• All
  • Profil
  • Webhost
gravatar

Protocol in the Network


Most networks have been prepared as a stack of layers, or levels, this is done to reduce the complexity of network software design. The number, name of contents, and function of each layer is different for each network, but all the layers in the network created with the aim of serving the layer that is above them.
Service and protocol are two different things. Service is a set of primitive / operation provided a layer to layer. While the protocol is the number of rules governing the format and meaning of a frame, packet, or a message passed between two peer entities within a layer.

Protocol is a set of rules that govern communication between multiple computers on a network, including essential in it instructions or methods of accessing a network, physical topology, cable types, and data transfer speeds.

Protocols that are known are as follows:


1. Ethernet is a networking system that created and patented the company Xerox. Ethernet speed at that time only 3 Mbps, and recognizable as the Experimental Ethernet. Ethernet is an implementation method CSMA / CD (Carreir Sense Multiple Access with Collision Detection). Standardization of Ethernet systems conducted since 1978 by the IEEE. The speed of data transmission in ethernet so far is 10 to 100 Mbps. Currently there are common on the market is 10 Mbps Ethernet speed - 100 Mbps, commonly called 10Base/100base series. There are many different types of 10Base, including: 10Base5, 10Base2, 10BaseT, 10Base-F san.

2. Local Talk is a network protocol that was originally developed by Apple Computer, Inc.. For Macintosh machines of the most glaring shortcomings contained in the transmission speed of only 230 kbps

3. Token Ring IEEE 802.5 standards-based and operate at 4 or 16 MBps. With the Token-Ring, network devices are physically connected in a ring configuration where data is passed from one device to another device in sequence. A control package, known as a control token, also passed in the ring. Tool that wants to send data will take tokens, fill it with data, then restore it to ring. The receiver will take the token it, emptied it, then return to the ring. This protocol prevents collision data and produce better performance on high-level bandwidth usage.

4. FDDI is a partner IEEE 802 Ethernet LAN technology that supports data transfer of 100 Mbps for distances up to 100 km. FDDI is not IEEE standards and operate over fiber optic cables by using Counter-Ring architecture rounting Kebar which can connect up to 500 devices per ring. Twin Ring allows the LAN continue to operate when there is a failure on one ring or node.

5. Redundant is a form of packet switching technology that uses fixed length data cells (53 bytes) of virtual circuits. With a fixed cell size and small data, will enable the switching on high-speed throughput. with a very small delay and a fixed time interval between data cells, allowing oplikasi voice and video sent over the LAN and a variety of different data types are combined in the same network. ATM operates from 25 MBps to 622 MBps.
from : http://rj45.co.cc/2010/09/27/protokol-dalam-jaringan.htm