Protocol Usage by Each Layer

Protocol Usage by Each Layer

Project Name: Protocol Usage by Each Layer

Description:This article will help every one to understand network protocol usage by each layer. i.e which protocol used on which ISO / OSI layer.

Author: Rohit D Sadgune / Amruta Sadgune

FAQ:-

  1. Network Services by ISO/OSI layer
  2. Necessity Network Protocols?
  3. What is protocol Stack
  4. Routed vs Routing Protocol

Networking Protocols

A protocol is a set of rules that controls the communication between computers on a network. These control statements include instructions that modulate the characteristics of a network: access method, physical topologies, speed of data transfer.

 Protocol Stack

A protocol stack is the complete set of controls that work together to provide networking capabilities over ISO/OSI layers

Necessity Network Protocols?

We need Network Protocols for:

  • Communication encoding
  • Communication formatting and encapsulation
  • Communication timing
  • Communication size
  • Communication delivery options

Routed vs Routing Protocol

Routed protocols are those protocols which support network data traffic. Examples of routed protocols are IPv4, IPv6 and AppleTalk.

Routing protocols are the ones that are responsible for sending network traffic. Examples of routing protocols are RIP(Routing Information Protocol), EIGRP(Enhanced Interior Gateway Routing Protocol) and OSPF(Open Shortest Path First).

Protocol Usage by Each Layer

ISO /OSI LayerProtocol / Services
ApplicationSMTP, HTTP, HTTPS, FTP, POP3, SNMP, DHCP, DNS Domain Name System, NFS, POP3, IEC 61850, ICCP, BACnet, OpenADR, GOOSE, NTP, IRC, Telnet, SSH, TFTP, SEP2, DNP3, AMQP Advanced Message Queuing Protocol, IMAP4, NNTP, XMPP, MIME, BGP, SOAP, L2TP
PresentationMPEG, ASCH, SSL, TLS, AFP Apple Filing Protocol, FTP, IMAP, SSH, Telnet
SessionNetBIOS, SAP, NCP NetWare Core Protocol, PAP Password Authentication Protocol, RPC Remote Procedure Call, RTCP RTP Control Protocol, NFS, SQL, SMB, P2P Tunnelling, SCP, SDP, SIP, H.323
TransportTCP, UDP, AEP AppleTalk Echo Protocol, DCCP Datagram Congestion Control Protocol, ESP Encapsulating Security Payload over IP or IPSec, FCP Fiber Channel Protocol, NetBIOS NetBIOS, File Sharing and Name Resolution, NBF NetBIOS Frames Protocol, SCTP Stream Control Transmission Protocol, SPX Sequenced Packet Exchange, NBP Name Binding Protocol {for AppleTalk}
NetworkIPv4, IPv6, ICMP, IGMP, IPSEC, ARP, MPL, Virtual Router Redundancy Protocol, IPSec, RSVP, IPX/SPX
Data LinkRAPA, PPP, Frame Relay, ATM, Fiber Cable,  ARCnet Attached Resource Computer NETwork, ARP Address Resolution Protocol, ATM Asynchronous Transfer Mode, CHAP Challenge Handshake Authentication Protocol, CDP Cisco Discovery Protocol, DCAP Data Link Switching Client Access Protocol, DTP Dynamic Trunking Protocol, LACP Link Aggregation Control Protocol, LLDP Link Layer Discovery Protocol, NDP Neighbor Discovery Protocol, PPP Point-to-Point Protocol, PPTP Point-to-Point Tunneling Protocol, PAP Password Authentication Protocol, Space Data Link Protocol, STP Spanning Tree Protocol, Split multi-link trucking Protocol .etc.
PhysicalRS232, 100BaseTX, ISDN, PLC, SONET/SDH, G.709
Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

1 thought on “Protocol Usage by Each Layer

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image