0% found this document useful (0 votes)
10 views

Protocol and Standard in Computer Networks

Protocol and Standard in Computer Networks

Uploaded by

jayamalapv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Protocol and Standard in Computer Networks

Protocol and Standard in Computer Networks

Uploaded by

jayamalapv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Protocol and Standard in Computer Networks

Last Updated : 13 Sep, 2024

Protocols and standards are important in computer networks. They are like the rules and guidelines
that allow different devices and systems to communicate and work together smoothly. Protocols
define how data is sent, received, and processed, while standards ensure that various technologies
are compatible with each other. This coordination is critical for the Internet and other networks to
function constantly and efficiently.

Network protocol ensures that different technologies and components of the network are
compatible with one another, reliable, and able to function together. In this article, we are going to
discuss every point about protocols and standards in computer networks.

What is Protocol?

A protocol is a set of rules that determines how data is sent and received over a network. The
protocol is just like a language that computers use to talk to each other, ensuring they understand
and can respond to each other’s messages correctly. Protocols help make sure that data moves
smoothly and securely between devices on a network.

To make communication successful between devices, some rules and procedures should be agreed
upon at the sending and receiving ends of the system. Such rules and procedures are called
Protocols. Different types of protocols are used for different types of communication.

Protocols

In the above diagrams, Protocols are shown as a set of rules. Communication between the Sender
and Receiver is not possible without Protocol.

Key Elements of Protocol


 Syntax: Syntax refers to the structure or the format of the data that gets exchanged between
the devices. Syntax of the message includes the type of data, composition of the message,
and sequencing of the message. The starting 8 bits of data are considered as the address of
the sender. The next 8 bits are considered to be the address of the receiver. The remaining
bits are considered as the message itself.

 Semantics: Semantics defines data transmitted between devices. It provides rules and norms
for understanding message or data element values and actions.

 Timing: Timing refers to the synchronization and coordination between devices while
transferring the data. Timing ensures at what time data should be sent and how fast data can
be sent. For example, If a sender sends 100 Mbps but the receiver can only handle 1 Mbps,
the receiver will overflow and lose data. Timing ensures preventing of data loss, collisions,
and other timing-related issues.

 Sequence Control: Sequence control ensures the proper ordering of data packets. The main
responsibility of sequence control is to acknowledge the data while it get received, and the
retransmission of lost data. Through this mechanism, the data is delivered in correct order.

 Flow Control: Flow control regulates device data delivery. It limits the sender’s data or asks
the receiver if it’s ready for more. Flow control prevents data congestion and loss.

 Error Control: Error control mechanisms detect and fix data transmission faults. They include
error detection codes, data resend, and error recovery. Error control detects and corrects
noise, interference, and other problems to maintain data integrity.

 Security : Network security protects data confidentiality, integrity, and authenticity. which
includes encryption, authentication, access control, and other security procedures. Network
communication’s privacy and trustworthiness are protected by security standards.

Types of Protocol

 Network Layer Protocols : Network layer protocols operate in the network layer which is
also known as the Layer 3 of the network architecture. Network layer protocols are
responsible for packet routing, forwarding, and addressing of data packets throughout the
network. IP and ICMP are the network layer protocols.

 Transport Layer Protocols: Transport layer protocols work in the transport layer which
provides end-to-end service ensuring data transfer across apps on different
devices. TCP and UDP are the most popular transport layer protocols.

 Application Layer Protocol: Application layer protocol working in the application layer of the
network architecture provides communication between applications running on different
devices. The application layer protocols enable cross-device communication. They format,
exchange, and interpret application data. HTTP, FTP, and SMTP are examples.

 Wireless Protocols: Wireless protocols basically used in wireless communication which


enables data transfer through wireless networks. Bluetooth, Wi-Fi, and LTE protocols are
examples.

 Routing Protocols: Routing protocol establishes the best/optimal network pathways


throughout the network for fastest data transmission. Routers share information to develop
and maintain routing tables. RIP, OSPF, and BGP are examples.
 Security Protocols : security protocol protects data confidentiality, integrity, and authenticity
while transmission of data over the network. They include SSL and TLS, encryption methods,
and authentication protocols for providing data security.

 Internet Protocols : IP identifies devices uniquely. Internet protocol provides data


communication through routing and forwarding data packets from one device to another by
unique addressing scheme.

Important Protocols Used in Computer Network

Here are some key protocols that are widely used in computer networks:

 TCP (Transmission Control Protocol): Ensures data is sent and received accurately by
breaking it into packets, sending them, and reassembling them at the destination.

 IP (Internet Protocol): Addresses and routes the packets to make sure they reach the right
destination.

 HTTP/HTTPS (HyperText Transfer Protocol/Secure): HTTP used for transferring web pages on
the internet. When you browse a website, your browser uses HTTP to request and display
web pages. And HTTPs is a secure version of HTTP that encrypts data to protect it from being
intercepted.

 FTP (File Transfer Protocol): Used for transferring files between computers on a network. It
allows users to upload and download files.SMTP (Simple Mail Transfer Protocol): Used for
sending emails. It transfers emails from a client to a server or between servers.

 DNS (Domain Name System): It is used to translates human-readable domain names (like
www.example.com) into IP addresses that computers use to identify each other on the
network.

 DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices


on a network, ensuring each device has a unique address.

 SSH (Secure Shell): Provides a secure way to access and manage devices over a network. It
encrypts the data, making it safe from eavesdropping.

 SNMP (Simple Network Management Protocol): Used for managing and monitoring
network devices like routers, switches, and servers. It collects and organizes information
about these devices

How are Protocols Used in Cyber Attacks?

Attackers can misuse the rules of how data is sent over the internet to cause problems for systems.
One common way they do this is through distributed denial-of-service (DDoS) attacks.

For example, in a SYN flood attack, attackers exploit the TCP protocol. Normally, a device sends a SYN
packet to a server to start a connection, and the server responds, expecting a final response to
complete the connection. Attackers send many SYN packets but never complete the connections.
This overloads the server, preventing it from working properly for real users.

Cloudflare offers solutions to stop these kinds of attacks. One of their services, Cloudflare Magic
Transit, protects against attacks targeting different levels of the network system. In the case of a SYN
flood attack, Cloudflare manages the TCP connections for the server, so the server doesn’t get
overwhelmed and can continue to serve real users.

What is Standards?

Standards are the set of rules for data communication that are needed for the exchange of
information among devices. It is important to follow Standards which are created by various
Standard Organizations like IEEE, ISO, ANSI, etc.

You might also like