Seven key network protocols

Source: Internet
Author: User
Tags file transfer protocol ftp protocol

Network protocols are the foundation of the Internet. Therefore, we need to understand network protocols in many ways and from multiple perspectives. Because of the large number of network protocols, each protocol has its own functions and functions. Next we will introduce several key network protocols.

Key network protocols 1.TCP/ IP:

Only the TCP/IP protocol allows a full connection to the Internet. The most widely used, and most familiar to everyone.

Key network protocols 2.IPX/ SPX:

The IPX/SPX protocol is a NetWare network protocol developed by NOVELL. Currently, it is not only used in NetWare networks, but most online games support IPX/SPX protocols. it differs from the TCP/IP protocol in that it uses the physical address (MAC address) of the NIC instead of the IP address ). generally, IPX/SPX does not need to be configured. However, you also need to pay attention to the following issues: IPX/SPX transmission data frames are of four types. In a network, the frame types must be unified, you can directly select "Automatic Detection ". the "internal network number" of each host in a network should be different.

Key network protocols 3. NetBEUI protocol:

This protocol is a non-routing protocol developed by IBM. It is actually a NetBIOS enhanced user interface, which is especially suitable for transmitting data in "Network neighbors" and greatly improves the speed of searching computers in "Network neighbors. therefore, in addition to the TCP/IP protocol, it is best to install the NetBEUI protocol in the LAN. netBEUI protocol is not installed by default in winXP. installation Method: 1) In the valueadd \ msftnet \ netbeui folder of the winXP system installation disk, find nbf. copy the sys file to the system32 \ drivers folder on the local machine and copy the other netnbf. copy the inf file to the inf (hidden folder) file in the windows directory. (2) Add protocol in "network and dial-up connection" settings -- add NetBEUI protocol.

Key network protocols 4. file and printer sharing in Microsoft networks:

Only when this service is enabled can your computer be seen in the network neighbors.

Key network protocols 5. BOOTP protocol description:

(Bootstrap Protocol), which is based on TCP/IP

The protocol allows a diskless station to obtain an IP address from a central server, assign a dynamic IP address to the diskless workstation in the LAN, and do not require each user to set a static IP address. When using the BOOTP Protocol, it generally includes the Bootstrap Protocol Server self-lifting Protocol Server) and Bootstrap Protocol Client self-lifting Protocol Client.

Key Network Protocols 6. TFTP protocol

(Trivial File Transfer Protocol simple File Transfer Protocol or fragmented File Transfer Protocol). The role of the TFTP Protocol is roughly the same as that of FTP, which is used for File transmission, you can upload and download files between two computers on the network. The TFTP protocol can be viewed as a simplified version of the FTP protocol. The differences between the two are as follows: 1. the TFTP protocol does not need to authenticate client permissions, and FTP requires client authentication; 2. TFTP is generally used in LAN and remote UNIX computers, while common FTP is mostly used in the Internet.

Key network protocols 7. DHCP protocols

(Dynamic Host Configuration Protocol). This Protocol can automatically assign IP addresses to each computer in the LAN and complete the TCP/IP Protocol Configuration for each computer, includes IP addresses, subnet masks, gateways, and DNS servers. In this way, the Administrator does not need to manually configure the TCP/IP protocol for each computer in a LAN, especially in a large LAN, and avoids repeated IP addresses.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.