answersLogoWhite

0

PROTOCOL : Is a set of "RULES" and "REGULATIONS" for seding and receiving Information on the NETWORK, by using the standard protocols.TCP/IP.

imran quadri.

Answer--A protocol is a set of rules or agreed upon guidelines for communication. When communicating, it is important to agree on how to do so. If one party speaks Indian and one German the communications will most likely fail. If they both agree on a single language, communications will work. On the internet the set of communications protocols used is called TCP/IP. TCP/IP is actually a collection of various protocols that each have their own special function or purpose. These protocols have been established by international standards bodies and are used in almost all platforms and around the globe to ensure that all devices on the Internet can communicate successfully. AnswerAccording to Princeton dictionary, protocol can mean 3 things:

- code of behavior, code of conduct

- forms of etiquette

- communications protocol (computer science)

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

The TCP IP suite of protocols is implemented by?

TCP/IP protocols are implemented by software, except for the bottom physical layer, which is implemented in hardware.


What is An NOS that contains a back dooris an example of a risk associated with?

Protocols and software


What is the need of protocol and standards?

Adherence to Protocols & Standards in designing software, protocols & firmware provides compatibility & assurance of functionality (i.e. independenct of environment if properly used).


What related to software and protocols is not appropriate for safeguarding information on DOD web srvers?

Enabling IP forward capability


An nos with a backdoor is an example of a risk associated with what?

Protocols and Software Network+ Guide to Networks pg. 580-581


What measures are being taken to address the issue of leak patches in the software system?

To address the issue of leak patches in the software system, measures such as regular software updates, security audits, and implementing encryption protocols are being taken.


The application layer protocol used by instant messaging software?

there are a number of protocols used by IM program. some programs like skype uses propriety protocols and are not disclosed and other program like google talk uses open sources. among open source protocols are XMPP and SIMPLE


What Ensures that the information is correct and that no unauthorized person or malicious software program has altered that data?

There are a variety of security protocols that are used for that purpose.


Is it possible for a port number to be used by both TCP and UDP?

Yes, it's possible. It's matter of software, and on software level it's very easy to create such server applications which could use the same port but with different protocols. The only thing is that the port cannot be used in the same time for the two different protocols. It should one or another.


What software types may be incompatible with Windows XP professional?

Third-party networking protocols, antivirus applications, Custom power management tools.


Are network functions only associated with one layer of the OSI model?

No, At each layer, protocols perform servers unique to that layer. While performing those services, the protocols also interact with protocols in the layers directly above and below. In addition, at the top of the OSI model, Application layer protocols interact with the software you use. At the bottom, Phsyical layer services act on the networking cables and connectors to issue and receive signals.


Does Mac OS support P2P networking?

Yes OS X supports P2P protocols and many other common protocols to windows, so there should not be a problem as long as you have compatible software.