How Protocols Function in a Network

Go Back


The functions of how protocols function in a network are that to begin with, a protocol is a rule that judges how we communicate and contact each other. Without this rule we wouldn't communicate properly and effectively this having us always with errors when trying to communicate with each other by various devices and emails, along with servers to finish this up.


All the protocols have their own settings and advanced settings. These features allow each protocol to operate with a different function. With the OSI Layer Protocol in the physical area, this makes sure the data packets go to the correct place and also that they get sent to the correct place. This is how they communicate with each other. Protocol s work the same on every computer in the network, sending computer top down sending packets, receiving computer bottom up, this is how they operate when sending and receiving information, the whole layout is unique and advanced by the actions involved in communication and data transfer. Protocols work together in a suite to physical stack; the levels that are associated with the protocol are what make up the map that is used to correspond to the layers of the OS reference model.


The reason why protocols are needed to enable computer communications is because protocols are a set of rules that computer devices use to communicate. The communication is all done with the network itself so nothing is done outside of the network. By this happening, the devices can share files and transfer data how the need to transfer it. The devices that need to be helped in communication and guide to communicate correctly operate through an assigned protocol that will transfer all data. These rules are the government of the internet process that is followed by all protocols and this is how you get the internet running effectively intertwining and interacting with each other in harmony. This lets a mark and judges how all the devices on the network with interact together and communicate, once this is transferred to the physical layer the devices can now communicate with each other.


Properties of Protocols

1. Can detect the network by the end point.
2. Handshake-Negotiation within the parameters.
3. Formatting the message.
4. Error correction for messages that are corrupted with error or just damaged.
5. The connection and the session connections have termination procedures that have to be carried out.


The Host Layers make up the Network Process Application, Data Representation and Encryption, and Inter-host Communication. These are the data packets that will carry the information through and over the internet. Next, we have the Media Layers, End-to-End Connections and Reliability, Path determination and IP (Logical Addressing). MAC and LLC (Physical Addressing), Media, Signal, and Binary Transmission are all part of the path. This makes up all the media and addressing of each device on the internet also the transport connections whether single transport of multi transport, the data will transfer through these set of rules that govern the system.

Here's a list of some common protocol suites used today on the network and how they operate.


The TCP/IP Protocol maps the way for many other protocols such as TCP, IP. HTTP, FTP, and POP3, these are all connected together in the OSI Model to provide network services for all layers of the OSI Model.

NetBEUI - This is designed to work in a windows small based LAN system. It cannot be routed and cannot communicate with other routers; also it doesn't utilize address that are used and also identifiers. By it not using addresses and identifiers it uses 15 character names. Inside a business you can send to a name like Send to James, but outside the network there is millions of James so you cannot route this suite. It will not find the correct name.

Apple Talk- This is used for communication within Apple networks and Macintosh. This is a routable network and it can be used in large LAN's like WAN (Wide Area Network). Some networks don't communicate because the network is built within and uses Apple Talk to communicate therefore it only communicates with its own users when talking because the network is built within.

TCP/IP- (Transmission Control Protocol/ Internet Protocol) this is the most common and most used protocol suite today, it is how we interact and communicate, and transfer information to each other. It has a lot of application layer protocols that are used by the internet to transfer and communicate. It handles our IP addresses for the accounts; it helps the network, transport sessions, and application layers that will be used in converting all the information that will be used. The TCP ports are used, ARP Protocol Layer (Layer 2 to Layer 3 Translation). Last it handles the DHCP, the ability to automatically assign IP addresses associated within the network.

DLC- Data Link Control, This protocol is used for communication between pc and non pc computer devices that interact within the network. Without this suite different devices would not be able to connect and communicate effectively without this suite that would handle all of these operations. This suite is not designed to be used by computers that are the same devices; they will not operate this way.

Connection Oriented Protocols VS Connectionless Protocols

Connection Oriented- deals with steps in connecting one computer to another. It will transfer, send, and receive data just as a normal person would receive a phone call. It uses a packaged switch network unlike the phone circuit switched network. Connection oriented communication operate two ways, packet switched and without virtual circuits. Two computers operate at the end points and endpoints can anticipate traffic within them.

Connectionless, is a communication packet where no call and release occur. The message is broken into packets and each packet is sent separately. Packets are able to go in different directions due to them having no connection to anything; this makes it easier for them to travel.
Service that is wireless is provided by UDP (User Datagram Protocol) the packets that are transferred by UDP are called Datagrams. (Courses) Connection lets multiple packets at a time, while connectionless allows packets to be sent one at a time. This basically is why it's good to know what the differences are before you actually switch your network protocol. (Courses)

The difference between Routable and Non-Routable Protocols Routable: Contains a network address and also a device address to communicate. The information can have routs from anywhere in the network. It uses the inside and the outside layers to communicate and send data.
Non-Routable: Contains only one device address and not a network address. This protocol can only operate within a small network like an office or a room. It doesn't work with addressing to send data from one place to another, and protocols are very concerned on where they are routed so more information will be needed in order to process information. One example would be me exchanging emails with my brother in separate rooms this will display a routable network, and me talking to my friend on a mac device that's the same this would be a non-routable network, we cannot transfer data packets to each other if we do not have the same device. Therefore, by sharing this knowledge with you this is how protocols operate within a network.


Works Cited

CIS370. (n.d.). Retrieved January 18, 2014, from CIS370: http://pluto.ksi.edu/~cyh/cis370/ebook/ch06b.htm
Courses. (n.d.). Retrieved January 18, 2014, from Courses: http://courses.iddl.vt.edu/CS1604/15-Lesson_14/04-Connection-Oriented_vs_Connectionless.php
Dean, T. (2010). Networking Network+ Guide to Networks. Boston: Course Technology Cengage Learning.
Webopedia. (n.d.). Retrieved January 18, 2014, from Webopedia: http://www.webopedia.com/TERM/P/protocol.html


Created on February 05, 2014 || Author: Lionel Sharpe



Form (rr15a) Code:3301627005-GA

Copyright © 2013 || Bridgetonia Inc. All Rights Reserved