Communications Protocol

All communications between devices require that the devices agree on the format of the data. The set of rules defining a format is called a protocol. At the very least, a communications protocol must define the following:

  • rate of transmission (in baud or bps)
  • whether data is to be transmitted in half-duplex or full-duplex mode
  • In addition, protocols can include sophisticated techniques for detecting and recovering from transmission errors and for encoding and decoding data.

    The table lists the most commonly used protocols for communications via modems. These protocols are almost always implemented in the hardware; that is, they are built into modems.

    In addition to the standard protocols listed in the table, there are a number of protocols that complement these standards by adding additional functions such as file transfer capability, error detection and recovery, and data compression. The best-known are Xmodem, Kermit, MNP, and CCITT V.42 . These protocols can be implemented either in hardware or software.

    Vangie Beal
    Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

    Top Articles

    List of Windows Operating System Versions & History [In Order]

    The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

    How to Create a Website Shortcut on Your Desktop

    Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

    What are the Five Generations of Computers? (1st to 5th)

    Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

    Hotmail [Outlook] Email Accounts

    Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

    Imperva

    Imperva is a cybersecurity company focused...

    Barracuda Networks

    Barracuda Networks is a multinational cybersecurity...

    Merkle Proof

    Merkle proofs describe the verification process for identifying the components of...