protocol layer - meaning and definition. What is protocol layer
Diclib.com
Online Dictionary

What (who) is protocol layer - definition

NETWORK LAYER PROTOCOL
Packet-Layer Protocol

protocol layer         
  • Figure 2. The TCP/IP model or Internet layering scheme and its relation to some common protocols.
  • Figure 3. Message flows using a protocol suite. Black loops show the actual messaging loops, red loops are the effective communication between layers enabled by the lower layers.
  • Figure 5: Protocol and software layering. The software modules implementing the protocols are represented by cubes. The information flow between the modules is represented by arrows. The (top two horizontal) red arrows are virtual. The blue lines mark the layer boundaries.
SYSTEM FOR EXCHANGING MESSAGES BETWEEN COMPUTING SYSTEMS
Network protocol design principles; Data transmission protocol; Networking protocol; Protocol (computing); Protocol (computer science); Protocol (communication); Protocol (communications); Network protocols; Communication protocols; Communications protocols; Internetwork protocol; Protocol (networks); Protocol (network); Networking protocols; Protocols (computing); Protocol set; Data communication protocol; Protocol testing; Network Protocols; Binary protocol; Protocol (computer); Protocol versioning; Computer protocol; Protocol layer; Network protocol; Protocol design; Internetworking Protocol; Text-based protocol; Plain text protocol; Web protocol; Communications protocol; Universal protocols; Telecommunication protocol; Telecommunications protocol; Transmission protocol; History of communication protocols; Binary protocols; Wire image (networking)
<networking> The software and/or hardware environment of two or more communications devices or computers in which a particular network protocol operates. A network connection may be thought of as a set of more or less independent protocols, each in a different layer or level. The lowest layer governs direct host-to-host communication between the hardware at different hosts; the highest consists of user application programs. Each layer uses the layer beneath it and provides a service for the layer above. Each networking component hardware or software on one host uses protocols appropriate to its layer to communicate with the corresponding component (its "peer") on another host. Such layered protocols are sometimes known as peer-to-peer protocols. The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Examples of layered protocols are TCP/IP's five layer protocol stack and the OSI seven layer model. (1997-05-05)
Layer 2 Tunneling Protocol         
COMPUTER NETWORK PROTOCOL
NAS/LAC; L2TP; L2P; L2tp; Layer 2 tunneling Protocol; L2TP/IPsec; L2TP Network Server; L2TPv2
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It uses encryption ('hiding') only for its own control messages (using an optional pre-shared secret), and does not provide any encryption or confidentiality of content by itself.
Improved Layer 2 Protocol         
Draft:Improved Layer 2 Protocol
IL2P (Improved Layer 2 Protocol) is a data link layer protocol originally derived from layer 2 of the X.25 protocol suite and designed for use by amateur radio operators.

Wikipedia

Packet Layer Protocol

Packet Layer Protocol or PLP is the Network Layer protocol for the X.25 protocol suite. PLP manages the packet exchanges between DTE (data terminal) devices across VCs (virtual calls). PLP also can be used on ISDN using Link Access Procedures, D channel (LAPD).

There are 5 modes of PLP: call setup, data transfer, idle, call clearing, and restarting.

  • Call setup mode is used to create VCs (virtual calls) between DTE devices. A PLP uses the 14-digit X.121 addressing scheme to set up the virtual call.
  • Data transfer mode is used to send data between DTE devices across a virtual call. At this level PLP handles segmentation and reassembly, bit padding, error control and flow control.
  • Idle mode is used when a virtual call is established but there is no data transfer happening.
  • Call clearing mode is used to end sessions between DTE devices and to terminate VCs.
  • Restarting mode is used to synchronize the transmission between a DTE device and its locally connected DCE (data communications) device.

There are 4 types of PLP packet fields:

  • General Format Identifier (GFI): Identifies packet parameters (whether it is data or control information), what type of windowing is being used, and whether delivery confirmation is needed.
  • Logical Channel Identifier (LCI): Identifies the virtual call across the local DTE/DCE interface.
  • Packet Type Identifier (PTI): Identifies the PLP packet type (17 different types).
  • User Data—Contains encapsulated upper-layer information when there is user data present, otherwise additional fields containing control information are added.
Pronunciation examples for protocol layer
1. Protocol layer. It's not too different from what happens with
Reimagining the Internet _ Vint Cerf _ Talks at Google