Introduction:
This document is a summary of protocols that are used for networking, security, and other functions. This document only covers protocols. It does not cover services, network architecture, or media (method of hardware transport) associated with networking. The CTDP Networking Guide or Certification Guide is best used to learn about services or media.
Protocols are sets of standards that define operations and how they will be done. Without protocols there would be much confusion and there would be no standard to allow computers to communicate. Protocols are a set of defined reactions to given events. When a traffic light turns red, the defined reaction should be to stop. This is a simple form of a protocol.
Protocols are used for various purposes in the computer field. Protocols are mainly used to define networking standards although their application may extend beyond the scope of networking. Different uses of protocols include:
Networking - There are different suites (or stacks) of networking protocols. The most popular include TCP/IP, IPX/XPX from Novell, NetBEUI/NetBIOS from Microsoft, AppleTalk, and SNA. Different protocols within each suite of protocols may perform different functions at different levels (see network levels in the next section). These protocols are listed by both layer and function in this documentation. The protocol stacks include:
TCP/IP
IPX/SPX
Microsoft
AppleTalk
SNA
Other - Includes OSI, DLC and SNAP.
The function of the network protocols include:
Packaging (IP)
Transport (TCP,UDP)
Network Management (ICMP, SNMP, ARP)
Host Management (RARP, BOOTP, DHCP)
Network Routing (BGP, EGP, IGP, RIP, OSPF)
Mail (SMTP)
Multicasting (IGMP)
Application (FTP, TFTP, NFS)
Security
Authentication
Encryption
Tunneling
Directory (LDAP)
This entry was posted
on Sunday, December 21, 2008
at 6:48 AM
and is filed under
The CTDP Protocol Summary Version 0.6.0
. You can follow any responses to this entry through the
comments feed
.
Categories
- ACL's
- Advanced Shellcoding Techniques
- Applications of databases
- Basic Networking
- CCNA / CCNP Tutorial: Introduction To NAT
- Cisco's Interior Gateway Routing Protocol
- Cisco's TCP/IP Implementation
- Computer
- COMPUTER HARDWARE
- Computer Hardware (Components Inside cabinet)
- COMPUTER NETWORKING
- Configuring ZoneAlarm Security Settings
- Create An Ftp Server On Your Pc With Serv-u
- Data Security
- Database security
- DATATYPES Etc......)
- DBMS building blocks
- DBMS Topics
- Distributed Database
- Dynamic Routing
- EXCEPTION HANDLING
- Features of the Web
- Flashget Broadband Tweak
- Fox Business Network
- FRIEND FUNCTION
- Generic functions
- Get Away From Trojans(ALL TROJAN PORTS).
- HARDWARE FIREWALL
- History of development
- HOW TO CAPTURE STREAMING MEDIA?
- How To Change Thumbnail Size And Quality
- How To Setup Your Own Dns (Domain Name Server)?
- Important tutorials
- INTERNETWORKING CHALLENGES
- INTRODUCTION TO ROUTERS
- IP and IPv6 Protocols
- JAVA DATATYPES
- JAVA (THREADS
- JAVA NOTES
- JAVA SCRIPT NOTES
- JAVA SCRIPT OBJECTS
- LATEST CONTENT ON BANDWIDTH
- Microprocessor 8085
- Mobile networking through Mobile IP
- MULTICASTING
- Network Fault Tolerance
- Network Port Scanners
- Network Topologies
- Networking(Types of networks)
- OOPS(OBJECT ORIENTED PROGRAMMING)
- OTHER PC HARDWARE COMPONENTS
- RIP and RIP2: Routing Information Protocol
- STRING
- The CTDP Protocol Summary Version 0.6.0
- Traffic Filtering
- Types Of Business Networking
- Types of Network
- Virtual Private Networking
- What Is Network Latency?