Premium Essay

List of Protocols

In:

Submitted By skselvam
Words 1041
Pages 5
List of network protocols (OSI model)
This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite.
This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e |

பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links
Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX and other varieties * Varieties of 802.11 Wi-Fi physical layers * DSL * ISDN * T1 and other T-carrier links, and E1 and other E-carrier links * SONET/SDH * Optical Transport Network (OTN) * GSM Um air interface physical layer * Bluetooth physical layer * ITU Recommendations: see ITU-T * IEEE 1394 interface *

Similar Documents

Premium Essay

Hotel Management Srs

...is broadcasting? 9. What is unicasting? 10. What are switching elements? 11. What is routing algorithm? 12. What is blue tooth? 13. What is communication subnet? 14. What are peers? 15. What is a protocol stack? 16. What is topology? 17. What is ring topology? 18. What is star topology? 19. What is bus topology? 20. What is mesh topology? 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the different types of reference models 37. Mention the different layers of OSI reference model. 38. Mention the different layers of TCP/IP reference model. 39. List the three concepts that are central to OSI model. 40. List the critiques of OSI model. 41. List the different types of topologies. 42. Mention the variations in reliable connection-oriented service. 43....

Words: 2997 - Pages: 12

Premium Essay

Project Report

...Requirements: 1. 2. 3. 4. 5. 6. 5 Cisco Routers 3 Routing Protocols (RIPv1, RIPv2, EIGRP) 5 Servers(FTP, TFTP, Email, HTTP, DNS, DHCP, NTP, etc) 5 Cisco Switches with minimum 3 VLANs A minimum 5 Host terminals Access list 5 - 10 2 Cisco Packet Tracer Cisco Packet Tracer is a network simulation program that allows the students to experiment with network behavior and ask “what if” questions. Project Design Meeting the requirements I made a connection between four work stations and nine different servers through a switch 0. I used 8 routers which are interconnected in that router A is connected to Switch 0 and Router B is connected to Switch 1. Switch 1 is connected to two DHCP servers and 6 VLAN host terminals. Router C is connected to Switch 2 which is connected by a server and four host terminals and a printer. Router Eigrp is configured with Eigrp protocol and Router RIP version RIP protocols. 3 Configuration of Servers DHCP The Dynamic Host Configuration Protocol (DHCP) is a standardized networking protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. DHCP follows the DORA process when assigning the ip address to its clients 4 DNS The most important function of DNS servers is the translation (resolution) of humanmemorable domain names and hostnames into the corresponding numeric Internet Protocol (IP) addresses, the second principal name space of the...

Words: 1037 - Pages: 5

Premium Essay

Nt1210

...Unit 10 Assignment 1: 1. Which of the following lists a need of transport layer protocols that can be met by the TCP/IP network layer protocol? C 2. Which of the following answers list a need of application layer protocols that can be met by the TCP/IP transport layer protocol?(choose three answers.) A,B,E 3. Which of the following answers lists a service provided by an application layer protocol to the application? A 4. A user opens email client software on her tablet computer after connecting to the Internet. The user successfully downloads her latest email. Another student happens by and starts spouting off about how the first student has been using. Email,POP3,IP,TCP,HTTP,802.11 and other acronyms all just to check email. The first student just stares at this second student, but it does cause the first student to wonder. Which of the following answers accurately describes where some of these features are implemented on the tablet? D 5. A user of a tablet computer goes to a coffee chop and connects to the internet through a wireless LAN. The user then connects to the web server somewhere far away in the internet. Which of the following statements are true about the messages that flow from the tablet’s web browser towards the web server? (Choose two answers.)B,C 6. Which of the following answers accurately describe the size of the TCP,UDP, and IP headers, assuming that the headers include no additional optional field?(Choose three answers.)A,B,C 7. When thinking about...

Words: 1059 - Pages: 5

Free Essay

Network Implementation

...Network Sniffer Applications: Compare and Contrast Installing Wireshark: Running a TCP Packet Trace Network Security 16 Access Control Lists (ACL) ACL Command Examples To configure an ACL on a router To configure an ACL on a switch References 18 Implementing IPv6 Great Clips: Implementing a Network Plan Great Clips is a hair salon franchise through the United States and Canada. The first salon opened in 1982 and the first franchise opened in 1983 both in the state of Minnesota. In 1988, there were 150 franchises and by 2014, there are now well over 3000. Because of this tremendous growth, I have selected this company for which I will implement a network plan that will support seamless sharing and connection between various company locations. The routing protocols for IPv6 are similar to IPv4 but have been adjusted accordingly. There are two forms of routing protocols, Distance Vector routing and Link-State routing protocols. Distance Vector rules consider distance between nodes and the number of hops data must travel through before it reaches its destination. Distance Vector protocols require very little configuration and are popular among small to midsize organizations. Common Distance Vector protocols are Routing Information Protocol (RIP) and Boarder Gateway Protocol (BGP) which is the standard routing protocol used for the internet. RIP includes authentication to verify source, it needs a network address and number of hops (max of 15 hops) and...

Words: 2004 - Pages: 9

Premium Essay

Introduction to Telecommunications Chapter 5

...reside are TCP, UDP-RTP & NCP. At the Transport layer, TCP takes the segment de-fined by layer 5 amd adds a header containing the port number, error checking schemes, flow contorl checks and sequence numbers. 9. What functions reside under the data link layer? Data Link layer functions that reside are Ethernet, Frame Relay, ATM & HDLC. To my understanding is the connectivity protocols for the OS. 11. If you were asked to set up a routing protocol between five network routers, what layer or layers would you be working under? To set up a routing protocol between five network routers you would be working under layers and would use information from 4, 3, 2 &1. But mostly 3. 13. TCP and UDP are: D. Part of the transport layer responsible for end to end transmission of information. 14.List two Layer 4 protocols. Layer 4 Transport, protocols- TCP, UDP-RDP & NCP. 15. List two Layer 3 protocols. Layer 3 Network, protocols- IP, IPX & AppleTalk. 16.List two Layer 2 protocols. Layer 2 Data Link, protocols- Ethernet, Frame relay, ATM & HDLC. 17.List two Layer 1 protocols....

Words: 452 - Pages: 2

Premium Essay

Introduction to Network Management

...Section 4: Network Protocols 9 Section 5: Network Security 10 Section 6: Network Management 11 Section 7: Network+ Prep Toolkit 12 IP 2 Section 2 16 References: 17 Section 1: Target Organization My Organization: “The organization I am choosing is entirely made up. I’m going to call it Kritical Komputer Repair. (KKR) This isn’t just a small little computer repair shop we are talking about this is Kritical. Kritical has somewhere close to 100 employees; each one of these employee has to have a desktop that is capable of dual booting Linux and Windows 7 Enterprise. The company will have an in house server for file sharing and system maintenance. This company will have an outbound server as well that can speak with the in house server(s) in order to complete orders, and keep track of customer information. Both of these servers run Linux as well. I made this choice for a few different reasons it’s creative, it gives me a chance to learn by creating something new, and it gives me the flexibility that I need to succeed in this course. Kritical Computer was founded in 1991. Kritical Computer specializes in, computerization projects, security policies, consultation and selection of solutions, delivery of hardware and operating systems, installation and commissioning of computer networks, systems integration, implementation, training and technical assistance, and permanent care service. It isn’t a huge business, but they do quite a bit. They service a long list of different...

Words: 5964 - Pages: 24

Free Essay

To Thine Own Self Be True"

...QualNet 5.0.2 User’s Guide March 2010 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com Copyright Information © 2010 Scalable Network Technologies, Inc. All rights reserved. QualNet is a registered trademark of Scalable Network Technologies, Inc. All other trademarks and trade names used are property of their respective companies. Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com ii QualNet 5.0.2 User’s Guide Table of Contents Preface................................................................................. xiii Chapter 1 Introduction to QualNet .......................................................... 1 1.1 Overview .................................................................................................................. 1 1.2 QualNet Architecture .............................................................................................. 2 1.3 Scenario-based Network Simulation..................................................................... 4 1.3.1 General Approach .............................................................................................. 4 1.3.2 Creating Scenarios............................................................................................. 4 1.3.3 Files...

Words: 86998 - Pages: 348

Premium Essay

Lab Network+

...Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow Protocols through the Layers of the TCP/IP Model 1. Read though the section of this lesson titled “How the Layers Work Together.” 2. Carefully study Figure 2-11. [pic] 3. In a word processing document, list the layers of the TCP/IP Model and then the protocols that the discussion you read says are used on each layer to move the data from one location on the network to another. The following is what your answer should look like: • Application layer: HTTP • Transport layer: TCP • Internet layer: IP • Network Interface layer: Ethernet 4. List the protocols as they correspond to the TCP/IP Model that you think...

Words: 791 - Pages: 4

Premium Essay

Computer

...THEORY The correct answer(s): D What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP Novell-ether is the default LAN encapsulation. Novell-ether is 802.3. The correct answer(s): A What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP For two routers to exchange IGRP routes they must be configured with the same autonomous system number. The correct answer(s): C The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric The first number is the Administrative distance and the seconds number is the metric. In this case it is an IGRP metric. The correct answer(s): A B C Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's Routing loops can be prevented by split horizon, poison reverse and holddown times. The other two choices relate to Link State. The correct answer(s): A Which statement is true regarding full duplex? A.) Allows for transmission and receiving...

Words: 23850 - Pages: 96

Premium Essay

Network & Telecommunication Concepts

...layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with, it is important to understand the seven different layers of OSI Model and the functions they provide in the networking architecture. Below is a list of each OSI layer, their description and the function they serve in processing data over the network. • The application layer is the end-user process requests with applications and communication, all application specific. The function of an...

Words: 1573 - Pages: 7

Premium Essay

Nt1310 Unit 7

...Access control lists (ACLs) carry out packet filtering to regulate the flow of packets via a network. Packet filtration provides safety by limiting the reach of traffic into a network, limiting user and also device access to a network, and also preventing traffic from exiting a network. IP access lists decrease the possibility of spoofing or even denial-of-service attacks, and permit dynamic, momentary user-access via a firewall. There are several types of ACLs such as standard and extended ACLs and I would prefer named ACLs because among the drawbacks to using IP standard or IP extended ACLs is the fact you reference them by number, which may not very descriptive of its use. With a named ACL, this isn't the case because it is possible...

Words: 754 - Pages: 4

Free Essay

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use that...

Words: 1625 - Pages: 7

Free Essay

Server Administraton

... Find RFCs by status. Search for humorous RFCs. Part 2: Publishing RFCs Background / Scenario Request for Comments (RFCs) were created by Steve Crocker to help record notes on development of Advanced Research Projects Agency Network (ARPANET) in 1969 and eventually evolved into an official collection of memorandum that describes topics that are mainly related to the Internet and the TCP/IP protocol suite. Today the RFCs are managed by the IETF. There are currently over 6,000 RFCs, and the complete list is available at http://www.ietf.org/download/rfc-index.txt. In this lab, you will learn how an RFC is published today by IETF. Additionally, you will also identify a few well-known RFCs that are used in your network. You can also find a few non-technical RFCs that can provide information or engineering humor. Required Resources Device with Internet access RFC Editor RFCs started as a collection of memorandum on the development of the first Internet (ARPANET). In this collection, only a few RFCs are considered as Internet standards. Most of the RFCs describe experimental protocols. Some of the RFCs are only informational. The main purpose of RFCs is to stimulate comment and discussion. Navigate to the RFC Editor. All the published RFCs are available for access at http://www.rfc-editor.org. The RFC Editor is an RFC repository maintained by the IETF. At the top banner of this page, you can click any of the links, and these links direct you to the different searches, databases...

Words: 1202 - Pages: 5

Free Essay

Beamforming

...| One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. In the Wireshark labs you’ll be doing in this course, you’ll be running various network applications in different scenarios using your own computer (or you can borrow a friends; let me know if you don’t have access to a computer where you can install/run Wireshark). You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of these “live” labs. You’ll observe, and you’ll learn, by doing. In this first Wireshark lab, you’ll get acquainted with Wireshark, and make some simple packet captures and observations. The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures (“sniffs”) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A...

Words: 2509 - Pages: 11

Premium Essay

Ccna

...Exam 640-816 While you can use these notes to prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons  The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You...

Words: 73801 - Pages: 296