Network Protocols ODeL
Network Protocols ODeL
Lesson Objectives
By the end of the lesson, the leaner should be able to:
- Explain the term network protocol
- Describe the proprietary and open-source/ standard protocol
- Distinguish between proprietary and open-source/ standard protocol
Definition: Protocol
Protocol, in computer science, a set of rules or procedures for transmitting data
between electronic devices, such as computers. In order for computers to exchange
information, there must be a preexisting agreement as to how the information will be
structured and how each side will send and receive it. Without a protocol, a
transmitting computer, for example, could be sending its data in 8-bit packets while
the receiving computer might expect the data in 16-bit packets. Protocols are
established by international or industrywide organizations.
“Protocols" are set of rules that help in governing the way a particular technology will
function for communication. In other words, it can be said that the protocols are digital
languages implemented in the form of networking algorithms.
1
Technical University of Mombasa
Similar to the way that speaking the same language simplifies communication
between two people, network protocols make it possible for devices to interact with
each other because of predetermined rules built into devices’ software and hardware.
Neither local area networks (LAN) nor wide area networks (WAN) could function the
way they do today without the use of network protocols.
While network protocol models generally work in similar ways, each protocol is
unique and operates in the specific way detailed by the organization that created it.
Every time you use the internet, you leverage network protocols. Though you may
not know how network protocols work or how frequently you encounter them, they
are necessary for using the internet or digital communications in any capacity.
Whether you know it or not, you’ve absolutely encountered network protocols when
using electronic devices – and some of them are readily identifiable. Network
protocols do not simply define how devices and processes work; they define how
devices and processes work together. Without these predetermined conventions and
rules, the internet would lack the necessary infrastructure it needs to be functional and
useable. Network protocols are the foundation of modern communications, without
which the digital world could not stand.
2
Technical University of Mombasa
There are thousands of different network protocols, but they all perform one of three
primary actions:
− Communication
− Network management
− Security
Each type is necessary to use network devices swiftly and safely, and they work
together to facilitate that usage.
a) Communication
Communication protocols allow different network devices to communicate with each
other. They are used in both analog and digital communications and can be used for
important processes, ranging from transferring files between devices to accessing the
internet.
b) Network Management
Network management protocols define and describe the various procedures needed
to effectively operate a computer network. These protocols affect various devices on a
single network — including computers, routers and servers — to ensure each one, and
the network as a whole, perform optimally.
3
Technical University of Mombasa
the strength of the connection and helps sustain the connection should one of
the links fail.
• Troubleshooting: Troubleshooting protocols allow network administrators to
identify errors affecting the network, evaluate the quality of the network
connection, and determine how administrators can fix any issues.
c) Security
Security protocols, also called cryptographic protocols, work to ensure that the
network and the data sent over it are protected from unauthorized users.
Common functions of security network protocols include the following:
• Encryption: Encryption protocols protect data and secure areas by requiring
users to input a secret key or password in order to access that information.
• Entity Authentication: Entity authentication protocols create a system that
requires different devices or users on a network to verify their identity before
accessing secure areas.
• Transportation: Transportation security protocols protect data while it is
transported from one network device to another.
Open Protocols are the kind of protocols that can be included in a wide range of device
types from any equipment vendor. What this means is that manufacturers that choose
4
Technical University of Mombasa
to adopt an open protocol want to achieve protocol interoperability when they design
their equipment's functionality and capabilities.
ii) You'll avoid vendor lock-in: Remote monitoring systems that use open protocols allow
for the network manager to choose between a wider selection of manufacturers who
supply devices that talk the same language to communicate with each other.
Open protocol systems can be maintained by companies other than the system
provider.
iii) Higher flexibility: Since a very large number of different devices support open
standard protocols, it's easier to make them work together.
Open protocol systems offer a higher degree of networking flexibility, with more
integration options between existing and new gear. This means that you can add new
devices (independent of vendor) into your existing network.
You can choose between a variety of different vendors for the monitoring solution that
best fits your needs - in terms of technical requirements and budget as well.
Definition: Proprietary
5
Technical University of Mombasa
Proprietary refers to property: things that are owned by individuals or businesses.
People talk about proprietary drugs, proprietary software, and other things that can
only be made and sold by those who discovered or created them. A proprietary claim
is usually protected by trademark or copyright. When you say you have a proprietary
right to something you're saying to everyone else: "Hands off! This is mine."
Normally, devices can communicate with one another without a problem when they
are from the same single manufacturer because they'll probably support the same
proprietary network. This means that proprietary protocols are owned and protected
by a determined company, and devices supporting this protocol can only
communicate with other equipment supporting the same protocol.
Proprietary protocols
Proprietary protocols are the ones designed and made by a single organization. They
are not open-source or free to use for anyone. Thus, proprietary protocol gives the
owner to change the protocol design and implementation and enforce restrictions on
the usage. Owners usually enforce restrictions through patents rights and trade secrets
and do not disclose the technical information behind the protocol.
Proprietary protocols are usually developed by a single company for the devices (or
Operating systems) which they manufacture. AppleTalk is a proprietary network
protocol developed by Apple Inc. AppleTalk protocol is an excellent protocol and
AppleTalk protocol works well in network environments made of Apple devices. But
other Operating System software vendors may not support the AppleTalk protocol.
Proprietary protocols will not scale well in network environments consisting of multi-
vendor Operating System software products or network devices.
Other proprietary protocol examples are SCAN protocol, Larse, and Granger.
ii) All the elements of their devices are perfectly compatible with each other: Opting for a
solution from a manufacturer of proprietary protocol systems will give you
components that have been designed to work together.
This means that all elements of their devices are perfectly compatible with each other,
since they are designed to use the same language of communication. If you plan to
deploy gear that uses only this same proprietary protocol, all of your system should
integrate smoothly.
6
Technical University of Mombasa
Disadvantages of proprietary protocol
i) Specific to a company: When you work with a proprietary protocol, it basically means
that your equipment is running on a unique protocol - used only by your specific
vendor. It makes it difficult to add devices from other vendors to your system later,
and you'll likely be restricted to this one supplier for support and purchase of future
products.
In other words, proprietary protocols lock costumers in and take away their freedom
of choice to expand their system with different vendors.
ii) Licensing fees: Proprietary protocols are usually perceived as traps. That's because
most proprietary systems require recurring license fees, so the costs add up.
Recurring fees involve paying some amount of money over some length of time. There
are different kinds of recurring fees. Some of them will require you to pay a moderate
initial purchase price and then you pay a smaller fee month by month, for as long as
you're using the system.
There are actually numerous kinds of recurring fee variations. There are even more
modern models where you don't pay anything upfront, but you're required to sign
control to pay some kind of monthly fee forever - as long as you want to use the
proprietary protocol.
This all means that you're tied for the duration of the contract and even after these
years if you decide to change to another system later.
Plus, you'll be dependent on only this company for maintenance, support, updates,
and upgrades. And you may endure poor service, slow response times, and ongoing
maintenance costs - after all, you depend on them to have your system up and
running.
You need to make sure you fully understand what you're committing to, and know
that your proprietary protocol vendor is not going to trap you in the future. Licensing
fees can have a huge impact on your budget, and it's important to calculate the true
cost of ownership for your remote monitoring system.
Note
Open-source protocols offer following advantage over proprietary protocols:
− Free to use by anyone
− Can be modified and deployed as needed
− Scalability and reduced cost of implementation
− Freedom to select any protocol that matches their technical and financial needs
− Freedom to integrate multiple vendor products in their system
− No annual fees and hidden costs
7
Technical University of Mombasa
− Ease of migration
The main difference between Proprietary Protocol and Standard Protocol is that
proprietary protocols are often developed by a single vendor to use in their products.
Standard protocols are published open standards, which any vendor can use in their
products.
Proprietary protocols are usually developed by a single company for the devices (or
Operating System) which they manufacture. AppleTalk is a proprietary network
protocol developed by Apple Inc. Appletalk protocol is an excellent protocol and
Appletalk protocol work well in network environments made of Apple devices. But
other Operating System software vendors may not support Appletalk protocol.
Proprietary protocols will not scale well in network environments consisting of multi-
vendor Operating System software products or network devices.
Standard protocols are agreed and accepted by the whole computing industry.
Standard protocols are not vendor specific. Standard protocols are often developed by
collaborative effort of experts from different organizations.
Examples of standard protocols are IP, TCP, UDP etc. RFC (Request for Comments) is
an IETF platform to develop Standard Protocols.
There are different networks and network protocols, user's use while surfing.
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
8
Technical University of Mombasa
ii. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly
used with TCP. The IP addresses in packets help in routing them through different
nodes in a network until it reaches the destination system. TCP/IP is the most popular
protocol connecting the networks.
iv. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
v. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute
outgoing E-Mail.
vi. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine
to another. Types of files may include program files, multimedia files, text files, and
documents, etc.
vii. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating links. These
links may be in any form like text or images. HTTP is designed on Client-server
principles which allow a client system for establishing a connection with the server
machine for making a request. The server acknowledges the request initiated by the
client and responds accordingly.
viii. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper
Text Transfer Protocol Secure is a standard protocol to secure the communication
among two computers one using the browser and other fetching data from web server.
HTTP is used for transferring data between the client browser (request) and the web
server (response) in the hypertext format, same in case of HTTPS except that the
transferring of data is done in an encrypted format. So it can be said that https thwart
hackers from interpretation or modification of data throughout the transfer of packets.
ix. Telnet: Telnet is a set of rules designed for connecting one system with another.
The connecting process here is termed as remote login. The system which requests for
connection is the local computer, and the system which accepts the connection is the
remote computer.
9
Technical University of Mombasa
xi. Secure Socket Shell (SSH): This protocol provides secure access to a computer, even
if it’s on an unsecured network. SSH is particularly useful for network administrators
who need to manage different systems remotely.
xii. Short Message Service (SMS): This communications protocol was created to send
and receive text messages over cellular networks. SMS refers exclusively to text-based
messages. Pictures, videos or other media require Multimedia Messaging Service
(MMS), an extension of the SMS protocol.
Some other popular protocols act as co-functioning protocols associated with these
primary protocols for core functioning. These are:
• ARP (Address Resolution Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• IMAP4 (Internet Message Access Protocol)
• SIP (Session Initiation Protocol)
• RTP (Real-Time Transport Protocol)
• RLP (Resource Location Protocol)
• RAP (Route Access Protocol)
• L2TP (Layer Two Tunnelling Protocol)
• PPTP (Point To Point Tunnelling Protocol)
• SNMP (Simple Network Management Protocol)
• TFTP (Trivial File Transfer Protocol)
It may sound like an open protocol would always be the preferable option. However,
it doesn't necessarily mean that proprietary protocols are bad, or that they can't be
your right choice. If you need the guarantee of optimum performance between your
devices, a proprietary protocol might offer that for you.
10