Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Protocols

Posted on 2004-09-10
2
334 Views
Last Modified: 2010-03-18
Why are network protocols needed? How do you decide which protocol is more suitable for a network implementation?
0
Comment
Question by:jahsexy18
2 Comments
 
LVL 10

Expert Comment

by:dis1931
ID: 12032118
Sounds suspiciously like a school question....hmmmmm....
0
 
LVL 12

Accepted Solution

by:
valicon earned 500 total points
ID: 12032234
Network protocols are designed so that computers may comminicate. An agreed-upon format for transmitting data between two devices. The protocol determines the following:
the type of error checking to be used
data compression method, if any
how the sending device will indicate that it has finished sending a message
how the receiving device will indicate that it has received a message
There are a variety of standard protocols from which programmers can choose. Each has particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster.

From a user's point of view, the only interesting aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers. The protocol can be implemented either in hardware or in software.


  Here are a few links:

http://www.javvin.com/protocolsuite.html

http://www.winnetmag.com/Windows/Article/ArticleID/3027/3027.html

Hope this helps :)
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
UNC paths question 18 85
VLAN Tag for chained network device. 11 70
Using Windows Firewall to separate 2 networks on PC with dual NICS? 5 104
Setting up a VPN 60 177
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question