and
maintaining high-performance TCP/IP networks
 Explain the types of tools available for performance
measurement
 Familiarize with freely available performance
measurement and testing tools
 Select an appropriate tool for a given task
Advantages
1. Many computers from all the world can connect
together, because they are using the international
standard.
2. Easier maintenance and installation because you get
used on the standard.
Disadvantages
1. Problems Occur in Standards, it will be international
problem.
2. All companies and manufactures must follow the
standards instead of developing new techniques.
CONCLUSION
While the age-old concept of the network is
foundational in virtually all areas of society, Computer
Networks and Protocols have forever changed the way
humans will work, play, and communicate. Forging
powerfully into areas of our lives that no one had
expected, digital networking is further empowering us
for the future. New protocols and standards will
emerge, new applications will be conceived, and our
lives will be further changed and enhanced.
Network protocol

Mais conteúdo relacionado

Mais procurados

TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPTDhivya T
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)Ridwanul Hoque
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingAnjan Mahanta
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 

Mais procurados (20)

TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
OSI Model
OSI ModelOSI Model
OSI Model
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
network hardware
network hardwarenetwork hardware
network hardware
 
Ethernet
EthernetEthernet
Ethernet
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

Destaque

Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and ProtocolSaif Muttair
 
Intro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less badIntro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less badHaris Amin
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocolsJaleel James
 
Web Technologies & CMS Market Share Trends
Web Technologies & CMS Market Share TrendsWeb Technologies & CMS Market Share Trends
Web Technologies & CMS Market Share TrendsInTriggerApp
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocolRishu Seth
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1nhepner
 
Social Networking and Social Workers-feb14
Social Networking and Social Workers-feb14Social Networking and Social Workers-feb14
Social Networking and Social Workers-feb14Sham Yemul
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 

Destaque (15)

Network protocol
Network protocolNetwork protocol
Network protocol
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
Intro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less badIntro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less bad
 
Dns
DnsDns
Dns
 
Stop And Wait
Stop And WaitStop And Wait
Stop And Wait
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Web Technologies & CMS Market Share Trends
Web Technologies & CMS Market Share TrendsWeb Technologies & CMS Market Share Trends
Web Technologies & CMS Market Share Trends
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
Social Networking and Social Workers-feb14
Social Networking and Social Workers-feb14Social Networking and Social Workers-feb14
Social Networking and Social Workers-feb14
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 

Semelhante a Network protocol

1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdfaravlitraders2012
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adiAdiseshaK
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer scienceAnushida1
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfTadeseBeyene
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptxTadeseBeyene
 

Semelhante a Network protocol (20)

1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Network protocol

  • 1. University of Mysore Dos in Library and Information Science Seminar Topic: “Network protocol” Presented To, Prof. Chandrashekar M. Dos in LISc Presented by, Swamy nayaka C K 2nd year MLISc Dos in LISc
  • 2. Network Protocol A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer.
  • 3. What is a Protocol?  Protocol is a controlled sequence of messages that is exchanged between two or more systems to accomplish a given task.  Protocol specifications define this sequence together with the format or layout of the messages that are exchanged.
  • 4. Definition  A communications protocol is a system of digital rules for message exchange within or between computers. Communicating systems use well-defined formats for exchanging messages. Each message has an exact meaning intended to provoke a particular response of the receiver. ...
  • 5. History  The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the late 1960s. After initiating the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET.
  • 6. Protocol development  For communication to take place, protocols have to be agreed upon. Recall that in digital computing systems, the rules can be expressed by algorithms and data structures, raising the opportunity of hardware independence. Expressing the algorithms in a portable programming language, makes the protocol software operating system independent. The source code could be considered a protocol specification. This form of specification, however is not suitable for the parties involved.
  • 7. Common types of protocols The Internet Protocol is used in concert with other protocols within the Internet Protocol Suite. Prominent members of which include:  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP)  Internet Control Message Protocol (ICMP)  Hypertext Transfer Protocol (HTTP)  Post Office Protocol (POP)  File Transfer Protocol (FTP)  Internet Message Access Protocol (IMAP)
  • 8. Types of Network Protocols  Ethernet  Local Talk  Token Ring  FDDI  ATM
  • 9. Ethernet  The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network.
  • 10. Local Talk  Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port.
  • 11. Token Ring  The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token- passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next.
  • 12. FDDI  Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology.
  • 13. ATM  Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD- quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.
  • 14. Benefits  Communicating over a network is a complicated task. Different hardware elements in the network need to be informed of the process in hand and instructed in their role. Each element has its own requirements and a set format for receiving instructions. Both the sender and receiver must communicate in the same language and all connecting hardware and software must be able to exchange control information. The benefits of using network protocols are that all these tasks have already been mapped out by someone else, and they have published their knowledge for others to share.
  • 15. Needs  Human intercommunication (in pairs or larger groups) requires rules of conversation (do not speak if someone else is speaking) to function effectively.  Computers are no different. Consider the following simplistic analogy:
  • 16.  Therefore, we need regulations and rules to how we communicate over a computer network. For example to remote login (telnet), FTP or email.  The set of rules and regulations is called a Protocol.
  • 17. Functions The function of protocols in a network and how each protocol works in one or more layers of the open systems interconnection (OSI) model, why protocols are needed to enable computer communications, and describe common protocol suites.
  • 18. Objectives  Appreciate the role of measurement in building and maintaining high-performance TCP/IP networks  Explain the types of tools available for performance measurement  Familiarize with freely available performance measurement and testing tools  Select an appropriate tool for a given task
  • 19. Advantages 1. Many computers from all the world can connect together, because they are using the international standard. 2. Easier maintenance and installation because you get used on the standard.
  • 20. Disadvantages 1. Problems Occur in Standards, it will be international problem. 2. All companies and manufactures must follow the standards instead of developing new techniques.
  • 21. CONCLUSION While the age-old concept of the network is foundational in virtually all areas of society, Computer Networks and Protocols have forever changed the way humans will work, play, and communicate. Forging powerfully into areas of our lives that no one had expected, digital networking is further empowering us for the future. New protocols and standards will emerge, new applications will be conceived, and our lives will be further changed and enhanced.