State the list of protocols supported by the intranet, Computer Networking

Assignment Help:

State the list of protocols supported by the Intranet

The following is the list of protocols supported by the Intranet:

  • ARP: Address resolution Protocol is used to resolve the hardware address of a card to package the Ethernet data. It works at the data link layer.
  • TCP: Transmission Control protocol is a connection oriented reliable protocol working at the transport layer.
  • IP: Internet Protocol. The IP part of TCP/IP; the protocol that is used to route a data packet from its source to its destination over the Internet.
  • FTP: File Transmission Protocol is a TCP/IP protocol running at the application layer.
  • TELNET:An Internet communications protocol that enables a computer to function as a terminal working from a remote available at the application layer.

(According to web reference TELNET derived from Telephone NETwork).

  • HTTP: Hypertext Transmission Protocol is the protocol used to communicate between web servers and web browser software clients.
  • SPX: Sequenced Packet Exchange operates at the transport layer providing connection-oriented communication on top of IPX etc.

 


Related Discussions:- State the list of protocols supported by the intranet

Explain about the digital traffic channels, Explain about the Digital traff...

Explain about the Digital traffic channels The most notable difference among the two generations is that first generation systems are almost purely analog, while second generat

What is meant by middleware, What is meant by Middleware? Middleware is...

What is meant by Middleware? Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle

Explain transparent bridges and learning bridges, Transparent Bridges & Lea...

Transparent Bridges & Learning Bridges - Builds table by examining destination as well as source address of each packet it receives - Learning bridges - If address is not

Commands and responses - application layer, Commands SMTP uses comma...

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Tcp, how tcp is redefined for wireless network

how tcp is redefined for wireless network

Digital encoding, A modified NRZ code known as enhanced-NRZ (E-NRZ) operate...

A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

Concurrently read exclusively write (crew), This  is one of the models base...

This  is one of the models based on PRAM. In this, the processors access the memory location parallel for reading while exclusively for writing operations. In the algorithm which u

What is star topology, What is Star topology Each station is directly c...

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd