Next Page

  1. Introduction
  2. Network Models
  3. Network Layers
  4. TCP/IP Protocols
  5. Microsoft Protocols
  6. IPX/SPX Protocols
  7. AppleTalk Protocols
  8. SNA Protocols
  9. Other Protocols
  10. Authentication Protocols
  11. Encryption Protocols
  12. Tunneling Protocols
  13. Terms and Definitions
  14. Credits

The CTDP Protocol Summary Version 0.6.0 September 17, 2000

Introduction

This document is a summary of protocols that are used for networking, security, and other functions. This document only covers protocols. It does not cover services, network architecture, or media (method of hardware transport) associated with networking. The CTDP Networking Guide or Certification Guide is best used to learn about services or media.

Protocols are sets of standards that define operations and how they will be done. Without protocols there would be much confusion and there would be no standard to allow computers to communicate. Protocols are a set of defined reactions to given events. When a traffic light turns red, the defined reaction should be to stop. This is a simple form of a protocol.

Protocols are used for various purposes in the computer field. Protocols are mainly used to define networking standards although their application may extend beyond the scope of networking. Different uses of protocols include:

  • Networking - There are different suites (or stacks) of networking protocols. The most popular include TCP/IP, IPX/XPX from Novell, NetBEUI/NetBIOS from Microsoft, AppleTalk, and SNA. Different protocols within each suite of protocols may perform different functions at different levels (see network levels in the next section). These protocols are listed by both layer and function in this documentation. The protocol stacks include:
    • TCP/IP
    • IPX/SPX
    • Microsoft
    • AppleTalk
    • SNA
    • Other - Includes OSI, DLC and SNAP.
    The function of the network protocols include:
    • Packaging (IP)
    • Transport (TCP,UDP)
    • Network Management (ICMP, SNMP, ARP)
    • Host Management (RARP, BOOTP, DHCP)
    • Network Routing (BGP, EGP, IGP, RIP, OSPF)
    • Mail (SMTP)
    • Multicasting (IGMP)
    • Application (FTP, TFTP, NFS)
  • Security
    • Authentication
    • Encryption
    • Tunneling
  • Directory (LDAP)