SlideShare a Scribd company logo
1 of 16
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Presentation on Protocols
Submitted by
Name - Shubham Mishra
R.N. – 154505
Semester – 7th
Mahatma Gandhi Chitrakoot Gramodaya University
Chitrakoot, Satna (M.P) -485334
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
 Protocol is a set of rules that determines how
the data transmitted over a network, such
as local area network, Internet, Intranet, etc.
 Protocols may be implemented on hardware,
software, or a combination of both.
 Protocol is set of mutually accepted and
implemented rules at both ends of the
communications channel.
 In simplified term, It is a digital language
through which we communicate with others on
the Internet.
What is Protocol
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
 Each protocol has its own method of how data is formatted when sent and what to
do with it once received, how that data is compressed, or how to check for errors in
the data.
 Hundreds of different computer network protocols have been developed each
designed for specific purposes and environments. Some Protocols are TCP/IP, HTTP,
FTP etc.
 Protocol is a communication standard that is followed by host in a network to
communicate with each other. A group of protocols designed to work together are
known as a protocol suite and when implemented in software they are a protocol
stack.
What is Protocol……..……..Continue
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
The ARPA (Advanced Research Project Agency) part of the US Defense program was the
first to introduce the concept of a standardized protocol. ARPA developed an integrated
network using packet protocol and is also renowned for its development of packet
switching.
Network devices can be physically connect but these can not communicate with
each other unless protocol is applied. A protocol technologies is required for
communication between computers or devices.
To connect different types of computers from a variety of computer vendors, protocols
must be first standardized and implemented in both computers.
Who developed Protocol and why ?
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Without protocols, devices would lack the ability to
understand the electronic signals over network
connections. Network protocols serve these basic
functions:
 Communication between application and other
software entities.
 Its objective to enable cooperation of devices on a
common task.
 Correct recipient(s) of data to the destination.
 Physically transmit data from source to destination,
with security protection and speed if needed.
 Receive messages and send responses
appropriately.
Need of Protocols
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Consider a comparison between
network protocols with how a
postal service handles physical
paper mail. Just as the postal
service manages letters from many
sources and destinations, so to do
network protocols keep data
flowing along many paths
continuously.
Need of Protocols………..…continue
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
• Internet Protocols - The internet protocol family
contains a set of related and among the most
widely used network protocols. Beside internet
protocol (IP) itself, higher-level protocols like TCP,
UDP, HTTP, and FTP all integrate with IP to provide
additional capabilities. Similarly, lower-level
internet protocols like ARP and ICMP also co-exist
with IP. In general, higher level protocols in the IP
family interact more closely with applications like
web browsers while lower-level protocols interact
with network adapters and other computer
hardware.
Types of Protocol
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
 Wireless Network Protocols - Thanks to wi-fi, Bluetooth
and LTE, wireless networks have become commonplace.
Network protocols designed for use on wireless
networks must support roaming mobile devices and deal
with issues such as variable data rates and network
security.
 Network Routing Protocols - Routing protocols are
special-purpose protocols designed specifically for use by
network routers on the internet. A routing protocol can
identify other routers, manage the pathways (called
routes) between sources and destinations of network
messages, and make dynamic routing decisions.
Common routing protocols include EIGRP, OSPF, and BGP.
Types of Protocol……..…..…Continue
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
A protocol is a set of rules that governs data
communication. It represents an agreement
between the communicating devices. Without a
protocol, two devices may be connected but not
communicating, just as a person speaking German
cannot be understood by a person who speaks
only Hindi.
Protocols are required to exchange messages
in or between computing systems and are
required in telecommunications. It is safe to say
that the internet we know today would not be
here without TCP.
Thinking about communication without Protocols
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Yes it is possible to communicate between two network with diffirent protocol. Two
networks with two different routing protocols can communicate using redistribution.
Keeping in mind that it requires the implementation of careful routing protocol
design and traffic optimization when using multi-protocol networks.
Suppose, we have multiple routing protocols on our network and we’ll need
some method to exchange routing information between the different protocols. This
is called Redistribution. Redistribution allows a network that uses one routing
protocol to route traffic dynamically based on information learned from another
routing protocol.
Communication with different routing protocols
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Some commonly used Protocols
TCP - Transmission control protocol is used for communication over a network. In TCP
data is broken down into small packets and then sent to the destination. However, IP is
making sure packets are transmitted to the right address.
FTP - File transfer protocol is basically used for transferring files to different networks.
There may be a mass of files such as text files, multimedia files, etc. This way of file
transfer is quicker than other methods.
IP - Internet Protocol is addressing protocol. It is always used together with TCP. IP
addresses of packet, routes them through different nodes and networks until it reaches
its final destination. TCP/IP is perhaps the most used standard protocol for connecting
computer networks.
DNS - Domain Name System is used in the performance of one simple task of converting
IP address to domain names that everyone can easily understand.
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
 HTTP – Hyper Text Transfer Protocol is based on
client and server model. HTTP is used for making a
connection between the web client and web server.
HTTP shows information in web pages.
 HTTPS - It is a secure version of Hyper Text Transfer
Protocol ( HTTP). The ‘S’ stands for Secure. It is a
method for ensuring secure communication between
a user’s browser and a web server. It is often
recognized as showing a green address bar or
padlock in the browser window to indicate a secure
connection.
 SMTP - Simple mail transfer protocol manages the
transmission and outgoing mail over the internet.
Some commonly used Protocols………....Continue
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
 POP - Post Office Protocol is used to receive incoming E-mail .
 IPA - Internet Address Protocol is the address that identifies a computer on a network
using TCP/IP. An IP address contains series of four numbers unique to the computer
concerned
Example : 90.399.424.34. This address is usually supplied by a Internet Service
Provider.
 Ethernet - Ethernet is a most important for LAN communication. Ethernet transmits
the data in digital packets. If any computer wants to use this protocol they should
contain Ethernet Network Interface Card (NIC). The card is implemented with unique
address code fixed in the microchip.
 DHCP - Dynamic Host Configuration Protocol is a kind of service used in the client and
server model.
Some commonly used Protocols………....Continue
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
 Gopher - Gopher is an application layer protocol, which is used for searching and
retrieving documents from remote sites. This is possible to start an online
connection with other computers through gopher.
 Telnet - Telnet is an established with some rules which are used to connect to
another computer. Telnet is mainly used for the remote login process. The computer
which is requesting for a connection that is a local computer and which is accepting
the connection that is a remote computer. If you give a command in a local
computer that command is executed in the remote computer. Telnet is also based
on client and server model.
 SNMP - Simple Network Management Protocol has the ability to monitor, configure
and control network devices.
Some commonly used Protocols………....Continue
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Protocols used in layers of OSI Model
Layers Name Protocols
Application Layer HTTP, FTP, SMTP, DNS, Telnet
Presentation Layer TIFF, GIF, PICT, JPEG, MPEG,
MIDI
Session Layer NFS, NCP, SMB
Transport Layer TCP, SPX, UDP
Network Layer IP, IPX, ATM, ICMP, IGMP, IPv4,
IPv6
Data Link Layer Ethernet, FDDI, HDLC, PPP, ATM
Physical Layer Ethernet, ISDN, FDDI
Faculty of Engineering and Technology
MGCG University Chitrakoot, Satna (M.P) -485334
Thankyou

More Related Content

What's hot (20)

Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Unit III
Unit IIIUnit III
Unit III
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
internet protocol
internet protocolinternet protocol
internet protocol
 
TCP / IP Services and Standards
TCP / IP Services and StandardsTCP / IP Services and Standards
TCP / IP Services and Standards
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 

Similar to Protocols

NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGramya marichamy
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfTadeseBeyene
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalashrawi92
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
La3 Tcp Ip
La3 Tcp IpLa3 Tcp Ip
La3 Tcp IpCma Mohd
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Edureka!
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptxTadeseBeyene
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxTeshome48
 

Similar to Protocols (20)

NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Mcse question
Mcse questionMcse question
Mcse question
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Url and protocol
Url and protocolUrl and protocol
Url and protocol
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
Firewall
FirewallFirewall
Firewall
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
La3 Tcp Ip
La3 Tcp IpLa3 Tcp Ip
La3 Tcp Ip
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Protocols

  • 1. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Presentation on Protocols Submitted by Name - Shubham Mishra R.N. – 154505 Semester – 7th Mahatma Gandhi Chitrakoot Gramodaya University Chitrakoot, Satna (M.P) -485334
  • 2. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334  Protocol is a set of rules that determines how the data transmitted over a network, such as local area network, Internet, Intranet, etc.  Protocols may be implemented on hardware, software, or a combination of both.  Protocol is set of mutually accepted and implemented rules at both ends of the communications channel.  In simplified term, It is a digital language through which we communicate with others on the Internet. What is Protocol
  • 3. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334  Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed, or how to check for errors in the data.  Hundreds of different computer network protocols have been developed each designed for specific purposes and environments. Some Protocols are TCP/IP, HTTP, FTP etc.  Protocol is a communication standard that is followed by host in a network to communicate with each other. A group of protocols designed to work together are known as a protocol suite and when implemented in software they are a protocol stack. What is Protocol……..……..Continue
  • 4. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 The ARPA (Advanced Research Project Agency) part of the US Defense program was the first to introduce the concept of a standardized protocol. ARPA developed an integrated network using packet protocol and is also renowned for its development of packet switching. Network devices can be physically connect but these can not communicate with each other unless protocol is applied. A protocol technologies is required for communication between computers or devices. To connect different types of computers from a variety of computer vendors, protocols must be first standardized and implemented in both computers. Who developed Protocol and why ?
  • 5. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Without protocols, devices would lack the ability to understand the electronic signals over network connections. Network protocols serve these basic functions:  Communication between application and other software entities.  Its objective to enable cooperation of devices on a common task.  Correct recipient(s) of data to the destination.  Physically transmit data from source to destination, with security protection and speed if needed.  Receive messages and send responses appropriately. Need of Protocols
  • 6. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Consider a comparison between network protocols with how a postal service handles physical paper mail. Just as the postal service manages letters from many sources and destinations, so to do network protocols keep data flowing along many paths continuously. Need of Protocols………..…continue
  • 7. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 • Internet Protocols - The internet protocol family contains a set of related and among the most widely used network protocols. Beside internet protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level internet protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like web browsers while lower-level protocols interact with network adapters and other computer hardware. Types of Protocol
  • 8. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334  Wireless Network Protocols - Thanks to wi-fi, Bluetooth and LTE, wireless networks have become commonplace. Network protocols designed for use on wireless networks must support roaming mobile devices and deal with issues such as variable data rates and network security.  Network Routing Protocols - Routing protocols are special-purpose protocols designed specifically for use by network routers on the internet. A routing protocol can identify other routers, manage the pathways (called routes) between sources and destinations of network messages, and make dynamic routing decisions. Common routing protocols include EIGRP, OSPF, and BGP. Types of Protocol……..…..…Continue
  • 9. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 A protocol is a set of rules that governs data communication. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person speaking German cannot be understood by a person who speaks only Hindi. Protocols are required to exchange messages in or between computing systems and are required in telecommunications. It is safe to say that the internet we know today would not be here without TCP. Thinking about communication without Protocols
  • 10. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Yes it is possible to communicate between two network with diffirent protocol. Two networks with two different routing protocols can communicate using redistribution. Keeping in mind that it requires the implementation of careful routing protocol design and traffic optimization when using multi-protocol networks. Suppose, we have multiple routing protocols on our network and we’ll need some method to exchange routing information between the different protocols. This is called Redistribution. Redistribution allows a network that uses one routing protocol to route traffic dynamically based on information learned from another routing protocol. Communication with different routing protocols
  • 11. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Some commonly used Protocols TCP - Transmission control protocol is used for communication over a network. In TCP data is broken down into small packets and then sent to the destination. However, IP is making sure packets are transmitted to the right address. FTP - File transfer protocol is basically used for transferring files to different networks. There may be a mass of files such as text files, multimedia files, etc. This way of file transfer is quicker than other methods. IP - Internet Protocol is addressing protocol. It is always used together with TCP. IP addresses of packet, routes them through different nodes and networks until it reaches its final destination. TCP/IP is perhaps the most used standard protocol for connecting computer networks. DNS - Domain Name System is used in the performance of one simple task of converting IP address to domain names that everyone can easily understand.
  • 12. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334  HTTP – Hyper Text Transfer Protocol is based on client and server model. HTTP is used for making a connection between the web client and web server. HTTP shows information in web pages.  HTTPS - It is a secure version of Hyper Text Transfer Protocol ( HTTP). The ‘S’ stands for Secure. It is a method for ensuring secure communication between a user’s browser and a web server. It is often recognized as showing a green address bar or padlock in the browser window to indicate a secure connection.  SMTP - Simple mail transfer protocol manages the transmission and outgoing mail over the internet. Some commonly used Protocols………....Continue
  • 13. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334  POP - Post Office Protocol is used to receive incoming E-mail .  IPA - Internet Address Protocol is the address that identifies a computer on a network using TCP/IP. An IP address contains series of four numbers unique to the computer concerned Example : 90.399.424.34. This address is usually supplied by a Internet Service Provider.  Ethernet - Ethernet is a most important for LAN communication. Ethernet transmits the data in digital packets. If any computer wants to use this protocol they should contain Ethernet Network Interface Card (NIC). The card is implemented with unique address code fixed in the microchip.  DHCP - Dynamic Host Configuration Protocol is a kind of service used in the client and server model. Some commonly used Protocols………....Continue
  • 14. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334  Gopher - Gopher is an application layer protocol, which is used for searching and retrieving documents from remote sites. This is possible to start an online connection with other computers through gopher.  Telnet - Telnet is an established with some rules which are used to connect to another computer. Telnet is mainly used for the remote login process. The computer which is requesting for a connection that is a local computer and which is accepting the connection that is a remote computer. If you give a command in a local computer that command is executed in the remote computer. Telnet is also based on client and server model.  SNMP - Simple Network Management Protocol has the ability to monitor, configure and control network devices. Some commonly used Protocols………....Continue
  • 15. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Protocols used in layers of OSI Model Layers Name Protocols Application Layer HTTP, FTP, SMTP, DNS, Telnet Presentation Layer TIFF, GIF, PICT, JPEG, MPEG, MIDI Session Layer NFS, NCP, SMB Transport Layer TCP, SPX, UDP Network Layer IP, IPX, ATM, ICMP, IGMP, IPv4, IPv6 Data Link Layer Ethernet, FDDI, HDLC, PPP, ATM Physical Layer Ethernet, ISDN, FDDI
  • 16. Faculty of Engineering and Technology MGCG University Chitrakoot, Satna (M.P) -485334 Thankyou