0% found this document useful (0 votes)
9 views

Network Protocols

Uploaded by

Ali Doyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Network Protocols

Uploaded by

Ali Doyo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

In the world of technology, there are vast numbers of users' communicating with different devices in

different languages. That also includes many ways in which they transmit data along with the different
software they implement. So, communicating worldwide will not be possible if there were no fixed
'standards' that will govern the way user communicates for data as well as the way our devices treat those
data. Here we will be discussing these standard set of rules.
Yes, we're talking about "protocols" which are set of rules that help in governing the way a
particular technology will function for communication. In other words, it can be said that the protocols
are digital languages implemented in the form of networking algorithms. There are different networks and
network protocols, user's use while surfing.
Table of Contents

Types of Protocols
There are various types of protocols that support a major and compassionate role in communicating with
different devices across the network. These are:

1. Transmission Control Protocol (TCP)


2. Internet Protocol (IP)
3. User Datagram Protocol (UDP)
4. Post office Protocol (POP)
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Hyper Text Transfer Protocol Secure (HTTPS)
9. Telnet
10. Gopher

Let's discuss each of them briefly:

1. Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used
for communicating over a network. It divides any message into series of packets that are sent
from source to destination and there it gets reassembled at the destination.
2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with
TCP. The IP addresses in packets help in routing them through different nodes in a network
until it reaches the destination system. TCP/IP is the most popular protocol connecting the
networks.
3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission
Control Protocol implemented primarily for creating loss-tolerating and low-latency linking
between different applications.
4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
5. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-
Mail.
6. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another.
Types of files may include program files, multimedia files, text files, and documents, etc.
7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among
two or more systems. HTML tags are used for creating links. These links may be in any form
like text or images. HTTP is designed on Client-server principles which allow a client system
for establishing a connection with the server machine for making a request. The server
acknowledges the request initiated by the client and responds accordingly.
8. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer
Protocol Secure is a standard protocol to secure the communication among two computers one
using the browser and other fetching data from web server. HTTP is used for transferring data
between the client browser (request) and the web server (response) in the hypertext format,
same in case of HTTPS except that the transferring of data is done in an encrypted format. So it
can be said that https thwart hackers from interpretation or modification of data throughout the
transfer of packets.
9. Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting
process here is termed as remote login. The system which requests for connection is the local
computer, and the system which accepts the connection is the remote computer.
10. Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server principle.

Some Other Protocols

Some other popular protocols act as co-functioning protocols associated with these primary protocols for
core functioning. These are:

 ARP (Address Resolution Protocol)


 DHCP (Dynamic Host Configuration Protocol)
 IMAP4 (Internet Message Access Protocol)
 SIP (Session Initiation Protocol)
 RTP (Real-Time Transport Protocol)
 RLP (Resource Location Protocol)
 RAP (Route Access Protocol)
 L2TP (Layer Two Tunnelling Protocol)
 PPTP (Point To Point Tunnelling Protocol)
 SNMP (Simple Network Management Protocol)
 TFTP (Trivial File Transfer Protocol)

You might also like