-
First of all, the network protocol is certainly not the "working software under the protocol rules" you say.
In order to exchange data in an orderly manner in a computer network, it is necessary to follow some pre-agreed rules. These rules clearly state the format of the data exchanged and the associated synchronization issues. These rules, standards, or conventions established for the exchange of data in a network are network protocols.
For example, if you want cars, bicycles, and pedestrians on the road to be in order and out of chaos, you must obey the traffic rules, and the "Internet Protocol" is similar to this "traffic rules"!!
-
In layman's terms, the network protocol is the bridge of communication and exchange between networks, and only computers with the same network protocol can communicate and exchange information. This is just like the various languages used to communicate between people, and only when the same language is used can communication be normal and smooth. From a professional point of view, a network protocol is a convention that a computer must abide by when communicating in a network, that is, a communication protocol.
It is mainly to stipulate and formulate standards for the rate, transmission, structure, transmission control steps, error control, etc. of information transmission.
-
It's not appropriate to compare it to traffic rules, and without traffic rules, everyone still has to cross the street. I read a blog post that compares the network protocol to the common language of the world - English, everyone knows English, and there is no barrier to communication between so many countries around the world. In the same way, the network protocol is the lingua franca of the online world, and only when everyone abides by the lingua franca can the online world achieve barrier-free communication.
-
A collection of rules, standards, or conventions established for the exchange of data in a computer network. For example, a microcomputer user and a mainframe operator in a network communicate with each other, and the commands entered by the operators do not recognize each other because the two data terminals use different character sets. In order to be able to communicate, it is stipulated that each terminal must first convert the characters in its own character set into characters in the standard character set before entering the network for transmission, and then transform them into characters in the terminal character set after reaching the destination terminal.
Of course, for incompatible terminals, in addition to changing the character set characters, other characteristics need to be converted, such as display format, line length, number of lines, screen scrolling mode, etc.
A protocol is a regular term used to describe the exchange of information between processes (see Jurisprudence for definition of "agreement"). In a computer network, two entities communicating with each other are geographically different, and two processes on them communicate with each other and need to coordinate their actions to achieve synchronization by exchanging information, and the exchange of information must be carried out according to pre-agreed rules.
-
A network protocol is a collection of rules, standards, or conventions established for the exchange of data in a computer network.
A network protocol is a language rule in a computer network that is used to communicate between devices in a network. A network protocol is a combination of a series of norms, standards, or agreed procedures, which stipulate the communication methods of the two parties, the format of information transmission, and the processing process. Through the implementation of network protocols, all devices in the network are able to communicate and collaborate with each other and can be seamlessly connected to the entire network.
Network protocol is one of the key technologies to realize the efficient transmission and sharing of information and information. Although network protocols have become an indispensable existence in computer networks, with the development of Internet technology, the application and research of network protocols is still a process of continuous evolution. Therefore, the in-depth understanding and research of network protocols is still of great significance.
Benefits of Network Protocols:
The network protocol provides detailed regulations and descriptions on the encryption, verification, authentication and other mechanisms of data transmission, which protects the private data and important information in the network from being illegally obtained and tampered with. Through the access control mechanism and user identity authentication specified in the network protocol, the security of devices and data in the network can be ensured, and the overall reliability and security of the network can be improved.
The importance of network protocols lies not only in the fact that they ensure the normal operation and security of the network, but also provide favorable conditions for technological innovation. The continuous updating and expansion of network protocols has laid the foundation for the development and application of the new generation of Internet. The birth of the IPv6 protocol has greatly expanded the network address space, supported more devices and users to connect to the Internet, and promoted the popularization and development of the Internet.
Why does the protocol structure of the LAN not include the network layer, the process of network access is actually a process of finding the way by checking the map. 1.One layer mainly refers to physical transmission, which involves mutual access, so it is impossible not to have a layer, in other words, how can you communicate with others without physical transmission? >>>More
This involves the knowledge of cookis, check out this:
Cookies were developed by Netscape as a way to persistently store state and other information, and most browsers currently support the cookie protocol. A cookie is a text file stored in your browser directory that records your visit to a particular site and can only be read back by the site that created the cookie, consisting of about 255 characters and taking up only 4 KB of hard disk space. When the user is browsing a site, it is stored in the RAM of the user's RAM and on the user's hard drive when the browser is exited. >>>More
OSI is an open reference model for interconnection of access systems, and it is a very well defined protocol specification. The OSI model has a 7-layer structure, and each layer can have several sub-layers. Let me briefly introduce these 7 layers and their functions. >>>More
User Datagram Protocol (UDP) is a connectionless transport layer protocol that provides the basic mechanism for transmitting datagrams between applications. >>>More
Hello, the VAM has nothing to do with gambling, but when there is a certain uncertainty about the future profitability of the enterprise, it sets certain terms to achieve the reasonableness and fairness of the investment transaction as much as possible. A VAM is an agreement between the investor and the financier to enter into a financing agreement due to uncertain circumstances in the future, and the financier can exercise a right if the agreed conditions appear. If the agreed conditions do not appear, the investor exercises a right. A VAM is actually a form of option, which can not only protect the interests of the investor, but also play a certain incentive role for the financier. >>>More