Network Protocols

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Network protocols

A network protocol is an established set of rules that determine how data is transmitted between
different devices in the same network. Essentially, it allows connected devices to communicate with
each other, regardless of any differences in their internal processes, structure or design.

(Network protocols are the reason you can easily communicate with people all over the world, and thus
play a critical role in modern digital communications.)

Common Internet Protocol

1. TCP/IP (Transmission Control Protocol/Internet Protocol):

TCP/IP is the backbone of the internet. It consists of two main protocols:

 Transmission Control Protocol (TCP): Ensures reliable, ordered, and error-checked delivery of
data packets between devices. Specifies how data is exchanged over the internet and how it
should be broken into IP packets. The TCP is also known as a connection-oriented protocol.
 Internet Protocol (IP): Handles addressing and routing, allowing data to flow across
interconnected networks. This ensures that each computer that is connected to the Internet
is having a specific serial number called the IP address.

Together, TCP/IP governs how data is transmitted, received, and routed globally.

2. SMTP (Simple Mail Transfer Protocol):

 Used for sending and distributing outgoing emails. It defines how email clients (like Outlook
or Gmail) communicate with mail servers to deliver messages.
 When you hit "Send" on an email, SMTP takes care of the behind-the-scenes work.
 The message or the electronic mail may consider the text, video, image, etc.

3. PPP (Point-to-Point Protocol):

 PPP is commonly used for dial-up connections and connecting to internet service providers
(ISPs).
 It establishes a direct link between your computer and the ISP's server, allowing data to flow
back and forth.

4. FTP (File Transfer Protocol):

 FTP facilitates file transfers between computers on a network.


 This works on a client-server model.
 It's like a digital courier service, allowing you to upload, download, and manage files on remote
servers.

5. SFTP (Secure File Transfer Protocol):

 SFTP is an extension of FTP but adds encryption for secure file transfers.
 Also known as SSH FTP refers to File Transfer Protocol (FTP) over Secure Shell (SSH) as it
encrypts both commands and data while in transmission.
 It's commonly used for securely transferring files between clients and servers.

6. HTTP (Hypertext Transfer Protocol):

 HTTP is the foundation of the World Wide Web.


 This defines how the information needs to be formatted and transmitted.
 When you browse a website, your browser uses HTTP to request and retrieve web pages from
servers.
 Think of HTTP as the language web browsers and servers use to communicate.

7. HTTPS (Hypertext Transfer Protocol Secure):

 HTTPS is a secure version of HTTP.


 It adds an extra layer of encryption (using SSL/TLS) to protect data during transmission.
 It is used for secure communication over a computer network with the SSL/TLS protocol for
encryption and authentication.
 When you see the padlock icon in your browser's address bar, you're using HTTPS.

8. TELNET (Terminal Network):

 TELNET allows remote access to other computers over a network.


 It's like having a virtual terminal session on a distant machine, allowing you to execute
commands remotely.

9. POP3 (Post Office Protocol 3):

 POP3 retrieves emails from a mail server to your local email client (e.g., Outlook).
 It has two Message Access Agents (MAAs) where one is client MAA (Message Access Agent)
and another is server MAA (Message Access Agent) for accessing the messages from the
mailbox.
 It's the reason your inbox fills up with messages when you check your email.
 It can also be called a one-way client-server protocol.

10. IPv4 and IPv6:

 These are versions of the Internet Protocol (IP) that assign unique addresses to devices on a
network.
 IPv4 uses 32-bit addresses like (192.168.1.1), while IPv6 uses 128-bit addresses like
(2001:0db8:85a3:0000:0000:8a2e:0370:7334).

11. ICMP (Internet Control Message Protocol):

 ICMP handles error messages and network diagnostics (e.g., "ping").


 It's like a network troubleshooter, helping identify issues.

12. UDP (User Datagram Protocol):

 UDP is a lightweight, connectionless, unreliable transport layer protocol.


 UDP is typically used for real-time applications
 It's used for fast data transmission (e.g., streaming video or voice calls) but doesn't guarantee
reliability like TCP.

13. IMAP (Internet Message Access Protocol):

 IMAP allows you to manage emails on the server itself.


 Unlike POP3, it keeps your messages synchronized across devices.

14. SSH (Secure Shell):

 SSH provides secure remote access to servers.


 It's like a secret tunnel for secure communication between your computer and a distant
server.

15. Gopher:

 Gopher was an early protocol for organizing and retrieving documents.


 Gopher is a type of file retrieval protocol that provides downloadable files with some
description for easy management, retrieving, and searching of files.
 While it's less common now, it paved the way for the web we know today.

You might also like