Not so long ago, the organization of local networks required the use of the correct protocol. Such a choice influenced what types of computers can be connected to it. Today, this problem has almost disappeared. Modern TCP IP network protocols have replaced everything that existed before. This is a universal solution that can be used in any operating system.
Terminology
A network protocol is an established language in which programs communicate. Data transfer is the movement of a bit stream over a cable. In order for it to reach the target computer and appear in it as data, a certain set of rules is required. It is they that are prescribed in standard protocols. They are usually said to have a level of nesting. What does it mean? There is a physical level, which is a list of definitions, for example, what a network cable can be, its core thickness and other parameters. Suppose we are talking about a working cable. Then data packets will be sent on it. But which computer will accept them? Here the link layer is included in the work, while the packet address indicates the physical address of each machine — a specific number sewn into the network card. It is called the MAC address.
Network hierarchy
The link layer is the same as Ethernet. The package contains a set of specific parameters that determine its type. Data is directly dependent on this type, and its content refers to the network layer. There are two most common protocols: ARP, which is responsible for converting IP addresses to MAC, and the IP protocol itself. You can give the structure of the IP packet. All data that is transferred using it is already sent to a specific network address. The package contains a number in the specified format, indicating the type of protocol.
The most common are two types: TCP and UDP. There is a certain difference between them, namely that the former is characterized by the maximum degree of reliability, because when sending a packet it constantly sends a request for its receipt. The second network protocol is a convenient tool, for example, when listening to Internet radio. At the same time, it is supposed to send packets without any verification of the fact of their receipt. If he reached, then you can listen to the radio, and if not, then there is no point in checking and controlling.
Package Delivery Features
The package must contain the port number to which it is sent. Typically, this parameter is determined by the type of protocol at the application level - depending on the application to which the information is directed. Non-standard service ports can be used, no one forbids this. The most famous network protocols in this case are HTTP and POP3. Gets a specific package nesting hierarchy. IP is embedded in the Ethernet packet, then TCP or UDP, and then data oriented to a specific application.
Distinctive features
The network protocol, unlike data transfer protocols, is not tied to specific equipment. Their implementation occurs at the software level, so they can be installed and removed at any time.
IP and TCP / IP
This network protocol is used not only on the Internet, but also inside the operating system itself. It represents the transport and network layer, due to which data is transferred in blocks. For very many years it was used only in UNIX networks, and now that the Internet has grown quite rapidly, the IP network protocol has been used in almost every type of local computer network. At the moment, it serves as the main protocol for most services running on operating systems.
Local and switched networks
Old network protocols required some specific knowledge, and TCP / IP is used by users who have never even seen network cards. Access to the Internet using a modem or local network is provided subject to the use of the same protocol. And the process of setting it up completely depends on the type of connection used in this case. It should be noted that the network layer protocols are different from all the others, and the parameters for accessing the local network or using a modem also have certain nuances. It is better to establish a dial-up connection using the automatic configuration program, which is supplied by the provider. Otherwise, you must manually enter all the necessary parameters. You can consider the basic network protocols.
IPX protocol
This kit was developed by Novell to use for its own NetWare OS. IPX is partially similar to TCP / IP, that is, it includes some protocols from this package, but the company protected it with copyrights. However, Microsoft has created its own compatible protocol for Windows operating systems. IPX is a network protocol that, in terms of functionality, is similar to IP. SPX is a transport layer tool that is designed to provide packet data exchange between individual machines.
At the moment, this protocol is used only in networks with servers where older versions of the NetWare operating system are installed. Often it is used in conjunction with some other sets of network protocols. Nowell is now fully transitioning to the new universal TCP / IP protocol.
NetBEUI
This network protocol is used in small networks. It was first introduced in Windows NT 3.1, as well as in several subsequent versions of this system, where it was used by default. In the latest versions of systems, its place was taken by the already known TCP / IP. This protocol is quite simple; it lacks many of the functions used in more advanced versions. It is not suitable for internetworking. It can be useful for a simple peer-to-peer network, but now it is not even presented as a standard OS component; it needs to be installed independently from the disk.
NetBEUI is a convenient way to create a direct cable connection, and in this sense it is the minimum protocol that is required to create a peer-to-peer network in versions of Windows 9x.
conclusions
It is important to remember certain points. At the moment, there is already more than one network protocol. All of them are intended for communication, however, each of them has completely different tasks, there are advantages and disadvantages in comparison with the others. The use of each of them implies the presence of certain working conditions, which are usually prescribed by the protocol itself. When choosing a solution, you should rely on this particular parameter.