Protocol is rules that govern communications. It usually needs to have an identified sender and receiver, common language and grammar or syntax, speed and timing of delivery, and confirmation or acknowledgement requirements. A typical computer protocol includes message encoding, *message formatting and encapsulation#*, message size, Message Timing#, and message delivery options#.
Protocol
-
User Datagram Protocol (UDP)
UDP is a widely used #Transport Layer Protocol# (defined by #Open Systems Interconnection (OSI) Model for the #Internet Protocol Suite (TCP/IP). Unlike Transmission Control Protocol (TCP), it is an unreliable and connectionless protocol which is great for real time communication such as voice chat or video streaming. UDP doesn’t guarantee that the packets or datagram (its Protocol Data Units (PDU))# will reach their destination or arrive in order as there is no mean to acknowledge such state. It has a rather small segment headers, with only 8 bytes, and provides fine application control over data transmission, which allow application-specific error recovery at Application Layer# for reliability.
-
Transmission Control Protocol (TCP)
TCP is a commonly used Protocol# in #Internet Protocol Suite (TCP/IP). It is a #Transport Layer protocol according to the classification of #Open Systems Interconnection (OSI) Model.
- TRS2251 Chapter 1: Introduction to OSI Model and Internetworking
-
Simple Network Management Protocol (SNMP)
SNMP is a lightweight #Application Layer Protocol# allowing remote and local #management# of items or Network Device on the network. It is part of #Internet Protocol Suite (TCP/IP). SNMP comprises of two entities: agents who are running on managed node and collecting information about the node, and managers who are running on management workstation that requests information about devices on the network.
-
Secure Shell (SSH)
SSH is a protocol that aim to establish a secure #202206151232 connection between two computers. It uses the #202203221212 in order to secure the network communication between two hosts. Additionally, one could utilise the 202203221227# feature in order to Encapsulation# one Protocol (usually insecure) under SSH thus enhance the security of the protocol.
- Replay Attack
-
Network Access Protocols
Network Access Protocols are the Protocol# that have two primary functions: communication over Data Link Layer# and transmission of data on the network media over Physical Layer#.
-
Internet Society (ISOC)
ISOC is one of the #Internet Open Standards Organisation that facilitates the open development of standards and protocols for the technical infrastructure of the Internet. It oversees the Internet Architecture Board (IAB)#.
-
Internet Protocol (IP)
The following table shows the possible value of Protocol field to indicate which Protocol# is in used:
-
Internet Engineering Task Force (IETF)
IETF is one of the #Internet Open Standards Organisation which mission is to develop, update, and maintain Internet and the Internet Protocol Suite (TCP/IP)# technologies. It consists of several working groups (WGs) that is responsible for developing IETF specifications and guidelines. RFC documents will be produced by the organisation that describes Protocol, processes, and technologies for the Internet.
-
Internet Architecture Board (IAB)
IAB is one of the #Internet Open Standards Organisations which is accountable for overall management and development of the Internet standards, including the oversight of the protocols’ and procedures’ architecture adopted by the Internet. 13 board members will have voting power on the organisation decision-making. It is the technical advisory group for the #Internet Society (ISOC), and oversees the functioning of Internet Engineering Task Force (IETF)# and Internet Research Task Force (IRTF)#.
-
IP Security (IPsec)
IPsec is an #Network Layer security framework for secure communications over Internet Protocol (IP)# network. This means it could protect every application or Protocol#, including those that are security-ignorant (doesn’t design around security), running on top of IP (IPv4 or IPv6#, however, both of them are not compatible to each other). It is common having it to have secure access over the Internet, extranet and intranet connectivity with partners or just to enhance the security especially in electronic commerce. It provides Authentication#, Confidentiality#, and key management (secure key exchanges) services.
-
Dynamic Trunking Protocol (DTP)
DTP is a Cisco proprietary Point-to-Point Protocol# used between Switches# for automatic trunk# negotiation. Depending on modes set on both end, DTP can decide whether the link should be trunk or non-trunk. The following table shows the outcome for the link for different composition of opposite ports.