ALL >> Business >> View Article
You Are Configuring A New Windows Vista Computer

Protocols are nothing more than an agreed-upon way for two objects (people, computers, home appliances, and so on) to exchange information. There are protocols at various levels in the OSI model. In fact, it is the protocols at a particular level in the OSI model that provide that level’s functionality. Protocols that work together at one or more layers of the OSI model are known as a protocol stack or protocol suite . The following sections explain how network protocols move data between machines.
How Protocols Work
A protocol is a set of basic steps two or more parties perform according to a predefined or agreed-upon set of standards. A good example of a protocol that follows some unwritten but largely agreed-upon standards is a telephone conversation. When one person mcitp certification
places a phone call, they dial the number of another party. The person on the other end answers the phone and says something akin to “Hello,” at which point the calling party responds with a similar greeting. The conversation ensues from there. When the conversation is complete, ...
... each party (usually) ends the call with some parting words such as “Good-bye.” This telephone call followed a routine protocol:
In the realm of computers, a protocol follows the same concept. A protocol is a set of pre- defined standards that both computers must perform in the right order. For instance, for one computer to send a message to another computer, the first computer must perform the steps given in the following general example:
Break the data into small sections called packets (or segments , or another name depending on the layer involved).
Add addressing information to the packets, identifying the destination computer. Deliver the data to the network card for transmission over the network.
The receiving computer must perform these microsoft exam
steps: Accept the data from the network adapter card.
Remove the transmitting information that was added by the transmitting computer. Reassemble the packets of data into the original message.
Each computer needs to perform the same steps, in the same way and in the correct order, so that the data will arrive and be reassembled correctly. If one computer uses a protocol with different steps or even the same steps with different parameters (such as different sequencing, timing, or error correction), the two computers won’t be able to communicate with each other.
Add Comment
Business Articles
1. Technology Landscape, Trends And Opportunities In Cognitive Security MarketAuthor: Lucintel LLC
2. Technology Landscape, Trends And Opportunities In Broadcast Switcher Market
Author: Lucintel LLC
3. How Sustainability Consultants In The Uae Help You Go Green
Author: GREEN BUILDING
4. Technology Landscape, Trends And Opportunities In Bipolar Type Ldo Linear Regulator Market
Author: Lucintel LLC
5. Professional Hair Salon In Santa Monica For Exceptional Style
Author: Jeny Mark
6. Trusted Santa Monica Hair Salon For Your Perfect Look
Author: Jeny Mark
7. The Timeless Importance Of Gold
Author: Londe Jewellers
8. Data Center Security In Chennai: Providing Protection For Critical Infrastructure
Author: Qadit
9. Data Privacy And Security In Bangalore: To Safeguard The Digital Future
Author: Qadit
10. Technology Landscape, Trends And Opportunities In Battery Packaging Market
Author: Lucintel LLC
11. Stylish Louisville Blinds And Drapery For Your Home
Author: Deny Mark
12. Enhance Your Home With Window Blinds In Louisville, Ky
Author: Deny Mark
13. Best Dinner Restaurants In Noida – Experience Fine Dining At Stellar Binge
Author: Stellar Binge
14. Technology Landscape, Trends And Opportunities In Flip Chip Package Market
Author: Lucintel LLC
15. Why Muscat Is Becoming The Go-to City For Cryptocurrency Exchange Development
Author: Harperbrown