Communication protocol in the context of "File Transfer Protocol"

Play Trivia Questions online!

or

Skip to study material about Communication protocol in the context of "File Transfer Protocol"




⭐ Core Definition: Communication protocol

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information. The protocol defines the rules, syntax, semantics, and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both.

Communicating systems use well-defined formats for exchanging various messages. Each message has an exact meaning intended to elicit a response from a range of possible responses predetermined for that particular situation. The specified behavior is typically independent of how it is to be implemented. Communication protocols have to be agreed upon by the parties involved. To reach an agreement, a protocol may be developed into a technical standard. A programming language describes the same for computations, so there is a close analogy between protocols and programming languages: protocols are to communication what programming languages are to computations. An alternate formulation states that protocols are to communication what algorithms are to computation.

↓ Menu

In this Dossier

Communication protocol in the context of Cryptography

Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanizedkryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (data confidentiality, data integrity, authentication and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords and military communications.

Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information (plaintext) to unintelligible nonsense text (ciphertext), which can only be read by reversing the process (decryption). The sender of an encrypted (coded) message shares the decryption (decoding) technique only with the intended recipients to preclude access from adversaries. The cryptography literature often uses the names "Alice" (or "A") for the sender, "Bob" (or "B") for the intended recipient, and "Eve" (or "E") for the eavesdropping adversary. Since the development of rotor cipher machines in World War I and the advent of computers in World War II, cryptography methods have become increasingly complex and their applications more varied.

↑ Return to Menu

Communication protocol in the context of Computer network

In computer science, computer engineering, and telecommunications, a network is a group of communicating computers and peripherals known as hosts, which communicate data to other hosts via communication protocols, as facilitated by networking hardware.

Within a computer network, hosts are identified by network addresses, which allow networking hardware to locate and identify hosts. Hosts may also have hostnames, memorable labels for the host nodes, which can be mapped to a network address using a hosts file or a name server such as Domain Name Service. The physical medium that supports information exchange includes wired media like copper cables, optical fibers, and wireless radio-frequency media. The arrangement of hosts and hardware within a network architecture is known as the network topology.

↑ Return to Menu

Communication protocol in the context of Connection-oriented communication

In telecommunications and computer networking, connection-oriented communication is a communication protocol where a communication session or a semi-permanent connection is established before any useful data can be transferred. The established connection ensures that data is delivered in the correct order to the upper communication layer. The alternative is called connectionless communication, such as the datagram mode communication used by Internet Protocol (IP) and User Datagram Protocol (UDP), where data may be delivered out of order, since different network packets are routed independently and may be delivered over different paths.

Connection-oriented communication may be implemented with a circuit switched connection, or a packet-mode virtual circuit connection. In the latter case, it may use either a transport layer virtual circuit protocol such as the Transmission Control Protocol (TCP) protocol, allowing data to be delivered in order. Although the lower-layer switching is connectionless, or it may be a data link layer or network layer switching mode, where all data packets belonging to the same traffic stream are delivered over the same path, and traffic flows are identified by some connection identifier reducing the overhead of routing decisions on a packet-by-packet basis for the network.

↑ Return to Menu

Communication protocol in the context of Internet protocol suite

The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP). Early versions of this networking model were known as the Department of Defense (DoD) Internet Architecture Model because the research and development were funded by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense.

The Internet protocol suite provides end-to-end data communication specifying how data should be packetized, addressed, transmitted, routed, and received. This functionality is organized into four abstraction layers, which classify all related protocols according to each protocol's scope of networking. An implementation of the layers for a particular application forms a protocol stack. From lowest to highest, the layers are the link layer, containing communication methods for data that remains within a single network segment (link); the internet layer, providing internetworking between independent networks; the transport layer, handling host-to-host communication; and the application layer, providing process-to-process data exchange for applications.

↑ Return to Menu

Communication protocol in the context of Donald Davies

Donald Watts Davies, CBE FRS (7 June 1924 – 28 May 2000) was a British computer scientist and Internet pioneer who was employed at the UK National Physical Laboratory (NPL).

During 1965-67 he invented modern data communications, including packet switching, high-speed routers, layered communication protocols, hierarchical computer networks and the essence of the end-to-end principle, concepts that are used today in computer networks worldwide. He envisioned, in 1966, that there would be a "single network" for data and telephone communications. Davies proposed and studied a commercial national data network in the United Kingdom and designed and built the first implementation of packet switching in the local-area NPL network in 1966-69 to demonstrate the technology. Many of the wide-area packet-switched networks built in the late 1960s and 1970s were similar "in nearly all respects" to his original 1965 design. Davies' work influenced the ARPANET in the United States and the CYCLADES project in France, and was key to the development of the data communications technology used in Internet, which is a network of networks.

↑ Return to Menu

Communication protocol in the context of Automated negotiation

Automated negotiation is a form of interaction in systems that are composed of multiple autonomous agents, in which the aim is to reach agreements through an iterative process of making offers.

Automated negotiation can be employed for many tasks human negotiators regularly engage in, such as bargaining and joint decision making. The main topics in automated negotiation revolve around the design of protocols and strategies.

↑ Return to Menu

Communication protocol in the context of USB-C

USB‑C, or USB Type‑C, is a 24-pin reversible connector (not a protocol) that supersedes all previous USB connectors, which were designated legacy in 2014. This connector also supersedes Mini DisplayPort and Lightning connectors. USB-C is used for a variety of purposes: exchanging data with peripheral devices, such as external drives, mobile phones, keyboards, track-pads, and mice, or between hosts, or transferring A/V-data to displays and speakers, or also powering peripheral devices and getting powered by power adapters; either through directly wired connectors, or indirectly via hubs and docking stations. This connector type can be used for other data transfer protocols besides USB, such as Thunderbolt, PCIe, DisplayPort, and HDMI. It is considered extensible, allowing the support of future protocols.

The design for the USB‑C connector was initially developed in 2012 by Intel, Apple Inc., HP Inc., Microsoft, and the USB Implementers Forum. The Type‑C Specification 1.0 was published by the USB Implementers Forum (USB-IF) on August 11, 2014. In 2016 it was adopted by the IEC as "IEC 62680-1-3".

↑ Return to Menu

Communication protocol in the context of USB

Universal Serial Bus (USB) is an industry standard, developed by USB Implementers Forum (USB-IF), for digital data transmission and power delivery between many types of electronics. It specifies the architecture, in particular the physical interfaces, and communication protocols to and from hosts, such as personal computers, to and from peripheral devices, e.g. displays, keyboards, and mass storage devices, and to and from intermediate hubs, which multiply the number of a host's ports.

Introduced in 1996, USB was originally designed to standardize the connection of peripherals to computers, replacing various interfaces such as serial ports, parallel ports, game ports, and Apple Desktop Bus (ADB) ports. Early versions of USB became commonplace on a wide range of devices, such as keyboards, mice, cameras, printers, scanners, flash drives, smartphones, game consoles, and power banks. USB has since evolved into a standard to replace virtually all common ports on computers, mobile devices, peripherals, power supplies, and manifold other small electronics.

↑ Return to Menu

Communication protocol in the context of Network architecture

Network architecture is the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used.

In telecommunications, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.

↑ Return to Menu