Newbie: Computer Network Protocol

Source: Internet
Author: User
Tags comparison table

To learn the protocol well, we should master the basic layers of the network structure. On this basis, we can clearly identify various computer network protocols. Now, let's talk about the concept of computer network protocol.

Computer Communication Networks are interconnected by many nodes with information exchange and processing capabilities. to make the entire network work in an orderly manner, each node must comply with rules related to the agreed data format in a timely order. These rules, conventions, or standards established to achieve network data exchange are referred to as computer network protocols. An agreement is an agreement or call rule designed by both parties to achieve communication. A protocol always refers to a certain level of protocol. To be precise, a set of communication rules and conventions is the layer protocol, such as the physical layer protocol, transport layer protocol, and application layer protocol.

It is a formal description of the rules that must be followed when data formats are exchanged with computers. Simply put, in order for computers in the network to communicate smoothly with each other, they must speak the same language. The language is equivalent to the Protocol. It can be divided into Ethernet, NetBEUI, ipx spx, and tcp ip.

Features

The Protocol has other features:

1. Everyone in the agreement must understand the agreement and know all the steps to be completed in advance.

2. Everyone in the agreement must agree and follow it.

3. the Protocol must be clear and each step must be clearly defined without misunderstanding.

A set of rules used in computer networks to specify the format of information and how to send and receive information are known as computer network protocols or communication protocols. The protocol can also be said to follow certain technical specifications that computers connected to the network must follow, as well as technical specifications on hardware, software, and ports.

A network is a place for information exchange. All computers connected to the network can exchange information through physical connections between devices, this kind of physical device includes the most common cables, optical cables, wireless WAP and microwave devices. However, simply having these physical devices cannot exchange information, this is like a human body cannot lack the control of the brain. Information exchange must also have a software environment. This "software environment" is a set of rules for human implementation. It is called a "protocol ", with the protocol, different computers can use physical devices in accordance with the same protocol, and do not cause mutual "incomprehension ".

This kind of protocol is very similar to the "moles Code". The simple 1.1 horizontal layout can be changed in a thousand ways after arrangement, but if there is no "comparison table ", no one can understand what the disorganized code says. The same is true for computers. They use various pre-defined protocols to accomplish different missions. For example, RFC1459 can implement communication between IRC servers and client computers. Therefore, both hackers and network administrators must learn the Protocol to understand the network operating mechanism.

Each protocol has been modified and used for many years, and most of the new protocols are established on the basis of the grass-roots protocols. Therefore, the Protocol has a relatively high security mechanism, it is difficult for hackers to find security problems in the protocol and initiate network attacks directly. However, some new Protocols may be exploited by hackers due to short time and considerate consideration.

For the discussion of computer network protocols, more people think that the grass-roots protocols currently used have security risks at the beginning of the design, No matter what changes the network makes, as long as the current network system does not undergo fundamental changes, the potential risks cannot be eliminated.

Data transmitted over the IP Internet is encapsulated as packets or packets. The unique feature of the IP protocol is that in the packet exchange network, the host does not need to establish a specific "path" with the target host that has not previously communicated before transmitting data ". Internet Protocol provides an "unreliable" data packet transmission mechanism, also known as "Best Effort"); that is, it does not guarantee accurate data transmission. When a packet arrives, it may be damaged, and its order is out of order compared to other packets transmitted together.) redundant packets may be generated or all of them are lost. If the application needs to ensure reliability, other methods are generally required, such as using the upper-Layer Protocol control of IP addresses.

Computer network protocols are generally composed of three parts: syntax, semantics, and timing.

The network transmission Protocol (collectively referred to as the communication Protocol) refers to the common language for computer communication. Currently, the most popular computer communication is network communication. Therefore, the "Transfer Protocol" generally refers to the transmission protocol for computer communication, such as TCP/IP and NetBEUI. However, the transfer protocol also exists in other computer forms of communication, such as communication between objects in the Surface object programming, and a transfer protocol is required for messages between different programs in the operating system, to ensure communication between both parties.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.