Network Protocol

A network protocol is an established set of rules that determine how data is formatted, transmitted, and received between devices across networks. A network protocol is essentially a language that two devices can both understand in order to communicate with each other, regardless of internal process, infrastructure, or design disparities.

Network protocols are used for global communication, and neither local area networks (LAN) nor wide area networks (WAN) could function without using network protocols. Support for these protocols can be built into software, hardware, or both.

How network protocols work

Network protocols break large-scale processes into small, specific tasks or functions across every level of the network. Each function must cooperate at each level in order to complete the large-scale process.

Network protocols are typically created according to an industry standard. Information technology organizations that have defined and published network protocols include:

  • The Institute of Electrical and Electronics Engineers (IEEE)
  • The Internet Engineering Task Force (IETF)
  • The International Organization for Standardization (ISO)
  • The International Telecommunications Union (ITU)
  • The World Wide Web Consortium (W3C)

The OSI model

While there are multiple protocols available, the majority of them are structurally based on the Open Systems Interconnection (OSI) model, known as the standard protocol model. The OSI model splits the communication process between two network devices and seven layers. A task or group of tasks is assigned to each layer. All layers are self contained, and tasks assigned to them are executed independently. From seven down to one, the OSI layers are as follows:

7. The application layer is the most client-facing layer of the system and manages the most visible communication and authentication in networking.

6. The presentation layer makes data understandable for the application layer and prepares it to be sent over the network.

5. The session layer manages sessions between clients and servers, initiating them and determining their duration.

4. The transport layer manages data packets as they are sent across a network and the correct amount of data so that the system is not overwhelmed.

3. The network layer properly directs data packet transmissions between routers and throughout the network.

2. The data link layer directs data between nodes within a network, passing bits between different points. It also manages the rate of transmission, and it tracks if bits malfunction.

1. The physical layer includes the computer, motherboard, routers, or any other hardware that host a network.

The seven layers can be divided into two groups: upper layers (7,6, & 5) and lower layers (4,3,2,   & 1). The upper layers deal with application issues, while the lower layers deal with data transport issues.

Common network protocols

Common network protocols include:

 

Related Link

Network protocols

Abby Braden
Abby Braden
Abby Braden is an award-winning writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com, where she covers technology trends and enterprise and SMB project management platforms. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...