SlideShare a Scribd company logo
1 of 13
Network Standard and
Protocol
Network Standard
International
Standard
Organizations
International
Standard
Organizations
cont.
Network Protocol
 A protocol is a set of rules and standards that basically define a language that
devices can use to communicate. There are a great number of protocols in use
extensively in networking, and they are often implemented in different layers.
 Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of
application layer protocols, built on these lower protocols, are HTTP (for accessing
web content), SSH, TLS/SSL, and FTP
Functions of the Network Protocol
How Network Protocols Work?
 Network protocols take large-scale processes and break them down into small,
specific tasks or functions. This occurs at every level of the network, and each
function must cooperate at each level to complete the larger task at hand. The
term protocol suite refers to a set of smaller network protocols working in
conjunction with each other.
 Network protocols are typically created according to industry standard by various
networking or information technology organizations.
List of Network Protocol
There are thousands of different network protocols, but they all perform one of three
primary actions:
 Communication
 Network management
 Security
Each type is necessary to use network devices swiftly and safely, and they work
together to facilitate that usage.
Communication
protocols that allow different network devices to communicate with each other. They are
in both analog and digital communications and can be used for important processes,
from transferring files between devices to accessing the internet.
 Automation: These protocols are used to automate different processes in both commercial and personal
settings, such as in smart buildings, cloud technology or self-driving vehicles.
 Instant messaging: Instantaneous, text-based communications on smartphones and computers occur
because of a number of different instant messaging network protocols.
 Routing: Routing protocols permit communication between routers and other network devices. There are
also routing protocols specifically for ad hoc networks.
 Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and computers — work due
to a variety of different Bluetooth protocols.
 File transfer: If you have ever moved files from one device to another, either via a physical or digital
medium, you’ve used file transfer protocols (FTP).
 Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the internet. The internet
could not operate as it currently does without IP
.
Network Management
These protocols affect various devices on a single network — including computers, routers
servers — to ensure each one, and the network as a whole, perform optimally.
 Connection: These protocols establish and maintain stable connections between different
devices on the same network.
 Link aggregation: Link aggregation protocols allow you to combine multiple network
connections into one link between two devices. This works to increase the strength of the
connection and helps sustain the connection should one of the links fail.
 Troubleshooting: Troubleshooting protocols allow network administrators to identify errors
affecting the network, evaluate the quality of the network connection, and determine how
administrators can fix any issues.
Security
Security protocols, also called cryptographic protocols, work to ensure that
the network and the data sent over it are protected from unauthorized
users.
 Encryption: Encryption protocols protect data and secure areas by requiring
users to input a secret key or password in order to access that information.
 Entity Authentication: Entity authentication protocols create a system that
requires different devices or users on a network to verify their identity before
accessing secure areas.
 Transportation: Transportation security protocols protect data while it is
transported from one network device to another.
Other examples of the most commonly
used network protocols:
 Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is
transmitted over the internet and determines how web servers and browsers
should respond to commands. This protocol (or its secure counterpart, HTTPS)
appears at the beginning of various URLs or web addresses online.
 Secure Socket Shell (SSH): This protocol provides secure access to a computer,
even if it’s on an unsecured network. SSH is particularly useful for network
administrators who need to manage different systems remotely.
 Short Message Service (SMS): This communications protocol was created to
send and receive text messages over cellular networks. SMS refers exclusively to
text-based messages. Pictures, videos or other media require Multimedia
Messaging Service (MMS), an extension of the SMS protocol.

More Related Content

Similar to PC 106 PPT-07

1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf
aravlitraders2012
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
willcoxjanay
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 

Similar to PC 106 PPT-07 (20)

Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Firewall
FirewallFirewall
Firewall
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
 
Computer Introduction-Lecture07
Computer Introduction-Lecture07Computer Introduction-Lecture07
Computer Introduction-Lecture07
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Giuzio angela
Giuzio angelaGiuzio angela
Giuzio angela
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Recently uploaded

Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
SaketCallGirlsCallUs
 
codes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptxcodes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptx
17duffyc
 
Call Girls In Chattarpur | Contact Me ☎ +91-9953040155
Call Girls In Chattarpur | Contact Me ☎ +91-9953040155Call Girls In Chattarpur | Contact Me ☎ +91-9953040155
Call Girls In Chattarpur | Contact Me ☎ +91-9953040155
SaketCallGirlsCallUs
 
Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...
Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...
Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...
delhimunirka15
 
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
delhimunirka15
 
Van Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todayVan Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson today
lucygibson17
 

Recently uploaded (20)

Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
Call Girls In Dilshad Garden | Contact Me ☎ +91-9953040155
 
HUMA Final Presentation About Chicano Culture
HUMA Final Presentation About Chicano CultureHUMA Final Presentation About Chicano Culture
HUMA Final Presentation About Chicano Culture
 
Jaunpur Escorts Service Girl ^ 9332606886, WhatsApp Anytime Jaunpur
Jaunpur Escorts Service Girl ^ 9332606886, WhatsApp Anytime JaunpurJaunpur Escorts Service Girl ^ 9332606886, WhatsApp Anytime Jaunpur
Jaunpur Escorts Service Girl ^ 9332606886, WhatsApp Anytime Jaunpur
 
WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...
WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...
WhatsApp Chat: 📞 8617370543 Call Girls In Siddharth Nagar At Low Cost Cash Pa...
 
Theoretical Framework- Explanation with Flow Chart.docx
Theoretical Framework- Explanation with Flow Chart.docxTheoretical Framework- Explanation with Flow Chart.docx
Theoretical Framework- Explanation with Flow Chart.docx
 
codes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptxcodes and conventions of film magazine and website.pptx
codes and conventions of film magazine and website.pptx
 
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
 
Call Girls In Chattarpur | Contact Me ☎ +91-9953040155
Call Girls In Chattarpur | Contact Me ☎ +91-9953040155Call Girls In Chattarpur | Contact Me ☎ +91-9953040155
Call Girls In Chattarpur | Contact Me ☎ +91-9953040155
 
Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...
Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...
Pari Chowk Call Girls ☎️ ((#9711106444)), 💘 Full enjoy Low rate girl💘 Genuine...
 
Nadiad call girls 📞 8617370543 At Low Cost Cash Payment Booking
Nadiad call girls 📞 8617370543 At Low Cost Cash Payment BookingNadiad call girls 📞 8617370543 At Low Cost Cash Payment Booking
Nadiad call girls 📞 8617370543 At Low Cost Cash Payment Booking
 
Jaro je tady - Spring is here (Judith) 3
Jaro je tady - Spring is here (Judith) 3Jaro je tady - Spring is here (Judith) 3
Jaro je tady - Spring is here (Judith) 3
 
Call Girls Veraval Just Call 8617370543Top Class Call Girl Service Available
Call Girls Veraval Just Call 8617370543Top Class Call Girl Service AvailableCall Girls Veraval Just Call 8617370543Top Class Call Girl Service Available
Call Girls Veraval Just Call 8617370543Top Class Call Girl Service Available
 
Jaro je tady - Spring is here (Judith) 4
Jaro je tady - Spring is here (Judith) 4Jaro je tady - Spring is here (Judith) 4
Jaro je tady - Spring is here (Judith) 4
 
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
 
New Call Girls In Shamli 8617370543 Shamli Escorts Service
New Call Girls In Shamli 8617370543 Shamli Escorts ServiceNew Call Girls In Shamli 8617370543 Shamli Escorts Service
New Call Girls In Shamli 8617370543 Shamli Escorts Service
 
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
9711106444 Ghaziabad, Call Girls @ ₹. 1500– Per Shot Per Night 7000 Delhi
 
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
 
Completed Event Presentation for Huma 1305
Completed Event Presentation for Huma 1305Completed Event Presentation for Huma 1305
Completed Event Presentation for Huma 1305
 
Van Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todayVan Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson today
 
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
 

PC 106 PPT-07

  • 3.
  • 6. Network Protocol  A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.  Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP
  • 7. Functions of the Network Protocol
  • 8. How Network Protocols Work?  Network protocols take large-scale processes and break them down into small, specific tasks or functions. This occurs at every level of the network, and each function must cooperate at each level to complete the larger task at hand. The term protocol suite refers to a set of smaller network protocols working in conjunction with each other.  Network protocols are typically created according to industry standard by various networking or information technology organizations.
  • 9. List of Network Protocol There are thousands of different network protocols, but they all perform one of three primary actions:  Communication  Network management  Security Each type is necessary to use network devices swiftly and safely, and they work together to facilitate that usage.
  • 10. Communication protocols that allow different network devices to communicate with each other. They are in both analog and digital communications and can be used for important processes, from transferring files between devices to accessing the internet.  Automation: These protocols are used to automate different processes in both commercial and personal settings, such as in smart buildings, cloud technology or self-driving vehicles.  Instant messaging: Instantaneous, text-based communications on smartphones and computers occur because of a number of different instant messaging network protocols.  Routing: Routing protocols permit communication between routers and other network devices. There are also routing protocols specifically for ad hoc networks.  Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and computers — work due to a variety of different Bluetooth protocols.  File transfer: If you have ever moved files from one device to another, either via a physical or digital medium, you’ve used file transfer protocols (FTP).  Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the internet. The internet could not operate as it currently does without IP .
  • 11. Network Management These protocols affect various devices on a single network — including computers, routers servers — to ensure each one, and the network as a whole, perform optimally.  Connection: These protocols establish and maintain stable connections between different devices on the same network.  Link aggregation: Link aggregation protocols allow you to combine multiple network connections into one link between two devices. This works to increase the strength of the connection and helps sustain the connection should one of the links fail.  Troubleshooting: Troubleshooting protocols allow network administrators to identify errors affecting the network, evaluate the quality of the network connection, and determine how administrators can fix any issues.
  • 12. Security Security protocols, also called cryptographic protocols, work to ensure that the network and the data sent over it are protected from unauthorized users.  Encryption: Encryption protocols protect data and secure areas by requiring users to input a secret key or password in order to access that information.  Entity Authentication: Entity authentication protocols create a system that requires different devices or users on a network to verify their identity before accessing secure areas.  Transportation: Transportation security protocols protect data while it is transported from one network device to another.
  • 13. Other examples of the most commonly used network protocols:  Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is transmitted over the internet and determines how web servers and browsers should respond to commands. This protocol (or its secure counterpart, HTTPS) appears at the beginning of various URLs or web addresses online.  Secure Socket Shell (SSH): This protocol provides secure access to a computer, even if it’s on an unsecured network. SSH is particularly useful for network administrators who need to manage different systems remotely.  Short Message Service (SMS): This communications protocol was created to send and receive text messages over cellular networks. SMS refers exclusively to text-based messages. Pictures, videos or other media require Multimedia Messaging Service (MMS), an extension of the SMS protocol.