SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
University of Mysore
Dos in Library and Information Science
Seminar Topic:
“Network protocol”
Presented To,
Prof. Chandrashekar M.
Dos in LISc
Presented by,
Swamy nayaka C K
2nd year MLISc
Dos in LISc
Network Protocol
A protocol is a set of rules that governs the
communications between computers on a network.
These rules include guidelines that regulate the
following characteristics of a network: access method,
allowed physical topologies, types of cabling, and
speed of data transfer.
What is a Protocol?
 Protocol is a controlled sequence of messages that
is exchanged between two or more systems to
accomplish a given task.
 Protocol specifications define this sequence
together with the format or layout of the messages
that are exchanged.
Definition
 A communications protocol is a system of digital rules
for message exchange within or between computers.
Communicating systems use well-defined formats for
exchanging messages. Each message has an exact
meaning intended to provoke a particular response of
the receiver. ...
History
 The Internet protocol suite resulted from research and
development conducted by the Defense Advanced
Research Projects Agency (DARPA) in the late 1960s. After
initiating the pioneering ARPANET in 1969, DARPA started
work on a number of other data transmission technologies.
In 1972, Robert E. Kahn joined the DARPA Information
Processing Technology Office, where he worked on both
satellite packet networks and ground-based radio packet
networks, and recognized the value of being able to
communicate across both. In the spring of 1973, Vinton
Cerf, the developer of the existing ARPANET Network
Control Program (NCP) protocol, joined Kahn to work on
open-architecture interconnection models with the goal of
designing the next protocol generation for the ARPANET.
Protocol development
 For communication to take place, protocols have to be
agreed upon. Recall that in digital computing systems,
the rules can be expressed by algorithms and data
structures, raising the opportunity of hardware
independence. Expressing the algorithms in a portable
programming language, makes the protocol software
operating system independent. The source code could
be considered a protocol specification. This form of
specification, however is not suitable for the parties
involved.
Common types of protocols
The Internet Protocol is used in concert with other
protocols within the Internet Protocol Suite.
Prominent members of which include:
 Transmission Control Protocol (TCP)
 User Datagram Protocol (UDP)
 Internet Control Message Protocol (ICMP)
 Hypertext Transfer Protocol (HTTP)
 Post Office Protocol (POP)
 File Transfer Protocol (FTP)
 Internet Message Access Protocol (IMAP)
Types of Network Protocols
 Ethernet
 Local Talk
 Token Ring
 FDDI
 ATM
Ethernet
 The Ethernet protocol is by far the most widely used.
Ethernet uses an access method called CSMA/CD
(Carrier Sense Multiple Access/Collision Detection).
This is a system where each computer listens to the
cable before sending anything through the network.
Local Talk
 Local Talk is a network protocol that was
developed by Apple Computer, Inc. for Macintosh
computers. The method used by Local Talk is
called CSMA/CA (Carrier Sense Multiple Access
with Collision Avoidance). It is similar to
CSMA/CD except that a computer signals its intent
to transmit before it actually does so. Local Talk
adapters and special twisted pair cable can be used
to connect a series of computers through the serial
port.
Token Ring
 The Token Ring protocol was developed by IBM in the
mid-1980s. The access method used involves token-
passing. In Token Ring, the computers are connected
so that the signal travels around the network from one
computer to another in a logical ring. A single
electronic token moves around the ring from one
computer to the next.
FDDI
 Fiber Distributed Data Interface (FDDI) is a network
protocol that is used primarily to interconnect two or more
local area networks, often over large distances. The access
method used by FDDI involves token-passing. FDDI uses a
dual ring physical topology.
ATM
 Asynchronous Transfer Mode (ATM) is a network
protocol that transmits data at a speed of 155 Mbps
and higher. ATM works by transmitting all data in
small packets of a fixed size; whereas, other
protocols transfer variable length packets. ATM
supports a variety of media such as video, CD-
quality audio, and imaging. ATM employs a star
topology, which can work with fiber optic as well
as twisted pair cable.
Benefits
 Communicating over a network is a complicated task.
Different hardware elements in the network need to be
informed of the process in hand and instructed in their
role. Each element has its own requirements and a set
format for receiving instructions. Both the sender and
receiver must communicate in the same language and all
connecting hardware and software must be able to
exchange control information. The benefits of using
network protocols are that all these tasks have already
been mapped out by someone else, and they have
published their knowledge for others to share.
Needs
 Human intercommunication (in pairs or larger groups)
requires rules of conversation (do not speak if
someone else is speaking) to function effectively.
 Computers are no different. Consider the following
simplistic analogy:
 Therefore, we need regulations and rules to how we
communicate over a computer network. For example
to remote login (telnet), FTP or email.
 The set of rules and regulations is called a Protocol.
Functions
The function of protocols in a network and how each
protocol works in one or more layers of the open
systems interconnection (OSI) model, why protocols
are needed to enable computer communications, and
describe common protocol suites.
Objectives
 Appreciate the role of measurement in building and
maintaining high-performance TCP/IP networks
 Explain the types of tools available for performance
measurement
 Familiarize with freely available performance
measurement and testing tools
 Select an appropriate tool for a given task
Advantages
1. Many computers from all the world can connect
together, because they are using the international
standard.
2. Easier maintenance and installation because you get
used on the standard.
Disadvantages
1. Problems Occur in Standards, it will be international
problem.
2. All companies and manufactures must follow the
standards instead of developing new techniques.
CONCLUSION
While the age-old concept of the network is
foundational in virtually all areas of society, Computer
Networks and Protocols have forever changed the way
humans will work, play, and communicate. Forging
powerfully into areas of our lives that no one had
expected, digital networking is further empowering us
for the future. New protocols and standards will
emerge, new applications will be conceived, and our
lives will be further changed and enhanced.
Network protocol

More Related Content

PPTX
Network protocals
PPTX
Network protocol
PPTX
Protocols
PPTX
Network protocols
PDF
Protocols and standards
PPT
8 network devices
PDF
UNIT 4 computer networking powerpoint presentation .pdf
PPTX
OSI model and TCP/IP model
Network protocals
Network protocol
Protocols
Network protocols
Protocols and standards
8 network devices
UNIT 4 computer networking powerpoint presentation .pdf
OSI model and TCP/IP model

What's hot (20)

PPT
PPTX
Media Access Control
PPTX
Transmission Control Protocol (TCP)
PPT
OSI 7 Layer Model
PPTX
IP addressing seminar ppt
PPTX
Osi model
PPTX
Application layer protocols
PPT
Domain name system
PPT
data-link layer protocols
PPT
Chapter 4 data link layer
PPTX
Computer Network - Network Layer
PPT
Transmission Modes in Computer Networks
PPTX
PPTX
Congestion control
PPTX
Wide Area Network (WAN)
PPT
PPT
Ip address and subnetting
DOCX
Transmission modes (simplex, duplex & half duplex)
PDF
Data Communication and Networking
PPTX
Mac addresses(media access control)
Media Access Control
Transmission Control Protocol (TCP)
OSI 7 Layer Model
IP addressing seminar ppt
Osi model
Application layer protocols
Domain name system
data-link layer protocols
Chapter 4 data link layer
Computer Network - Network Layer
Transmission Modes in Computer Networks
Congestion control
Wide Area Network (WAN)
Ip address and subnetting
Transmission modes (simplex, duplex & half duplex)
Data Communication and Networking
Mac addresses(media access control)
Ad

Viewers also liked (16)

PPT
NETWORK PROTOCOL
PPT
Network protocol
PDF
Network protocols
PPTX
Network and Protocol
PDF
Intro to Obj-C Design Patterns or Or how I learned to be less bad
PPT
PPTX
Stop And Wait
PPTX
Network standards & protocols
PPTX
Web Technologies & CMS Market Share Trends
PDF
Sliding window protocol
PPT
Network security and protocols
PPTX
Web technologies lesson 1
PPTX
Social Networking and Social Workers-feb14
PPSX
Flow Control
PPT
Internet control message protocol
PPTX
Stop-and-Wait ARQ Protocol
NETWORK PROTOCOL
Network protocol
Network protocols
Network and Protocol
Intro to Obj-C Design Patterns or Or how I learned to be less bad
Stop And Wait
Network standards & protocols
Web Technologies & CMS Market Share Trends
Sliding window protocol
Network security and protocols
Web technologies lesson 1
Social Networking and Social Workers-feb14
Flow Control
Internet control message protocol
Stop-and-Wait ARQ Protocol
Ad

Similar to Network protocol (20)

PPTX
Data Communication and Newtworking 1 .pptx
PPTX
Data Communication and Newtworking 1 .pptx
PPTX
КЛМ_Урок 1
PPTX
КЛМ_Урок 2
PPTX
Sept 2017 network standards and models
PDF
Computer Networks- Introduction and Data Link Layer
PPTX
Lesson 7
PDF
computer network introduction. psc notes . Assisant professor in cse.
PPTX
network.pptx
PPT
lecture1.ppt
PPT
Data Communication-1.ppt
PPT
lecture1.ppt
PPT
lecture1 (1).ppt
PDF
Networking Basic Refresh.pdf
PDF
Cs8591 Computer Networks
PPTX
Network_Protocals in IT fundamentals .pptx
PPT
Ccna introduction
PPTX
networkprotocalsslides-180518161126.pptx
PPTX
Computer networking
PPT
Class_notes_InternetTechnology
Data Communication and Newtworking 1 .pptx
Data Communication and Newtworking 1 .pptx
КЛМ_Урок 1
КЛМ_Урок 2
Sept 2017 network standards and models
Computer Networks- Introduction and Data Link Layer
Lesson 7
computer network introduction. psc notes . Assisant professor in cse.
network.pptx
lecture1.ppt
Data Communication-1.ppt
lecture1.ppt
lecture1 (1).ppt
Networking Basic Refresh.pdf
Cs8591 Computer Networks
Network_Protocals in IT fundamentals .pptx
Ccna introduction
networkprotocalsslides-180518161126.pptx
Computer networking
Class_notes_InternetTechnology

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Network protocol

  • 1. University of Mysore Dos in Library and Information Science Seminar Topic: “Network protocol” Presented To, Prof. Chandrashekar M. Dos in LISc Presented by, Swamy nayaka C K 2nd year MLISc Dos in LISc
  • 2. Network Protocol A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer.
  • 3. What is a Protocol?  Protocol is a controlled sequence of messages that is exchanged between two or more systems to accomplish a given task.  Protocol specifications define this sequence together with the format or layout of the messages that are exchanged.
  • 4. Definition  A communications protocol is a system of digital rules for message exchange within or between computers. Communicating systems use well-defined formats for exchanging messages. Each message has an exact meaning intended to provoke a particular response of the receiver. ...
  • 5. History  The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the late 1960s. After initiating the pioneering ARPANET in 1969, DARPA started work on a number of other data transmission technologies. In 1972, Robert E. Kahn joined the DARPA Information Processing Technology Office, where he worked on both satellite packet networks and ground-based radio packet networks, and recognized the value of being able to communicate across both. In the spring of 1973, Vinton Cerf, the developer of the existing ARPANET Network Control Program (NCP) protocol, joined Kahn to work on open-architecture interconnection models with the goal of designing the next protocol generation for the ARPANET.
  • 6. Protocol development  For communication to take place, protocols have to be agreed upon. Recall that in digital computing systems, the rules can be expressed by algorithms and data structures, raising the opportunity of hardware independence. Expressing the algorithms in a portable programming language, makes the protocol software operating system independent. The source code could be considered a protocol specification. This form of specification, however is not suitable for the parties involved.
  • 7. Common types of protocols The Internet Protocol is used in concert with other protocols within the Internet Protocol Suite. Prominent members of which include:  Transmission Control Protocol (TCP)  User Datagram Protocol (UDP)  Internet Control Message Protocol (ICMP)  Hypertext Transfer Protocol (HTTP)  Post Office Protocol (POP)  File Transfer Protocol (FTP)  Internet Message Access Protocol (IMAP)
  • 8. Types of Network Protocols  Ethernet  Local Talk  Token Ring  FDDI  ATM
  • 9. Ethernet  The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network.
  • 10. Local Talk  Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port.
  • 11. Token Ring  The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token- passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next.
  • 12. FDDI  Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology.
  • 13. ATM  Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD- quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.
  • 14. Benefits  Communicating over a network is a complicated task. Different hardware elements in the network need to be informed of the process in hand and instructed in their role. Each element has its own requirements and a set format for receiving instructions. Both the sender and receiver must communicate in the same language and all connecting hardware and software must be able to exchange control information. The benefits of using network protocols are that all these tasks have already been mapped out by someone else, and they have published their knowledge for others to share.
  • 15. Needs  Human intercommunication (in pairs or larger groups) requires rules of conversation (do not speak if someone else is speaking) to function effectively.  Computers are no different. Consider the following simplistic analogy:
  • 16.  Therefore, we need regulations and rules to how we communicate over a computer network. For example to remote login (telnet), FTP or email.  The set of rules and regulations is called a Protocol.
  • 17. Functions The function of protocols in a network and how each protocol works in one or more layers of the open systems interconnection (OSI) model, why protocols are needed to enable computer communications, and describe common protocol suites.
  • 18. Objectives  Appreciate the role of measurement in building and maintaining high-performance TCP/IP networks  Explain the types of tools available for performance measurement  Familiarize with freely available performance measurement and testing tools  Select an appropriate tool for a given task
  • 19. Advantages 1. Many computers from all the world can connect together, because they are using the international standard. 2. Easier maintenance and installation because you get used on the standard.
  • 20. Disadvantages 1. Problems Occur in Standards, it will be international problem. 2. All companies and manufactures must follow the standards instead of developing new techniques.
  • 21. CONCLUSION While the age-old concept of the network is foundational in virtually all areas of society, Computer Networks and Protocols have forever changed the way humans will work, play, and communicate. Forging powerfully into areas of our lives that no one had expected, digital networking is further empowering us for the future. New protocols and standards will emerge, new applications will be conceived, and our lives will be further changed and enhanced.