SlideShare a Scribd company logo
1 of 2
Download to read offline
Network Protocol:
1) A Protocol is used for the communication between two or more machines.
2) We can even define the network protocol as, it is for the communication between two network
devices.
3) Network protocols include some mechanisms such as to identify the devices and make
connections with each other.
4) After the connection is obtained, data is packaged into messages are sent and received.
5) Some protocols even support message acknowledgement and data compression is used for
high-performance.
What is a network service:
1) A network service is an application.
2) This runs at application layer and above.
3) This is used in computer networking.
4) Network service provides data Storage, manipulation ,presentation , communication
5) This is implemented using client-server architecture or peer-to-peer architecture.
Service Interface:
1) This interface is used to implement a Service-Oriented Architecture(SOA).
2) This is implemented to achieve interoperability among the applications among various
technologies.
Solution
Network Protocol:
1) A Protocol is used for the communication between two or more machines.
2) We can even define the network protocol as, it is for the communication between two network
devices.
3) Network protocols include some mechanisms such as to identify the devices and make
connections with each other.
4) After the connection is obtained, data is packaged into messages are sent and received.
5) Some protocols even support message acknowledgement and data compression is used for
high-performance.
What is a network service:
1) A network service is an application.
2) This runs at application layer and above.
3) This is used in computer networking.
4) Network service provides data Storage, manipulation ,presentation , communication
5) This is implemented using client-server architecture or peer-to-peer architecture.
Service Interface:
1) This interface is used to implement a Service-Oriented Architecture(SOA).
2) This is implemented to achieve interoperability among the applications among various
technologies.

More Related Content

Similar to Network Protocol1) A Protocol is used for the communication betwe.pdf

Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
Arumugam90
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
PoojaBahirat1
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
Sohail Gohir
 

Similar to Network Protocol1) A Protocol is used for the communication betwe.pdf (20)

OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Internetworking
InternetworkingInternetworking
Internetworking
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
section 4.3.pptx
section 4.3.pptxsection 4.3.pptx
section 4.3.pptx
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
Osi model
Osi modelOsi model
Osi model
 
Computer networks chapter1.
Computer networks chapter1.Computer networks chapter1.
Computer networks chapter1.
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 

More from aquacareser

1) MODERN TIMES is a very well prepared movie that describes the mis.pdf
1) MODERN TIMES is a very well prepared movie that describes the mis.pdf1) MODERN TIMES is a very well prepared movie that describes the mis.pdf
1) MODERN TIMES is a very well prepared movie that describes the mis.pdf
aquacareser
 
1. Identify five differences between DNA replication and gene transc.pdf
1. Identify five differences between DNA replication and gene transc.pdf1. Identify five differences between DNA replication and gene transc.pdf
1. Identify five differences between DNA replication and gene transc.pdf
aquacareser
 
1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf
1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf
1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf
aquacareser
 
this is my code to count the frequency of words in a text file#.pdf
 this is my code to count the frequency of words in a text file#.pdf this is my code to count the frequency of words in a text file#.pdf
this is my code to count the frequency of words in a text file#.pdf
aquacareser
 
#In this project you will write a program play TicTacToe #using tw.pdf
#In this project you will write a program play TicTacToe #using tw.pdf#In this project you will write a program play TicTacToe #using tw.pdf
#In this project you will write a program play TicTacToe #using tw.pdf
aquacareser
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
aquacareser
 
We ca use HashSet data structure to remove duplicats from an array i.pdf
We ca use HashSet data structure to remove duplicats from an array i.pdfWe ca use HashSet data structure to remove duplicats from an array i.pdf
We ca use HashSet data structure to remove duplicats from an array i.pdf
aquacareser
 
The middle ear bones in mammals are derived from bones in the dentar.pdf
The middle ear bones in mammals are derived from bones in the dentar.pdfThe middle ear bones in mammals are derived from bones in the dentar.pdf
The middle ear bones in mammals are derived from bones in the dentar.pdf
aquacareser
 
There is an old saying “Do not put all eggs in one basket”WhyBe.pdf
There is an old saying “Do not put all eggs in one basket”WhyBe.pdfThere is an old saying “Do not put all eggs in one basket”WhyBe.pdf
There is an old saying “Do not put all eggs in one basket”WhyBe.pdf
aquacareser
 
The ER Model is focussed to be a description of real-world entities..pdf
The ER Model is focussed to be a description of real-world entities..pdfThe ER Model is focussed to be a description of real-world entities..pdf
The ER Model is focussed to be a description of real-world entities..pdf
aquacareser
 
Please find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdf
Please find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdfPlease find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdf
Please find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdf
aquacareser
 
Question 1 answer is A Global trade allows wealthy countries to use .pdf
Question 1 answer is A Global trade allows wealthy countries to use .pdfQuestion 1 answer is A Global trade allows wealthy countries to use .pdf
Question 1 answer is A Global trade allows wealthy countries to use .pdf
aquacareser
 
Precipitation hardening, or age hardening, provides one of the most .pdf
Precipitation hardening, or age hardening, provides one of the most .pdfPrecipitation hardening, or age hardening, provides one of the most .pdf
Precipitation hardening, or age hardening, provides one of the most .pdf
aquacareser
 
Protists are beneficial to the ecosystem in generating oxygen as the.pdf
Protists are beneficial to the ecosystem in generating oxygen as the.pdfProtists are beneficial to the ecosystem in generating oxygen as the.pdf
Protists are beneficial to the ecosystem in generating oxygen as the.pdf
aquacareser
 
P1.javaimport java.util.Scanner;keyboard inputting package pub.pdf
P1.javaimport java.util.Scanner;keyboard inputting package pub.pdfP1.javaimport java.util.Scanner;keyboard inputting package pub.pdf
P1.javaimport java.util.Scanner;keyboard inputting package pub.pdf
aquacareser
 
operating system linux,ubuntu,Mac#include iostream #include .pdf
operating system linux,ubuntu,Mac#include iostream #include .pdfoperating system linux,ubuntu,Mac#include iostream #include .pdf
operating system linux,ubuntu,Mac#include iostream #include .pdf
aquacareser
 

More from aquacareser (20)

1) MODERN TIMES is a very well prepared movie that describes the mis.pdf
1) MODERN TIMES is a very well prepared movie that describes the mis.pdf1) MODERN TIMES is a very well prepared movie that describes the mis.pdf
1) MODERN TIMES is a very well prepared movie that describes the mis.pdf
 
1. Identify five differences between DNA replication and gene transc.pdf
1. Identify five differences between DNA replication and gene transc.pdf1. Identify five differences between DNA replication and gene transc.pdf
1. Identify five differences between DNA replication and gene transc.pdf
 
1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf
1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf
1.1Yearcash flowpresent value of cash inflow = cash flow(1+r).pdf
 
this is my code to count the frequency of words in a text file#.pdf
 this is my code to count the frequency of words in a text file#.pdf this is my code to count the frequency of words in a text file#.pdf
this is my code to count the frequency of words in a text file#.pdf
 
The ice allows the refluxed materials to crystall.pdf
                     The ice allows the refluxed materials to crystall.pdf                     The ice allows the refluxed materials to crystall.pdf
The ice allows the refluxed materials to crystall.pdf
 
1. b2. c (bed bug)3. d (caterpillars)4. c (lyme disease)5. e.pdf
1. b2. c (bed bug)3. d (caterpillars)4. c (lyme disease)5. e.pdf1. b2. c (bed bug)3. d (caterpillars)4. c (lyme disease)5. e.pdf
1. b2. c (bed bug)3. d (caterpillars)4. c (lyme disease)5. e.pdf
 
#In this project you will write a program play TicTacToe #using tw.pdf
#In this project you will write a program play TicTacToe #using tw.pdf#In this project you will write a program play TicTacToe #using tw.pdf
#In this project you will write a program play TicTacToe #using tw.pdf
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
We ca use HashSet data structure to remove duplicats from an array i.pdf
We ca use HashSet data structure to remove duplicats from an array i.pdfWe ca use HashSet data structure to remove duplicats from an array i.pdf
We ca use HashSet data structure to remove duplicats from an array i.pdf
 
this eample is of t-test for comparing two meanshere mean1 = m.pdf
this eample is of t-test for comparing two meanshere mean1 = m.pdfthis eample is of t-test for comparing two meanshere mean1 = m.pdf
this eample is of t-test for comparing two meanshere mean1 = m.pdf
 
The middle ear bones in mammals are derived from bones in the dentar.pdf
The middle ear bones in mammals are derived from bones in the dentar.pdfThe middle ear bones in mammals are derived from bones in the dentar.pdf
The middle ear bones in mammals are derived from bones in the dentar.pdf
 
There is an old saying “Do not put all eggs in one basket”WhyBe.pdf
There is an old saying “Do not put all eggs in one basket”WhyBe.pdfThere is an old saying “Do not put all eggs in one basket”WhyBe.pdf
There is an old saying “Do not put all eggs in one basket”WhyBe.pdf
 
The ER Model is focussed to be a description of real-world entities..pdf
The ER Model is focussed to be a description of real-world entities..pdfThe ER Model is focussed to be a description of real-world entities..pdf
The ER Model is focussed to be a description of real-world entities..pdf
 
Please find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdf
Please find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdfPlease find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdf
Please find the answers belowAnswer 16 Option A (IEP). (IEP or i.pdf
 
Question 1 answer is A Global trade allows wealthy countries to use .pdf
Question 1 answer is A Global trade allows wealthy countries to use .pdfQuestion 1 answer is A Global trade allows wealthy countries to use .pdf
Question 1 answer is A Global trade allows wealthy countries to use .pdf
 
Precipitation hardening, or age hardening, provides one of the most .pdf
Precipitation hardening, or age hardening, provides one of the most .pdfPrecipitation hardening, or age hardening, provides one of the most .pdf
Precipitation hardening, or age hardening, provides one of the most .pdf
 
Protists are beneficial to the ecosystem in generating oxygen as the.pdf
Protists are beneficial to the ecosystem in generating oxygen as the.pdfProtists are beneficial to the ecosystem in generating oxygen as the.pdf
Protists are beneficial to the ecosystem in generating oxygen as the.pdf
 
Now a normal O2 molecule has 12 electrons in the valence shell so, O.pdf
Now a normal O2 molecule has 12 electrons in the valence shell so, O.pdfNow a normal O2 molecule has 12 electrons in the valence shell so, O.pdf
Now a normal O2 molecule has 12 electrons in the valence shell so, O.pdf
 
P1.javaimport java.util.Scanner;keyboard inputting package pub.pdf
P1.javaimport java.util.Scanner;keyboard inputting package pub.pdfP1.javaimport java.util.Scanner;keyboard inputting package pub.pdf
P1.javaimport java.util.Scanner;keyboard inputting package pub.pdf
 
operating system linux,ubuntu,Mac#include iostream #include .pdf
operating system linux,ubuntu,Mac#include iostream #include .pdfoperating system linux,ubuntu,Mac#include iostream #include .pdf
operating system linux,ubuntu,Mac#include iostream #include .pdf
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 

Network Protocol1) A Protocol is used for the communication betwe.pdf

  • 1. Network Protocol: 1) A Protocol is used for the communication between two or more machines. 2) We can even define the network protocol as, it is for the communication between two network devices. 3) Network protocols include some mechanisms such as to identify the devices and make connections with each other. 4) After the connection is obtained, data is packaged into messages are sent and received. 5) Some protocols even support message acknowledgement and data compression is used for high-performance. What is a network service: 1) A network service is an application. 2) This runs at application layer and above. 3) This is used in computer networking. 4) Network service provides data Storage, manipulation ,presentation , communication 5) This is implemented using client-server architecture or peer-to-peer architecture. Service Interface: 1) This interface is used to implement a Service-Oriented Architecture(SOA). 2) This is implemented to achieve interoperability among the applications among various technologies. Solution Network Protocol: 1) A Protocol is used for the communication between two or more machines. 2) We can even define the network protocol as, it is for the communication between two network devices. 3) Network protocols include some mechanisms such as to identify the devices and make connections with each other. 4) After the connection is obtained, data is packaged into messages are sent and received. 5) Some protocols even support message acknowledgement and data compression is used for high-performance. What is a network service: 1) A network service is an application. 2) This runs at application layer and above. 3) This is used in computer networking.
  • 2. 4) Network service provides data Storage, manipulation ,presentation , communication 5) This is implemented using client-server architecture or peer-to-peer architecture. Service Interface: 1) This interface is used to implement a Service-Oriented Architecture(SOA). 2) This is implemented to achieve interoperability among the applications among various technologies.