Personal tools

Network Protocols and Service Models

Interlaken_Switzerland_DSC_0246
(Interlaken, Switzerland - Alvin Wei-Cheng Wong)

 

Network Protocols

 

Network protocols incorporate all the processes, requirements and constraints of initiating and accomplishing communication between computers, servers, routers and other network-enabled devices. They must be confirmed and installed by the sender and receiver to ensure network/data communication and apply to software and hardware nodes that communicate on a network.
Network protocols are developed and published by several groups according to certain industry standards.

The most important ones include:

  • World Wide Web Consortium (W3C)
  • International Telecommunication Union (ITU)
  • International Organization for Standardization (ISO)
  • Internet Engineering Task Force (IETF)
  • The Institute of Electrical and Electronics Engineers (IEEE)


A protocol suite is a set of different network protocols that cooperate to exchange information and enable Internet connectivity across various layers. For example: the TCP/IP suite comprehends the Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Protocol (IP), and Hypertext Transfer Protocol (HTTP) or File Transfer Protocol (FTP). Each one of them allow the transmission of data between devices at the information packet level (mainly TCP, and UDP as well to add an additional layer of stability), Internet address level (IP), and display level (HTTP and FTP).

 

Broad Types of Networking Protocols

 

- Network Communication Protocols

Communication protocols allow basic data communication between network devices. Their purposes range from transferring files between computers or via the Internet, to exchange text-based messages, and establishing communication between routers and external or IoT devices.

Examples of communication protocols are: Bluetooth Protocols, FTP, TCP/IP, And HTTP.

 

- Network Security Protocols

Security protocols implement security over network communications by guaranteeing that data transferred over a network cannot be accessed by unauthorized users. Security is established through various means, such as via the use of passwords, authentication protocols, or data encryption. Data can be cryptographed and protected during transportation between devices, and access can be denied to unknown or unauthorized devices or users. 

Examples of security protocols include: HTTPS, SSL, SSH, And SFTP.

 

- Network Management Protocols

Network management protocols provide network governance and maintenance by defining the procedures required to operate a network. They are applied on all devices operating in a given network — such as servers, routers, and computers — to coordinate them in an efficient way. Network management protocols ensure that each device is connected to the others and to the network itself, and guarantee the stability of these connections. They are often used for troubleshooting purposes and to assess the quality of the network connection.

Examples of network management protocols include: SNMP, and ICMP.

 


[More to come ...]

 

Document Actions