answersLogoWhite

0

There are many ways to communicate between networks. The rules for doing so are called protocols, and there are many known protocols. Some are historical in nature (meaning they have been around a long time) and some are newer ones developed in the last few years.

Protocols describe how to communicate and when to communicate. They may be specific to a means of communication (i.e. web traffic, email traffic) or they may be more general (TCP/IP - covering many protocols).

Deciding on which protocol to communicate with other networks is based on how the networks communicate currently and what kind of traffic will be transferred between the two. A protocol is designed so that there are common rules regarding communication, so certain protocols will be used to be common between networks.

TCP/IP is an example of a very common, widely-used communication protocol.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What wired network security protocols called?

Wired network security protocols include several standards aimed at protecting data integrity and confidentiality. Key protocols are IEEE 802.1X for port-based network access control, and IPsec, which secures Internet Protocol communications by authenticating and encrypting each IP packet. Additionally, protocols like WPA (Wi-Fi Protected Access) and WPA2, while primarily for wireless networks, are also relevant for securing data over wired connections in certain configurations. These protocols work together to ensure secure communication within wired networks.


What has the author Walter Donheiser written?

Walter Donheiser has written: 'The effect of motivation and problem complexity upon the efficiency of certain communication networks'


Why you have two addresses Mac and protocol?

I guess you mean MAC and IP. Protocol could be any of these, and others more.A MAC address is used to communicate within a certain network, for example, Ethernet.An IP address is used to communicate between different kinds networks, or the same kind of network, but in any case, covering several hops.Layer-3 protocols, such as IP, were developed precisely to provide compatibility between otherwise incompatible networks.


What are the merits of Networks?

1) Helps you to exchange information with the computers within the same network 2) Have different topologies With certain merits and demerits 3) Makes communication easy.


The communication between honeybees would not be classified as language because?

they dance they dance in a certain region in the comb


Can a DS be hooked up to a Wii System?

Certain games support communication between the DS and the Wii.


How to unblock Gmail from blocked sites?

Your school has blocked certain sites - to try to get you to concentrate on your lessons - not use their computers for personal communication which should be done from home ! We in the Wiki community will not help you bypass your school's security protocols !


What devices are commonly used as a DCE?

Data Communication Equipment (DCE) typically includes devices such as modems, network switches, and bridges. These devices facilitate the transmission of data over communication channels by converting digital signals to analog and vice versa. Additionally, routers can also function as DCE in certain configurations, managing data flow between different networks. Overall, DCE devices play a crucial role in establishing and maintaining communication links.


How does TCP and IP address works on networking?

TCP/IP is composed of layers, wherein each layer is responsible for performing certain operations on the data it receives and passing it to the higher layers. Each layer deals with certain issues related to the transmission of data and renders certain services to its higher layers. The TCP/IP model consists of the link layer, the Internet layer, the transport layer and the application layer. Each layer consists of a set of protocols that function on the level of that layer. The link layer protocols are responsible for connecting the nodes in a network. The Internet layer consists of protocols, specifications and methods that are used to transport data packets across the network. The transport layer protocols deal with the transmission of data packets between source and destination network hosts. The application layer, the topmost layer in TCP/IP, directly interacts with application services. Thus, we see that TCP/IP functions at all the levels of communication between the components of a network. It is truly, the heart of network communication.


Why cant certain computers connect to wireless networks?

There are only some types of computer that will connect to certain types of wireless networks. Notebooks can connect to wireless networks like laptops do; just make sure your router is picking up signals and that its appearing on your notebook.


Which among the following is considered a line-of-sight communication medium?

A line-of-sight communication medium refers to a transmission method where the sender and receiver must have a clear, unobstructed path between them. Examples include optical fiber, microwave links, and free-space optical communications. These mediums rely on direct visibility for effective signal transmission, making them suitable for applications like satellite communications and certain wireless networks.


Can peer to peer network are not flexible?

Peer-to-peer (P2P) networks can be flexible in many ways, as they allow direct communication and resource sharing between nodes without relying on a central server. However, their flexibility can be limited by factors such as network size, varying node reliability, and the absence of centralized management, which can complicate coordination and data consistency. Additionally, changes in network structure or performance may require significant adjustments, making some P2P networks less adaptable in certain contexts. Overall, while P2P networks offer flexibility, their effectiveness can be hindered by inherent challenges.