Premium Essay

List of Protocols

In: Computers and Technology

Submitted By skselvam
Words 1041
Pages 5
List of network protocols (OSI model)
This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite.
This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e |

பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links
Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX and other varieties * Varieties of 802.11 Wi-Fi physical layers * DSL * ISDN * T1 and other T-carrier links, and E1 and other E-carrier links * SONET/SDH * Optical Transport Network (OTN) * GSM Um air interface physical layer * Bluetooth physical layer * ITU Recommendations: see ITU-T * IEEE 1394 interface *...

Similar Documents

Premium Essay

Project Report

...Requirements: 1. 2. 3. 4. 5. 6. 5 Cisco Routers 3 Routing Protocols (RIPv1, RIPv2, EIGRP) 5 Servers(FTP, TFTP, Email, HTTP, DNS, DHCP, NTP, etc) 5 Cisco Switches with minimum 3 VLANs A minimum 5 Host terminals Access list 5 - 10 2 Cisco Packet Tracer Cisco Packet Tracer is a network simulation program that allows the students to experiment with network behavior and ask “what if” questions. Project Design Meeting the requirements I made a connection between four work stations and nine different servers through a switch 0. I used 8 routers which are interconnected in that router A is connected to Switch 0 and Router B is connected to Switch 1. Switch 1 is connected to two DHCP servers and 6 VLAN host terminals. Router C is connected to Switch 2 which is connected by a server and four host terminals and a printer. Router Eigrp is configured with Eigrp protocol and Router RIP version RIP protocols. 3 Configuration of Servers DHCP The Dynamic Host Configuration Protocol (DHCP) is a standardized networking protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. DHCP follows the DORA process when assigning the ip address to its clients 4 DNS The most important function of DNS servers is the translation (resolution) of humanmemorable domain names and hostnames into the corresponding numeric Internet Protocol (IP) addresses, the second principal name......

Words: 1037 - Pages: 5

Premium Essay

Nt1210

...Unit 10 Assignment 1: 1. Which of the following lists a need of transport layer protocols that can be met by the TCP/IP network layer protocol? C 2. Which of the following answers list a need of application layer protocols that can be met by the TCP/IP transport layer protocol?(choose three answers.) A,B,E 3. Which of the following answers lists a service provided by an application layer protocol to the application? A 4. A user opens email client software on her tablet computer after connecting to the Internet. The user successfully downloads her latest email. Another student happens by and starts spouting off about how the first student has been using. Email,POP3,IP,TCP,HTTP,802.11 and other acronyms all just to check email. The first student just stares at this second student, but it does cause the first student to wonder. Which of the following answers accurately describes where some of these features are implemented on the tablet? D 5. A user of a tablet computer goes to a coffee chop and connects to the internet through a wireless LAN. The user then connects to the web server somewhere far away in the internet. Which of the following statements are true about the messages that flow from the tablet’s web browser towards the web server? (Choose two answers.)B,C 6. Which of the following answers accurately describe the size of the TCP,UDP, and IP headers, assuming that the headers include no additional optional field?(Choose three answers.)A,B,C 7. When thinking......

Words: 1059 - Pages: 5

Premium Essay

Lab Network+

...Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow Protocols through the Layers of the TCP/IP Model 1. Read though the section of this lesson titled “How the Layers Work Together.” 2. Carefully study Figure 2-11. [pic] 3. In a word processing document, list the layers of the TCP/IP Model and then the protocols that the discussion you read says are used on each layer to move the data from one location on the network to another. The following is what your answer should look like: • Application layer: HTTP • Transport layer: TCP • Internet layer: IP • Network Interface layer: Ethernet 4. List the protocols as they correspond to the TCP/IP Model that you......

Words: 791 - Pages: 4

Premium Essay

Network & Telecommunication Concepts

...layered approach, where a communication subsystem is broken down into seven layers, each one of which performs a well-defined function. Additionally it is important to understand the purpose of the OSI model in the overall networking architecture especially as it relates to the TCP/IP (Transmission Control Protocol/Internet Protocol) Architecture, which also consists of layers each playing a particular role in the networking design. Generally speaking, the network protocol layer, which is similar to the data and network layer of the OSI model includes the protocols that allow clients and applications to send data over the network. This includes TCP/IP, NWLink (IPX/SPX), NetBEUI, Infrared Data Association (IrDA). However, the purpose of this document is to focus on the relationships between the OSI model and the TCP/IP architectures, and how they may interact together. Finally, as demonstration of this relationship a visual diagram has been provided to depicts how the TCP/IP layers correspond to the OSI model and layers. To begin with, it is important to understand the seven different layers of OSI Model and the functions they provide in the networking architecture. Below is a list of each OSI layer, their description and the function they serve in processing data over the network. • The application layer is the end-user process requests with applications and communication, all application specific. The function of an...

Words: 1573 - Pages: 7

Free Essay

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use......

Words: 1625 - Pages: 7

Free Essay

Server Administraton

... Find RFCs by status. Search for humorous RFCs. Part 2: Publishing RFCs Background / Scenario Request for Comments (RFCs) were created by Steve Crocker to help record notes on development of Advanced Research Projects Agency Network (ARPANET) in 1969 and eventually evolved into an official collection of memorandum that describes topics that are mainly related to the Internet and the TCP/IP protocol suite. Today the RFCs are managed by the IETF. There are currently over 6,000 RFCs, and the complete list is available at http://www.ietf.org/download/rfc-index.txt. In this lab, you will learn how an RFC is published today by IETF. Additionally, you will also identify a few well-known RFCs that are used in your network. You can also find a few non-technical RFCs that can provide information or engineering humor. Required Resources Device with Internet access RFC Editor RFCs started as a collection of memorandum on the development of the first Internet (ARPANET). In this collection, only a few RFCs are considered as Internet standards. Most of the RFCs describe experimental protocols. Some of the RFCs are only informational. The main purpose of RFCs is to stimulate comment and discussion. Navigate to the RFC Editor. All the published RFCs are available for access at http://www.rfc-editor.org. The RFC Editor is an RFC repository maintained by the IETF. At the top banner of this page, you can click any of the links, and these links direct you to the different searches,......

Words: 1202 - Pages: 5

Premium Essay

9.1 Assignment Sheet

...their business. Your line manager has asked you to prepare information explaining possible network solutions to a small business client. The information mediums must describe networks, and protocols and standards. You are to produce a movie and a poster. Criteria Covered in this Assignment: P1: | Describe the types of networks available and how they relate to particular network standards and protocols | P2: | Describe why different network standards and protocols are necessary. | M1: | Compare the benefits and disadvantages of peer-to-peer and client/server networks. | Movie [P1 part and M1]Create the structure of your movie as follows: * Title: ‘Types of Network Systems and Protocols’ produced by [Name] * Introduction: Introduce the movie content * Section 1: LAN, WAN [incl. WAN technologies e.g. Frame Relay, MPLS and ATM], PAN and the Internet * Section 2: Logical [how data is transferred] and Physical Topologies[network shape] e.g. Star, Bus, Ring, Mesh and Tree * Section 3: Network Access Methods e.g. CSMA [CD] & CSMA [CA] and Token Passing * Section 4: Network Models e.g. OSI 7 Layer, TCP/IP * Section 5: Comparing the benefits and disadvantages of peer-to-peer and client/server networks [M1] * Conclusion: Summarise the movie content * Bibliography: List all sources used * The EndNote: Where examples [e.g.] are listed, only two or three of the most relevant ones need to be described. Introduce all examples first though.What to do:Section......

Words: 767 - Pages: 4

Premium Essay

Ifsm

...Week 1 – Project #1 INSTRUCTIONS: Please read the entire assignment before beginning so that you have all of the needed information before you begin planning your network architecture. You must either submit a typed Word document that contains all of the parameters for the assignment or you may provide a hybrid Word document that implements tables or diagrams to aid in the explanation of your architecture. While a diagram requires more effort and work, and is not required, it may serve to make the assignment easier as you begin assigning IP addresses and as you begin deciding on a routing protocol. I leave this decision to you, whichever works best for you! There is no mandatory length to this assignment. If it takes you two pages or ten to meet the criteria for receiving full credit, that is up to you. Understand that there is no one correct way to implement this architecture. This assignment leaves a lot of room for customization and personalization; however, to receive full credit for the assignment you MUST complete all 10 items listed below. This project will be a practical application assignment that tests the student’s ability to plan various aspects of a company’s network architecture. This assignment is designed to mimic a real world scenario that you may encounter at your company’s location or as a service that you provide to your clients in the future. Believe it or not, while the assignment may sound and seem simple in the classroom, it can become stressful......

Words: 984 - Pages: 4

Free Essay

Network Infrastructure Security

...of dedicated connections, encryption, or a combination of the two. The VPN connection across the Internet is technically a wide area network (WAN) link between the sites but appears to the user as a private network link—hence the name "virtual private network”. The following authentication protocols are supported for logon security for VPN connections in Windows 7: * PAP Stands for Password Authentication Protocol; uses plaintext (unencrypted) passwords. * CHAP Stands for Challenge Handshake Authentication Protocol; uses one-way MD5 hashing with challenge-response authentication. * MSCHAPv2 Stands for Microsoft Challenge Handshake Authentication Protocol version 2; an extension by Microsoft of the CHAP authentication protocol that provides mutual authentication of Windows-based computers and stronger data encryption. MSCHAPv2 is an enhancement of the earlier MS-CHAP protocol that provided only one-way authentication of the client by the server. * EAP Stands for Extensible Authentication Protocol; extends PPP by adding support for additional authentication methods including using smart cards and certificates. * PEAP Stands for Protected Extensible Authentication Protocol, or Protected EAP; enhances the protection provided by EAP by using...

Words: 683 - Pages: 3

Free Essay

Network Technology and Service Integration

...Answers to Assessment Test 1. A. Network Control Protocol is used to help identify the Network layer protocol used in the packet. See Chapter 16 for more information. 2. B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See Chapter 15 for more information. 3. C. The port roles used within RSTP include discarding, learning, and forwarding. The difference between 802.1d and RSTP is the discarding role. See Chapter 10 for more information. 4. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information. 5. D. An IPv6 address is 128 bits long, whereas an IPv4 address is only 32 bits long. See Chapter 15 for more information. 6. C. Link Control Protocol in the PPP stack provides negotiation of dynamic addressing, authentication, and multilink. See Chapter 16 for more information. 7. B. The show interface command shows the line, protocol, DLCI, and LMI information of an interface. See Chapter 16 for more information. 8. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 4 for more information. 9. B. The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates...

Words: 946 - Pages: 4

Free Essay

Test

...communications. a. | Data Link layer | c. | Network layer | b. | Physical layer | d. | Transport layer | ___a_ 2. The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed. a. | Session layer | c. | Network layer | b. | Physical layer | d. | Presentation layer | __a__ 3. The ____ defines an interface that applications can use to request network services, rather than referring directly to applications themselves. a. | Application layer | c. | Session layer | b. | Physical layer | d. | Presentation layer | _c___ 4. The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on...

Words: 694 - Pages: 3

Free Essay

Lab1

...DeVry University Johnnie Walker July 7, 2014 RFC'c First, I have to define the term RFC. The acronym "RFC" stands for "Request for Comment". This refers to a description of a standard for new or modified internet or networking protocols. When standards are proposed, they are made available for public comment so that they can be refined and agreed upon. The document which details the proposed standards is called a "request for comment" document, or RFC. When the standards are finalized, they keep the same "RFC" Three organizations under the Internet Society are responsible for the actual work of standards development and publication: Three organizations under the Internet Society are responsible for the actual work of standards development and publication:name. Now a Request for Comments (RFC) is a publication of the Internet Engineering Task Force (IETF) and the Internet Society, the principal technical development and standards-setting bodies for the Internet. Request for Comments documents were invented by Steve Crocker in 1969 to help record unofficial notes on the development of ARPANET. RFCs have since become official documents of Internet specifications, communications protocols, procedures, and events. Today, it is the official publication channel for the Internet Engineering Task Force (IETF), the Internet Architecture Board (IAB), and — to some extent — the global community of computer network researchers in general. A new model was......

Words: 1004 - Pages: 5

Premium Essay

Econ 1143: Statistical Methods

...across the country and this affects the successor after Lawrence Roberts to take the work to implement the vision. Roberts led the development of new ideas based network packet switched (packet switching), which was discovered by Paul Baran at RAND and a few years later by Donald Davies at the UK National Physical Laboratory. A special computer called Interface Message Processor (Interface Message Processor) developed for the design and realization of the ARPANET began operating in early October 1969. The first communication between research done at the University of California at Los Angeles and the Stanford Research Institute. The first network protocol is used ARPANET Network Control Program (Network Control Program). In 1983, this protocol was replaced by TCP / IP, developed olehRobert Kahn, Vint Cerf and others. The use of this protocol thus be widespread throughout the world. In 1990, the ARPANET was retired and transferred to the NSFNET. NSFNET was then connected to the connecting CSNET universities around North America and then on to the connecting Eunet research facilities in Europe. With visionary management played by NSF and fueled by the popularity of the web, the internet exploded after 1990. This caused the U.S. government to transfer management to independent organizations starting in...

Words: 747 - Pages: 3

Premium Essay

Comptia Sims Questions

...SIMS are Valid. All the SIM SIM#1 - Bluetooth,IR and Wifi range and usage SIM#2 - The connector type matchup: VGA, DVI, HDMI,S-Video, Composite, Serial. SIM#3 - Identify which encryption types belong to which wireless security protocols. SIM#4 - Match up parts for a Home Theater PC, Thick Client PC and Gaming PC. SIM#5 - Identify motherboard components. SIM#6 - Build a gaming PC and a virtualization PC using a collection of computer components. SIM#7 - Configure SOHO with maximum encryption SIM#8 - SOHO Setup at Library SIM#9 - Build PCs SIMs Thick Client PC --- 250W, Intel i3, Shared Video, Windows 7 32-bit Pro, 2GB DDR3 Ram, 250GB HDD Gaming PC --- 900W/800W, Intel i5, Dual 1GB DDR5 PCIe x16, Cooling Case, 8GB DDR3 Ram, 250 SSD Home Theater PC --- psu: 250w/HTPC, cpu: amd phenom, video: 1gb ddr5, special component: tv tuner, ram: 4gb ddr3, hdd: 1 tb hdd Bluetooth: 100m, Cell phone headset Infrared: 1KM, WAP List of 4 Wi-Fi encryption and match with the technology it uses. The list is as followed Open WEP WPA WPA-CCMP and the list of choices are as followed None RC4 DES 3DES AES Open---None WEP----RC4 WPA----RC4 WPA-CCMP(WPA2)---AES. 1) Set up a router for a library. Other commenters have already talked about this and given tips. The only thing that tripped me up is that the third tab contains a field for entering an administrator password for the router, in addition to the regular router password......

Words: 842 - Pages: 4

Premium Essay

Systems Validation

...Name: Gerard White ID number: X00107665 Date: 24/6/2013 Title: Systems Validation Assignment 1. Outline the typical testing that is conducted when executing an IQ protocol. Once the process equipment or systems have been designed and selection has been completed it is necessary to perform tests to ensure that the equipment or systems supplied are installed as specified based on the manufacturers, contractors or designers specifications and drawings. It is about establishing confidence that all of the equipment or systems used in the manufacturing process meet the specified requirements and are appropriately designed, constructed, placed, and installed to facilitate maintenance, adjustment, cleaning, and use. It is also necessary to validate that all the critical training has been provided for the operation of the equipment or process. There are a number of tests and checks required when executing the installation qualification protocol and they are as follow: 1) Examining the equipment or process design. This involves documenting all the hardware systems supplied with regards to the model and serial numbers whilst performing visual checks on all of the equipment. Checking the supplied software, referencing and documenting the program number and title, the version number and last date modified. Also checking the back up software and documentation supplied. The key documents that would need to be referenced for these checks......

Words: 1134 - Pages: 5