What are Protocols?
The protocol is the
framework of rules required to transmit data between two devices. The protocol
describes the following:
1. Which type of error
checking is to be used.
2. The method of data
compression method, if any.
3. The method used by the
sending device to explain that the transmission has been completed.
Protocols determine the
manner in which computers are used to exchange messages and the format of the
message that is sent. It all depends on the particular task. These tasks can be
anything. Such as message exchange between networks, e-mail exchange,
establishing remote connection, file transfer, etc. Two networking models
support this. The first model is TCP / IP, a suite consisting of several
protocols (TCP / IP Suite). In this, each protocol works to solve a particular
communication problem. The second model is OST which is based on the
International Standard.
What is TCP / IP?
It is a suite of data
communication protocols. The name TCP and IP are just two of the many protocols
that make up this suite. Transmission Control Protocol (TCP) and Internet
Protocol (IP) are the names of the two most important protocols that are
included in the TCP / IP suite.
TCP / IP came into
existence in 1969 as a result of research conducted by the Department of
Defense (DOD) on the networking protocol. In 1968, the DOD Advanced Research
Projects ARPA began research on network technology that is now packet switching
agency. The focus of this research was to establish communication among the DOD
community. The name of this research, which initially formed a network, was
called ARPANET. As a gradual form of Internet, TCP / IP is of major importance
in the development of the Internet. The TCP / IP protocol was born in the early
1980s. Year was born. In 1983, he became the standard protocol for ARPANET.
Given the history of TCP/IP suite, they are often called Internet Protocol
Suite.
Internet Protocol:
IP is a connectionless
protocol which means that IP does not exchange control information to establish
a connection before data transfer, which is called handshake. Conversely, the
Connection Oriented protocol determines whether it has reached a state of receiving
data by exchanging control information before sending data to a remote
computer. When the handshake is successful, the connection is established. To
establish an IP connection depends on the protocols of the second layer if the
connection Oriented services are
required. IP also depends on the second layer protocol for error detection and
error recovery. IP is sometimes called an untrusted protocol, because. It does
not contain error detection or recovery code.
0 comments:
Post a Comment