Network Protocols – Encapsulation and Decapsulation

Network protocols are a predefined set of rules, which govern the transfer of data and communication between the computers connected in a network.

Protocols regulate the type of network access method, compression techniques while transferring data, the topologies, the cabling methods and even the speed of data transfer.

Network Protocols – Encapsulation and decapsulation

In this lesson, you learn will learn

Network Protocols – encapsulation and  decapsulation

1. Network protocols are a set of predefined rules
2. They are used by devices to communicate with each other
3. Different Network protocols are NetBIOS/NetBEUI, TCP/IP and IPX/SPX
4. NetBIOS protocol operate at the session layer of the OSI model
5. NetBIOS provides Name service, Session service and datagram service
6. Name service allows an application to register its NetBIOS name
7. Session service is a connection-oriented service for data transfer
8. In Datagram service, data is transferred in the form of datagrams
9. NetBIOS name resolution maps NetBIOS names to IP Address
10. Methods are NetBIOS Name Server, NetBIOS name cache and local Broadcast
11. NetBEUI is supported by LAN manager, LAN Server, Windows 95 and NT
12. TCP/IP is a five-layer protocol suite developed before the OSI model
13. TCP is connection-oriented process-to-process transport layer protocol
14. IP is responsible for source-to-destination delivery
15. Packets in IP layer are called datagrams consisting of data and header
16. Fragmentation is the devision of the datagram into smaller units
17. ARP protocol returns physical address when logical address is known
18. RARP protocol returns logical address when physical address is known
19. ICMP protocol is used to send error and control messages
20. Two types of ICMP messages are Error-reporting and Query messages
21. IGMP protocol governs the management of multicast groups in a Network
22.Three IGMP messages are Query, Membership Report and Leave Report
23. UDP protocol operates at the transport layer

For More Videos

Related Articles

Describe various Protocols

Troubleshooting Networking devices and testing using tools

Network Security and protocols explained in detailed

Thanks for your wonderful Support and Encouragement

Ankam Ravi Kumar

Working as Linux / Storage Administrator L3. Interested in sharing the knowledge.

Leave a Reply

Your email address will not be published. Required fields are marked *