0% found this document useful (0 votes)
16 views

Networks Protocols

Network protocols allow devices to communicate over a network by establishing rules and procedures for transmission of data. Common network protocols include HTTP for transferring web pages, FTP for file transfers but no encryption, SMTP for email transmission, and TCP/IP as the core internet protocol suite which includes IP for addressing and packet transmission and TCP for reliable data delivery. Other protocols include POP and IMAP for accessing email on servers, and VoIP for voice calls over internet.

Uploaded by

nyashamagutsa93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Networks Protocols

Network protocols allow devices to communicate over a network by establishing rules and procedures for transmission of data. Common network protocols include HTTP for transferring web pages, FTP for file transfers but no encryption, SMTP for email transmission, and TCP/IP as the core internet protocol suite which includes IP for addressing and packet transmission and TCP for reliable data delivery. Other protocols include POP and IMAP for accessing email on servers, and VoIP for voice calls over internet.

Uploaded by

nyashamagutsa93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

NETWORK PROTOCOLS

 A protocol is a set of communication rules and


procedures that all communicating devices must agree
to confirm in order to establish a meaningful
transmission of data.
 So when two computers connect with a particular
protocol, they can talk to each other no matter what
operating system they are using.
 Benefits of protocols:
i) Hardware devices from different manufactures can
work together
ii) Manufactures of different networking devices can
concentrate certain hardware devices
 HYPER TEXT TRANSFER PROTOCOL (HTTP)
-Hypertext is the programming language that
is used for creating web pages.
-Http is used for transferring web pages to
your browser.
- When you type in a web address, it is
preceded by http://www.uz.ac.zw.
- The http tells the remote-computer that you
want to connect to its web-server.
 FILE TRANSFER PROTOCOL (FTP)
-This is used to upload or download files
from another computer.
- FTP has no security to data as the data is not
encrypted prior to its transmission.
 SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
- Used to transfer e-mail messages between
computers.
- When you request your e-mail using your
mail-client such as Microsoft Outlook, it
connects to the mail server using the mail-
protocol.
- This enables e-mail to be delivered.
 TERMINAL EMULATION LOCAL NETWORK
(TELNET)
- It allows a computer user to gain access to
another computer and use its software and
data as if it were a normal terminal on its
local network.
- Once the PC has initiated the emulation,
the user can log onto the remote computer
and view anything on the remote computer
that s/he has privileges to do.
 INTERNET CONTROL MESSAGE PROTOCOL
(ICMP)
- It provides troubleshooting, control and
error messages when devices on a network
communicate.
- For example, routers generate error
messages to the source address when
network problems prevent delivery of
packets of data.
 POINT –TO-POINT PROTOCOL
- It is usedbetween individual users and their
internet service provider, when using a
telephone line.
- Used for dialing in to your service provider
and defines communication between two
computers to see how they are connected
directly.
- The internet service provider will access the
internet on the user's behalf using the
TCP/IP.
 POST OFFICE PROTOCOL (POP)
- A standard email protocol mainly used to
receive emails from a server to an email client.
- POP3 allows users to download emails to their
- computers and have them read later. POP3
uses transport layer (4) ports
- 110 (default non-encrypted port) and 995
(secure).
 INTERNET MESSAGE ACCESS PROTOCOL (IMAP)
- This email protocol is used for accessing email
on a remote web server from a client.
- IMAP can be thought of as a remote file server.
- It uses transport layer (4) ports 143 (default non
encrypted port) and 993 (secure).
 SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
- A protocol for transferring e-mail across
the Internet.
- You send e-mail with SMTP then the mail
is read using POP or IMAP.
 WIRELESS APPLICATION PROTOCOL (WAP)
- It is a standard for mobile phones rules for
connecting mobile phone users to the
internet.
- It allows users to access information
instantly via hand-held wireless devices like
mobile phones, smartphones, pagers etc.
- WAP mobile phones can use e-mail, access
pages to get information etc.
 VOICE OVER INTERNET PROTOCOL (VoIP)
-A technology that allows one to make voice
calls using a broadband Internet
connection instead of a regular (or analog)
phone line.
- VoIP runs both voice and data
communications over a single network,
which can significantly reduce
infrastructure costs.
- The advantage is that as the internet carries
the actual voice traffic , VoIP can be free or
cost much less than a telephone call
especially over long distances.
 INTERNET PROTOCOL SUITE
- It is made up of the following:
i) TRANSMISSION CONTROL PROTOCOL (TCP)
ii) INTERNET PROTOCOL (IP)
- It is a suite of communication protocols
used to interconnect network devices on the
internet.
- TCP/IP can also be used as a
communications protocol in a private
network (intranet or extranet)
- Provides the services of exchanging data
directly between two networked computers.
- It sends data as packets across a network to its
correct destination.
- It checks for and resend lost packets, and
reassemble packets in the correct sequence.
- It contain addresses that identify the sending
computer and the receiving computer
- IP packet contains a self-destructive counter
that limits its lifetime so that the Internet
doesn't get overloaded with broken packets
wandering aimlessly in the channel.
 USER DATAGRAM PROTOCOL (UDP)
- Performs the same function as the TCP but
sends messages called datagrams instead of
individual packets like the TCP does.
- In addition, UDP does not provides error
and flow control mechanism as TCP does.
 RESEARCH WORK
- Explain the 7 layers of the Open System Interconnection
(OSI) model
Layer 7 - Application Layer, Layer 6 - Presentation
Layer 5 - Session Layer, Layer 4 - Transport Layer
Layer 3 - Network Layer, Layer - Data Link Layer
Layer 1 - Physical Layer

- Identify the layers in which the above protocols are found.


- Make a detailed comparison between the OSI model and
the TCP/IP suite.

You might also like