Protocols. Protocol Set of rules that govern: Connection Communication data transfer Protocols regulate: access method allowed physical topologies types.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Networks and Telecommunications (on OLC)
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin APPENDIX B NETWORKS AND TELECOMMUNI CATIONS APPENDIX B NETWORKS.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Telecommunications & Networking. TELECOMMUNICATIONS: Communications (both voice and data) at a distance TELECOMMUNICATIONS: Communications (both voice.
 A system of computers and peripherals that are linked together  Purpose is usually to share files, resources, and peripherals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Networks Adapting Computers to Telecommunications Media.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
COMPUTER NETWORKS.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies.
In The Name Of Allah Whose Blessings Are Uncountable.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Laudon & Laudon: Canadian Edition
What is a Protocol? protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each.
Chapter 5 Networks Communicating and Sharing Resources
Networks and Telecommunications
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
                                       CIM6400 CTNW Lesson 9 – LAN Architectures & Networking Protocols and the OSI Model.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
Local Area Network By Bhupendra Ratha, Lecturer
Introduction network Protocol
PPTTEST 10/6/ :29 1 IT Ron Williams Business Innovation Through Information Technology Networking.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
1 Next Few Classes Networking basics Protection & Security.
Network Hardware and Software. What is a network? A network consists of two or more computers that are linked in order to: share resources (such as printers.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
Networking 101 TEE201. Table of Contents Gigabit Ethernet Where would a gigabit Ethernet protocol normally be used? What would you have to use to connect.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
Chapter2 Networking Fundamentals
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Understand the Components of a Network Mrs. Whaley.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
 A system of computers and peripherals that are linked together  Purpose is usually to share files, resources, and peripherals.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
NETWORKS. Example Web Browsing application Software Protocols involved Software NIC / Modem Hardware Telephone line / Co-axial cable / Air interface.
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2008 (November 4, 2008)
INTRODUCTION TO COMPUTER NETWORKS
Network Protocols.
Protocols.
Some bits on how it works
Introduction to Networking
NETWORKING TECHNOLOGIES (II)
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Protocols 2 Key Revision Points.
Presentation transcript:

Protocols

Protocol Set of rules that govern: Connection Communication data transfer Protocols regulate: access method allowed physical topologies types of cabling speed of data transfer

Internet Protocols http https SMTP ftp

Hypertext Transfer Protocol (HTTP) Protocol used by the World Wide Web Transfers displayable web pages Related web page files

Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) Additional encryption/authentication layer Used in security-sensitive communication payment transactions corporate logons Reasonable protection from eavesdroppers and attacks

Simple Mail Transfer Protocol (SMTP) Used for sending and receiving only.

File Transfer Protocol (FTP) Used to transfer data from one computer to another through a network, such as the Internet FTP client FTP server Does not depend on specific operating system

Network Protocol  Defines rules for communication between network devices  Send and receive messages in the form of packets  Designed for specific purposes and environments

Network Protocol…Cont’d The most common protocols are: Ethernet AppleTalk Token Ring FDDI

Ethernet Most widely used protocol Each computer listens to the cable before sending anything through the network Transmission waits for clear cable Collision when transmission sent at same time Transmission resubmitted Delay is minimal Allows for linear bus, star, or tree topologies Transmission speed of 10 Mbps

Fast Ethernet Increased speed to 100 Mbps Additional network devices and cables

AppleTalk Developed by Apple for Macintosh computers Allows for linear bus or star topologies Transmission speed is only 230 Kbps

Token Ring Developed by IBM in the mid-1980s. Signal travels around the network from one computer to another in a logical ring. Requires a star-wired ring Transmission speeds of 4 Mbps or 16 Mbps

Fiber Distributed Data Interface (FDDI) Interconnects two or more LANs, often over large distances Requires a dual ring topology Transmission speed of100 Mbps

Network Protocol Summary ProtocolSpeedTopology Ethernet10 MbpsLinear Bus, Star, or Tree Fast Ethernet100 MbpsStar AppleTalk230 KbpsLinear Bus, or Star Token Ring4 Mbps – 16 MbpsStar-wired Ring FDDI100 MbpsDual Ring

Communications Protocols Rules for efficiently transmitting data from one network node to another Divide messages into packets Affix addresses to packets Initiate transmission Regulate flow of data Check for transmission errors Acknowledge receipt of transmitted data