What is a Network Communication Protocol?

Map Of Internet 1973

About

A network protocol is a protocol:

  • that describes the computer language
  • that will allow two or more computer processes to communicate together.

Protocols are instructions for multiple agents. Algorithms are instructions for single agents.

Manuel Blum #hlf14

Level

A protocol has only one OSI level (Open Systems Interconnection)

Lower Level

These Protocols are in the lower Layer level of OSI (Open Systems Interconnection) and manipulate packets.

They implement packets:

  • Addressing,
  • routing
  • and traffic control

Example: The most known are the protocols in the Transport layer

These protocols communicate via sockets

Type Client Server Installation Machine
TCP/IP sockets Two different
UNIX domain sockets Same
Shared Memory Same

Using a Shared Memory segment allows for the best performance, but greater memory usage. Using UNIX domain sockets allows for improved performance over TCP/IP, but with less memory consumption than a shared memory segment connection.

Higher level

This higher level (mostly the Application Layer (level 7)) is a wrapper around the lower levels and exposes you with a message (and not with packet)

Example:

Web:

Email

Console

IP

File Transfer

Message

Naming directory

The banner is the first message that the server sends before any protocol exchange when a client connects.

Visualisation

A protocol being a process between multiple agents is visualized with all process diagrams such as:

Example of Sequence for the oauth code flow

sequenceDiagram participant Cli as Client participant RO as Resource Owner participant AS as Authorization Server participant RS as Resource Server Cli->>RO: (A) Send a Authorization Request RO->>Cli: (B) Get a Authorization Grant Cli->>AS: (C) Send the Authorization Grant AS->>Cli: (D) Get a Access Token Cli->>RS: (E) Send the Access Token RS->>Cli: (F) Get the Protected Resource

Operating System

Windows

Windows - System Information will list low network protocol (OSI Layer 4) such as:

Windows Network Protocol Sysinfo

1)

1)
Page 39, 2.1.2 - Book - Hopcroft, Motwani, Ullman, Automata Theory, Languages, and Computation 3rd Edition. pdf





Discover More
Card Puncher Data Processing
Application Analytics - Measurement Protocol

The measurement protocol defines the communication protocol (ie how and what) that is used between the tracker and the collector. It has generally two parts: The transport – to where and how you...
Testing Infrastructure
Computer - (Workload|Load) Generator / Stress Tool

This page is Load Test tool that may have one or several protocol. - Tsung (formerly IDX-Tsunami) is a distributed load testing tool. It is protocol-independent...
Map Of Internet 1973
Ethernet - Frame

A frame or packet frame is the data unit of ethernet that is transmitted between network points with: addressing and necessary protocol control information. A frame is usually transmitted serial...
Map Of Internet 1973
File Transfer - SCP (Secure Copy)

scp is build above a SSH. Scp permits to copy file locally but also remotely (between two computers). Scp is also a protocol. See Secure copy. Originally, SCP is a command line utility that can copy...
Map Of Internet 1973
File Transfer - SFTP (SH file transfer protocol)

In computing, the SSH File Transfer Protocol (sometimes called Secure File Transfer Protocol or SFTP) is a network protocol that provides: file access, file transfer, and file management functionality...
Map Of Internet 1973
File Transfer - Server Message Block (SMB) - Common Internet File System (CIFS)

SMB stands for Server Message Block and is also known as Common Internet File System (CIFS). It's the name for the communications protocol used by various operating systems produced by Microsoft over...
Map Of Internet 1973
File Transfer Protocol ( FTP )

FTP File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP based network, such as the Internet. FTP is built on a client-server architecture and...
Firewalld - How to filter your traffic based on an IP, port or Region?

This page shows you how to filter your traffic based on a IP with firewalld rich rules. where: --permanent means that the rule will be used even after reboot. --add-rich-rule specifies the rich...
How to create and manipulate an URL in Javascript? (Browser URL Object)

This article shows you how to get and manipulate an URL with Javascript. URL You can manipulate an URL with the URL web API object Build an URL object Print a URL properties (...host, hostname,...)...
Kafka Commit Log Messaging Process
Kafka - Protocol

The kafka protocol is explained ion this page:



Share this page:
Follow us:
Task Runner