Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Hardware8

655 views

Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Hardware8

  1. 1. P R O T O C O L
  2. 2. P R O T O C O L <ul><li>P R O T O C O L </li></ul><ul><li>A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network. The most common protocols are: </li></ul><ul><ul><ul><ul><li>Ethernet </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Local Talk </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Token Ring </li></ul></ul></ul></ul><ul><ul><ul><ul><li>FDDI </li></ul></ul></ul></ul><ul><ul><ul><ul><li>ATM </li></ul></ul></ul></ul>
  3. 3. <ul><li>ETHERNET </li></ul><ul><li>Ethernet protocol is by far the most widely used. </li></ul><ul><li>Ethernet uses an access method called CSMA/CD (Carrier </li></ul><ul><li>Sense Multiple Access/Collision Detection). </li></ul><ul><li>This is a system where each computer listens to the cable </li></ul><ul><li>before sending anything through the network. If the network </li></ul><ul><li>is clear, the computer will transmit. If some other node is </li></ul><ul><li>already transmitting on the cable, the computer will wait and </li></ul><ul><li>try again when the line is clear. </li></ul>P R O T O C O L
  4. 4. <ul><li>ETHERNET </li></ul><ul><li>If two computers attempt to transmit at the same instant, a </li></ul><ul><li>collision will occurs. Each computer then backs off and waits </li></ul><ul><li>a random amount of time before attempting to retransmit. </li></ul><ul><li>However, the delay caused by collisions and retransmitting </li></ul><ul><li>is very small and does not normally affect the speed of trans </li></ul><ul><li>-mission on the network. </li></ul><ul><li>The Ethernet protocol supports for bus, star, or tree </li></ul><ul><li>topologies. </li></ul><ul><li>Data can be transmitted over wireless access points, twisted </li></ul><ul><li>pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to </li></ul><ul><li>1000 Mbps. </li></ul>P R O T O C O L
  5. 5. <ul><li>FAST ETHERNET </li></ul><ul><li>It allow for an increased speed of transmission. </li></ul><ul><li>The Ethernet protocol has developed a new standard that </li></ul><ul><li>supports 100 Mbps. This is commonly called Fast Ethernet. </li></ul><ul><li>Fast Ethernet requires the use of different, more expensive </li></ul><ul><li>network concentrators/hubs and network interface cards. </li></ul><ul><li>Fast Ethernet requires category 5 twisted pair or fiber optic </li></ul><ul><li>cable is necessary. Fast Ethernet is becoming common in </li></ul><ul><li>LAN. </li></ul>P R O T O C O L
  6. 6. <ul><li>GIGABIT ETHERNET </li></ul><ul><li>The most recent development in the Ethernet standard is </li></ul><ul><li>a protocol that has a transmission speed of 1 Gbps. </li></ul><ul><li>Gigabit Ethernet is primarily used for backbones on a </li></ul><ul><li>network at this time. </li></ul><ul><li>In the future, it will probably be used for workstation and </li></ul><ul><li>server </li></ul><ul><li>It can be used with both fiber optic cabling and copper. </li></ul><ul><li>The 1000BaseTX, the copper cable used for Gigabit </li></ul><ul><li>Ethernet. </li></ul>P R O T O C O L
  7. 7. <ul><li>LOCALTALK </li></ul><ul><li>LOCALTALK is a network protocol that was developed by </li></ul><ul><li>Apple Computer, Inc. for Macintosh computers. </li></ul><ul><li>The method used by LOCALTALK is called CSMA/CA (Carrier </li></ul><ul><li>Sense Multiple Access with Collision Avoidance). </li></ul><ul><li>It is similar to CSMA/CD except that a computer signals its </li></ul><ul><li>intent to transmit before it actually does so. </li></ul><ul><li>LOCALTALK adapters and special twisted pair cable can be </li></ul><ul><li>used to connect a series of computers through the serial port. </li></ul>P R O T O C O L
  8. 8. <ul><li>LOCALTALK </li></ul><ul><li>The Macintosh operating system allows the establishment of </li></ul><ul><li>a peer-to-peer network without the need for additional </li></ul><ul><li>software. </li></ul><ul><li>In the addition of the server version of AppleShare software, </li></ul><ul><li>a client/server network can be established. </li></ul><ul><li>The LOCALTALK protocol support for linear bus, star, or tree </li></ul><ul><li>topologies using twisted pair cable. </li></ul><ul><li>A primary disadvantage of LOCALTALK is speed. Its speed of </li></ul><ul><li>transmission is only 230 Kbps. </li></ul>P R O T O C O L
  9. 9. P R O T O C O L <ul><li>TOKEN RING </li></ul><ul><li>The Token Ring protocol was developed by IBM in the </li></ul><ul><li>mid-1980s. The access method used involves token </li></ul><ul><li>passing. </li></ul><ul><li>In Token Ring, the computers are connected so that the </li></ul><ul><li>signal travels around the network from one computer to </li></ul><ul><li>another in a logical ring. </li></ul><ul><li>A single electronic token moves around the ring from one </li></ul><ul><li>computer to the next. </li></ul>
  10. 10. P R O T O C O L <ul><li>TOKEN RING </li></ul><ul><li>If a computer does not have information to transmit, it </li></ul><ul><li>simply passes the token on to the next workstation. If </li></ul><ul><li>a computer wishes to transmit and receives an empty </li></ul><ul><li>token, it attaches data to the token. </li></ul><ul><li>The token then proceeds around the ring until it comes to </li></ul><ul><li>the computer for which the data is meant. At this point, the </li></ul><ul><li>data is captured by the receiving computer. </li></ul><ul><li>The Token Ring protocol requires a star-wired ring using </li></ul><ul><li>twisted pair or fiber optic cable. </li></ul><ul><li>It can operate at transmission speeds of 4 Mbps or 16 Mbps. </li></ul><ul><li>Due to the increasing popularity of Ethernet, the use of </li></ul><ul><li>Token Ring in LAN environments has decreased. </li></ul>
  11. 11. <ul><li>F D D I - FIBER DISTRIBUTED DATA INTERFACE </li></ul><ul><li>Fiber Distributed Data Interface (FDDI) is a network protocol </li></ul><ul><li>that is used primarily to interconnect two or more local area </li></ul><ul><li>networks, often over large distances. </li></ul><ul><li>The access method used by FDDI involves token-passing. </li></ul><ul><li>FDDI uses a dual ring physical topology. </li></ul><ul><li>Transmission normally occurs on one of the rings; however, </li></ul><ul><li>if a break occurs, the system keeps information moving by </li></ul><ul><li>automatically using portions of the second ring to create a </li></ul><ul><li>new complete ring. </li></ul><ul><li>A major advantage of FDDI is speed. It operates over fiber </li></ul><ul><li>optic cable at 100 Mbps. </li></ul>P R O T O C O L
  12. 12. <ul><li>ATM - Asynchronous Transfer Mode </li></ul><ul><li>Asynchronous Transfer Mode (ATM) is a network protocol </li></ul><ul><li>that transmits data at a speed of 155 Mbps and higher. </li></ul><ul><li>ATM works by transmitting all data in small packets of a </li></ul><ul><li>fixed size; whereas, other protocols transfer variable length </li></ul><ul><li>packets. </li></ul><ul><li>ATM supports a variety of media such as video, CD-quality </li></ul><ul><li>audio, and imaging. </li></ul><ul><li>ATM supports a star topology, which can work with fiber </li></ul><ul><li>optic as well as twisted pair cable. </li></ul>P R O T O C O L
  13. 13. <ul><li>ATM - Asynchronous Transfer Mode </li></ul><ul><li>ATM is most often used to interconnect two or more local </li></ul><ul><li>area networks. </li></ul><ul><li>It is also frequently used by Internet Service Providers to </li></ul><ul><li>utilize high-speed access to the Internet for their clients. </li></ul><ul><li>ATM technology becomes more cost-effective, it will provide </li></ul><ul><li>another solution for constructing faster local area networks. </li></ul>P R O T O C O L
  14. 14. P R O T O C O L Linear Bus, Star, Tree 155 Mbps -2488 Mbps Twisted Pair, Fiber Optic ATM Dual ring 100 Mbps Fiber FDDI Star-Wired Ring 4 Mbps – 16 Mbps Twisted Pair Token Ring Linear Bus or Star 0.23 Mbps Twisted Pair LocalTalk Star 100 Mbps Twisted Pair, Fiber Optic Fast Ethernet Linear Bus, Star, Tree 10 Mbps Twisted Pair, Coaxial, Fiber Ethernet TOPOLOGY SPEED CABLE PROTOCOL
  15. 15. <ul><li>NETBEUI </li></ul><ul><li>NetBEUI stands for NetBIOS Extended User Interface and </li></ul><ul><li>can be used only in small networks. </li></ul><ul><li>It requires no address configuration and provides faster data </li></ul><ul><li>transfer than TCP/IP. </li></ul><ul><li>Each Windows computer in a NetBEUI network is configured </li></ul><ul><li>only with a computer and workgroup name. </li></ul><ul><li>NetBEUI’s cross-platform support is limited to </li></ul><ul><li>Windows and other Microsoft OS. </li></ul><ul><li>NetBEUI is not routable and not robust in unstable networks. </li></ul>P R O T O C O L
  16. 16. <ul><li>IPX, SPX  </li></ul><ul><li>IPX/SPX stands for internet work Packet Exchange / </li></ul><ul><li>Sequented Packet Exchange. </li></ul><ul><li>It is designed specifically for use with the Novell NetWare </li></ul><ul><li>Operating System. </li></ul><ul><li>It is routable and otherwise similar to TCP/IP, except that </li></ul><ul><li>it has limited cross-platform support and cannot be used on </li></ul><ul><li>the internet. </li></ul>P R O T O C O L
  17. 17. R I P The Routing Information Protocol (RIP) was one of the most commonly used interior gateway protocol (IGP) routing protocols on internal networks which helps routers dynamically adapt to changes of network connections by communicating information about which networks each router can reach and how far away those networks are. P R O T O C O L
  18. 18. P R O T O C O L <ul><li>FTP </li></ul><ul><li>The File Transfer Protocol ( FTP ) is a network protocol </li></ul><ul><li>used to transfer data from one computer to another through </li></ul><ul><li>a network, such as the Internet. </li></ul><ul><li>FTP is a file transfer protocol for exchanging and mani </li></ul><ul><li>-pulating files over any TCP-based computer network. </li></ul><ul><li>A FTP client may connect to a FTP server to manipulate </li></ul><ul><li>files on that server. FTP is a popular choice for exchanging </li></ul><ul><li>files independent of the operating systems involved. </li></ul>
  19. 19. <ul><li>HTTP </li></ul><ul><li>Hypertext Transfer Protocol ( HTTP ) is a communications </li></ul><ul><li>protocol for the transfer of information on the intranet and </li></ul><ul><li>the World Wide Web. </li></ul><ul><li>Its original purpose was to provide a way to publish and </li></ul><ul><li>retrieve hypertext pages over the Internet. </li></ul><ul><li>HTTP is a request/response standard between a client and </li></ul><ul><li>a server. A client is the end-user, the server is the web site. </li></ul><ul><li>The client making an HTTP request - using a web browser, </li></ul><ul><li>or other end-user tool is referred to as the user agent. </li></ul>P R O T O C O L
  20. 20. <ul><li>TELNET </li></ul><ul><li>TELNET ( TEL ecommunication NET work) is a network </li></ul><ul><li>protocol used on the Internet or local area network (LAN) </li></ul><ul><li>connections. </li></ul><ul><li>It was developed in 1969 beginning with RFC 15 and </li></ul><ul><li>standardized as IETF STD 8 , one of the first Internet </li></ul><ul><li>standards. </li></ul><ul><li>The term telnet also refers to software which implements the </li></ul><ul><li>client part of the protocol. </li></ul><ul><li>TELNET clients have been available on most Unix systems </li></ul><ul><li>for many years and are available for virtually all platforms. </li></ul>P R O T O C O L
  21. 21. P R O T O C O L S M T P Simple Mail Transfer Protocol ( SMTP ) is the de facto standard for e-mail transmissions across the Internet. SMTP is defined in RFC 821 (STD 10) as amended by RFC 1123 (STD 3). The protocol used today is also known as ESMTP and defined in RFC 2821 . It is very common for email software to use SMTP to send mail and POP3 to receive it, but SMTP can be used to receive mail.
  22. 22. P R O T O C O L <ul><li>S M T P </li></ul><ul><li>Simple Mail Transfer Protocol ( SMTP ) is the de facto </li></ul><ul><li>standard for e-mail transmissions across the Internet. </li></ul><ul><li>SMTP is defined in RFC 821 (STD 10) as amended by </li></ul><ul><li>RFC 1123 (STD 3). </li></ul><ul><li>The protocol used today is also known as ESMTP and </li></ul><ul><li>defined in RFC 2821 . </li></ul><ul><li>It is very common for email software to use SMTP to send </li></ul><ul><li>mail and POP3 to receive it, but SMTP can be used to </li></ul><ul><li>receive mail. </li></ul>
  23. 23. P R O T O C O L <ul><li>POP3 </li></ul><ul><li>The Post Office Protocol version 3 (POP3) is intended to </li></ul><ul><li>permit a workstation to dynamically access a mail drop on </li></ul><ul><li>a server host. </li></ul><ul><li>It is usually used to allow a workstation to retrieve mail that </li></ul><ul><li>the server is holding for it. </li></ul><ul><li>POP3 transmissions appear as data messages between </li></ul><ul><li>stations. The messages are either command or reply </li></ul><ul><li>messages. </li></ul>
  24. 24. P R O T O C O L <ul><li>DHCP </li></ul><ul><li>Dynamic Host Configuration Protocol ( DHCP ) is a </li></ul><ul><li>protocol used by networked devices ( clients ) to obtain </li></ul><ul><li>the parameters necessary for operation in an Internet </li></ul><ul><li>Protocol network. </li></ul><ul><li>This protocol reduces system administration workload, </li></ul><ul><li>allowing devices to be added to the network with little or </li></ul><ul><li>no manual configurations. </li></ul>
  25. 25. P R O T O C O L <ul><li>NTP </li></ul><ul><li>The Network Time Protocol (NTP) is a time synchronization </li></ul><ul><li>system for computer clocks through the Internet network. </li></ul><ul><li>It provides the mechanisms to synchronize time and coordi </li></ul><ul><li>-nate time distribution in a large, diverse internet operating </li></ul><ul><li>at rates from mundane to light wave. </li></ul><ul><li>It uses a returnable time design in which a distributed sub </li></ul><ul><li>network of time servers, operating in a self-organizing, </li></ul><ul><li>hierarchical master-slave configuration; synchronize logical </li></ul><ul><li>clocks within the sub network and to national time standards </li></ul><ul><li>via wire or radio. </li></ul>
  26. 26. P R O T O C O L <ul><li>PPP </li></ul><ul><li>Point-to-Point Protocol , or PPP , is a data link protocol </li></ul><ul><li>commonly used to establish a direct connection between </li></ul><ul><li>two nodes over serial cable, phone line, trunk line, cellular </li></ul><ul><li>telephone, specialized radio links, or fiber optic links. </li></ul>
  27. 27. P R O T O C O L

×