answersLogoWhite

0


Best Answer

Best written explaination is from:

http://www.edrawsoft.com/Network-Protocol.php

Types of Network Protocols

The most common network protocols are:

Ethernet

Local Talk

Token Ring

FDDI

ATM

Types of Network Protocols

Ethernet

The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network.

The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.

Fast Ethernet

To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired.

Local Talk

Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The Macintosh operating system allows the establishment of a peer-to-peer network without the need for additional software. With the addition of the server version of AppleShare software, a client/server network can be established.

The Local Talk protocol allows for linear bus, star, or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed. Its speed of transmission is only 230 Kbps.

Token Ring

The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased.

FDDI

Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.

ATM

Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.

ATM is most often used to interconnect two or more local area networks. It is also frequently used by internet Service Providers to utilize high-speed access to the Internet for their clients. As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks.

Gigabit Ethernet

The most recent development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for backbones on a network at this time. In the future, it will probably be used for workstation and server connections also. It can be used with both fiber optic cabling and copper. The 1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the formal standard in 1999.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

Protocols are used by users for browsing the web, dowlnloading files, etc. When you write http:something.com you are using the http protocol to view the webpage something.com

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What roles do various protocols play on the internet?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What ecological roles do animals fulfill?

Animals fulfil their ecological roles in various ways. They are part of the food web and they will play their respective role as a predator or as prey in the food web.


What roles do gears play in the job of a corporate lawyer?

A corporate lawyer is a high gear job and has various roles. Some of the roles of corporate lawyers include overseeing commercial transactions and providing legal advice to corporations.


Roles of managers in a business?

A manager in a business sector has to play various roles-as a figure head, as a Liaison,as a leader,as a moderator,as a disseminator,as a spokesperson,as a entrepreneur,as a disturbance handler,as a resource allocator and as a negotiator.


What character does Amanda Bynes play in the film hairspray?

In Hairspray, Amanda Bynes is the character Penny.


What roles do Rhizobium play in the root system of plants?

Rhizomes are stems that spread to allow a plant to sucker up at various locations, vegative reproduction.


Name four roles that you play in various relationships in your life?

The troll, the person being trolled, the other troll, and the troll under the bridge. Problem?


What is symbolic interactionism?

Symbolic interactionism is a sociological theory created by Irving Goffman. The theory asserts that the world is a stage and we all play various roles.


What do average people do on internet?

English. Or if being technical then HTML.


Online games no download?

There are various online games available to play on the internet which do not require a download. For example, there is Runescape.


What roles did climate natural resources and trade play in the development?

Roles..


Roles do nucleotides play in living organisms?

In living organisms, nucleotides play important roles in metabolism and signaling.


What roles do DHCP and DNS play?

DHCP is a host configuration protocol and is dynamic . DHCP is short for Dynamic host configuration protocol and is backward compatible with earlier protocols like BOOTp . DNS is domain name system that maps name to an IP address.