0% found this document useful (0 votes)
29 views18 pages

Network Protocols Definition

Uploaded by

Rahul Tr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views18 pages

Network Protocols Definition

Uploaded by

Rahul Tr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Network Protocols Definition

Network protocols are a set of rules outlining how connected devices


communicate across a network to exchange information easily and
safely. Protocols serve as a common language for devices to enable
communication irrespective of differences in software, hardware, or
internal processes.

Types of network protocols

• Network Communication Protocols


• Network Security Protocols
• Network Management Protocols

Network Communication Protocols

• Hyper-Text Transfer Protocol (HTTP):


• Transmission Control Protocol (TCP):.
• Internet Protocol (IP):
• User Datagram Protocol (UDP)
• File Transfer Protocol (FTP):

Network Security Protocols

• Secure File Transfer Protocol (SFTP):


• Hyper-Text Transfer Protocol Secure (HTTPS):
• Secure Socket Layer (SSL):

Network Management Protocols

• Simple Network Management Protocol (SNMP): .


• Internet Control Message Protocol (ICMP):
How do network protocols function in each OSI model layer?

The OSI (Open Systems Interconnection) model is a reference


framework that explains how data is transmitted between computers.
It consists of seven layers, each with specific functions: “Please Do
Not Touch Steve’s Pet Alligator.”

Layer 7: Application

• Function: Provides services directly to applications like web


browsers, email clients, and file transfer programs.
• Protocols: HTTP, HTTPS, FTP, SMTP, DNS, SSH, Telnet

Layer 6: Presentation

• Function: Handles data


encryption, decryption, compression, and formatting.
• Protocols: SSL/TLS, ASCII

Layer 5: Session

• Function: Establishes, manages, and terminates sessions


between communicating applications.
• Protocols: RPC, NetBIOS

Layer 4: Transport

• Function: Provides reliable data transfer between applications


on different hosts.
• Protocols: TCP, UDP, SCTP

Layer 3: Network

• Function: Handles routing and logical addressing of data packets


across networks.
• Protocols: IP, IPv6, ICMP, BGP, OSPF
Layer 2: Data Link

• Function: Provides error-free transmission of data frames over


physical links.
• Protocols: Ethernet, Wi-Fi, Token Ring, PPP

Layer 1: Physical

• Function: Transmits raw data bits over physical media like cables
or wireless signals.
• Protocols: RS-232, USB, Fiber Optic

tcp/ip format

TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite


of protocols responsible for data communication over networks.
While it isn't a single format, both TCP and IP have their own distinct
structures and roles within the communication process.

TCP Segment:

• Function: Provides reliable, in-order delivery of data between


applications on different hosts.

IP Datagram:

• Function: Routes data packets across networks based on their


destination IP addresses.

Imagine sending a physical letter. The paper with the written message
is like the TCP segment (data), and the envelope with the addresses
and stamps is like the IP datagram (routing information). You put the
letter inside the envelope and address it before sending it through the
postal system (similar to how TCP segments are wrapped within IP
datagrams for network routing).
Explain about firewall

It acts as a security barrier, controlling incoming and outgoing traffic


to protect your precious data and systems from unwanted intruders.
Filters traffic: the firewall examines incoming and outgoing data
packets based on predefined rules. t allows authorized traffic and
blocks suspicious or malicious traffic

Types of firewalls:

• Packet-filtering: Inspects individual data packets based on


source/destination addresses and ports.
• Stateful firewalls: Tracks connections and monitors their
activity, offering more granular control.
• Application-level firewalls: Analyze data
content, identifying and blocking specific applications or
malware.

what is ftp

FTP, or File Transfer Protocol, is a communication protocol used


for transferring files between computers over a network. In
summary, FTP remains a versatile tool for efficient and reliable
file transfers over networks, especially when security is not a
primary concern. For highly sensitive data, consider secure
alternatives like FTPS or SFTP.
What Is DNS?

• The Domain Name System (DNS) serves as the phonebook of


the Internet.
• Humans access online information through domain names

• Dynamic IP Addresses: DNS handles dynamic IP changes for


devices with changing addresses.

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network


management protocol used in Internet Protocol (IP) networks. Its
primary purpose is to automatically assign IP addresses and other
communication parameters to devices connected to the network.

NMS (Network Management System)

Definition:

o An NMS is a software platform designed for monitoring,


controlling, and troubleshooting computer networks.
SSH (Secure Shell):

• Function: Provides secure remote access to a computer over a


network.
• How it works:
o Establishes an encrypted connection between two
computers.
o Uses strong authentication methods like passwords and
keys to verify your identity.
o Allows you to execute commands on the remote computer
as if you were sitting directly in front of it.

VLAN (Virtual Local Area Network):

• Function: Logically segments a single physical network into


multiple isolated sub-networks.
• How it works:

• Uses special switches that tag data packets with VLAN


identifiers.
• Devices can only communicate with others in the same
VLAN, enhancing security and network management.
• Useful for creating separate networks for different
departments, guest access, or security levels.

VPN (Virtual Private Network):

• Function: Creates a secure tunnel over a public network like the


internet.
• How it works:

• Encrypts data before sending it over the public network.


• Requires authentication to access the VPN tunnel.
• Allows you to connect to a private network remotely as
if you were physically on it.

Switching:
• Function: Connects devices within a single network, like your
home network or a company's internal network.

How it works:

o Each device connected to the switch has a unique MAC


address.
o When a device sends data, the switch reads the destination
address in the data packet.
o The switch then forwards the data only to the port
connected to the intended recipient device, not everyone
on the network. This avoids unnecessary traffic and
improves network performance.

Routing:

• Function: Connects different networks together, allowing


devices on different networks to communicate.

How it works:

o Uses logical addresses like IP addresses to determine the


best path for data packets.
o Routers have routing tables that tell them which direction
to send packets based on their destination network.
o Packets travel through multiple routers until they reach the
desired network and then the final device.

Key Differences:

• Scope: Switching operates within a single network, while routing


connects different networks.
• Addressing: Switching uses MAC addresses, while routing uses
IP addresses.

In summary:
• Switching keeps traffic flowing smoothly within a network.
• Routing connects different networks and guides data to its final
destination.

SNMP (Simple Network Management Protocol):

Both SNMP and NetFlow are crucial tools for monitoring network
traffic and performance, but they serve different purposes:

• Function: Provides device-specific information about network


devices like routers, switches, and servers.
• Think of it as: A questionnaire system for network
devices, retrieving answers about their
health, performance, and configuration.

• How it works:
o Network management stations (NMS) send queries to
network devices equipped with SNMP agents.
o Agents respond with detailed information like CPU
usage, memory utilization, interface statistics, and error
messages.
o NMS can use this information to monitor network
health, troubleshoot issues, and optimize performance.
• Benefits:
o Simple and widely supported protocol.
o Offers a range of data points for monitoring various device
parameters.
o Can be used with different vendors and platforms.

NetFlow:
• Function: Monitors network traffic flow in real-time, providing
insights into data volume, source and
destination, applications, and protocols.
• Think of it as: A traffic monitor on a highway, tracking the
number, type, and origin of vehicles (data packets) flowing
through.
• How it works:
o Network devices export NetFlow records containing
information about each data packet they process.
o NetFlow collectors analyze these records, providing
insights into traffic patterns, bandwidth usage, and
potential security threats.
• Benefits:
o Offers granular visibility into network traffic behavior.
o Helps identify network congestion, bottlenecks, and
suspicious activity.
o Can be used for traffic accounting, capacity planning, and
security analysis.

Key Differences:

• Focus: SNMP gathers device-specific information, while NetFlow


focuses on traffic flow.
• Data granularity: SNMP provides a broader range of device
data, while NetFlow offers detailed traffic information.
• Real-time vs. polling: SNMP uses polling for information, while
NetFlow offers real-time traffic visibility.

Choosing the right tool:

• Use SNMP: When you need detailed information about specific


devices, their configuration, and health.
• Use NetFlow: When you need real-time insights into traffic
patterns, sources, destinations, and potential security threats.
• Combine both: For a comprehensive understanding of your
network, use both SNMP and NetFlow together.
Additional notes:

• Both SNMP and NetFlow have different versions and


implementations.
• Security considerations are important when using these
protocols.

Windows Server and Cloud Computing Explained:

Windows Server:

• Function: An operating system specifically designed for


running servers on the Microsoft Windows platform.

Cloud Computing:

• Function: Delivery of on-demand computing services


(servers, storage, databases, networking) over the internet
instead of using physical hardware.

• Hyper-Text Transfer Protocol (HTTP): Commonly referred


to as the protocol of the internet that allows
communication between a server and browser.
• Transmission Control Protocol (TCP): A reliable,
connection-oriented protocol that helps in the sequential
transmission of data packets to ensure data reaches the
destination on time without duplication.
• Internet Protocol (IP): Facilitates routing the data packets
across networks. IP contains addressing and control
information to deliver packets across a network. It works
along with TCP. While it ensures delivering the packets to
the right address, TCP aligns them in the right order.
• User Datagram Protocol (UDP): Unlike TCP, UDP is a
connectionless protocol that doesn’t ensure a connection
between the application and server before transmitting a
message. It’s effective for use cases such as broadcasts or
multicast connections.
• File Transfer Protocol (FTP): Allows file sharing between
servers by establishing two TCP connections, one for data
transfer and the other for control. The data transfer
connection transfers the actual files while the control
connection transfers control information such as
passwords to ensure data retrieval in case of data loss.
• Secure File Transfer Protocol (SFTP): Helps securely
transfer files across a network by using public-key
encryption and authenticating the client and server.
• Hyper-Text Transfer Protocol Secure (HTTPS):
Overcomes the limitation of HTTP by ensuring the security
of data transmitted between the browser and server
through data encryption. HTTPS is a secure version of
HTTP.
• Secure Socket Layer (SSL): Primarily helps secure internet
connections and safeguard sensitive data using
encryption. SSL protocol enables both server-client
communication and server-server communication.
• Simple Network Management Protocol (SNMP): Helps
administrators manage network devices by monitoring
endpoint information to proactively track network
performance and pinpoint network glitches for quick
troubleshooting.
• Internet Control Message Protocol (ICMP): Helps
diagnose network connectivity issues. Network devices
employ ICMP for sending error messages, highlighting
congestion and timeouts, and transmitting other
operational information to assist in network
troubleshooting.
What Is a Network Protocol?

A network protocol is a mechanism or a set of procedures that


enables devices to communicate back and forth across the
internet. In order to communicate together, two devices must
support the same protocol or a gateway will need to be used to
translate the communication.

There are three main types of network protocols you need to be


aware of:

• Network management protocols – These protocols set


out policies designed to monitor, manage and maintain a
network. Examples include SNMP, FTP, POP3 and Telnet.
• Network communication protocols – A group of
protocols used to establish rules and formatting (such as
syntax, synchronization and semantics) for exchanging
data across a network. Types of network communication
protocols include TCP, UDP, IP, HTTP, IRC, BGP and ARP.
• Network security protocols – Security protocols are
protocols that use security measures such as cryptography
and encryption to protect data. Examples include SFTP,
SSL and HTTPS.
Network Protocol vs. Internet Protocol

While there are many different types of network protocols,


Transmission Control Protocol (TCP) is one of the most widely
used due to its ability to break down data into packets so they can
be transferred (you can read more about TCP further below).
Under the traditional TCP/IP model of networking, TCP is used
alongside the Internet Protocol (IP) to identify hosts to send data
across the internet.

Within this model, IP identifies and defines the IP address of


devices or applications that data will be forwarded to, and then
TCP routes the data through a network to guide the content to its
final destination.

Network Protocol vs. Communication Protocol

Network management and communication protocols are two of


the most important types of protocols.

Essentially, communication protocols including TCP/IP and


HTTP are designed to enable two devices to exchange data,
whereas network management protocols are designed to help
manage and troubleshoot performance.

For example, network management protocols such as Simple


Network Management Protocol (SNMP) can monitor and
troubleshoot the connection between an endpoint and the
network so that administrators can better understand the status
and availability of infrastructure.

In contrast, communication protocols are mainly concerned with


defining formatting and syntax rules to set out a framework for
two devices to exchange data with each other.

Below we’re going to look at nine types of network protocols that


empower and drive modern networking.

1. Transmission Control Protocol (TCP) A.K.A. Internet


Protocol (IP)
TCP is a protocol that converts data into packets so that it can be
sent between a server and a client. Organizations use TCP to
transfer content such as files, text, images and emails because it
guarantees that the packets will be delivered accurately and in
the correct order.

It’s worth noting that TCP will establish a connection between


the origin and the destination devices before attempting to
transfer data. This three-way handshake is outlined briefly
below:

• The client or web browser sends the destination server a


Synchronize Sequence Number (SYN).
• The destination server sends an acknowledgement message
known as SYN-ACK.
• The origin device receives the SYN-ACK message and
generates an ACK acknowledgement message, which
finalizes the connection.
2. User Datagram Protocol (UDP)

UDP is a communication protocol that’s designed to send


packets from one device to another on a network. Many
organizations use UDP as an alternative to TCP because it offers
higher transfer speeds.

While this increase in speed comes at the cost of accuracy, UDP


better supports video/audio streaming services, online games or
voice-over-internet-protocol (VoIP) calls, which can handle
some degree of data loss.

Another key difference between the two is that UDP won’t


attempt to establish a connection before sending packets on to
the destination. At the same time, it also doesn’t guarantee the
delivery of data to the other device.
3. File Transfer Protocol (FTP)

FTP is a network protocol that’s used to transfer files from one


device to another over an unencrypted TCP/IP connection. With
FTP, a user can load up a web browser or FTP client such as
FileZilla or FTP Voyager and send up to 2GB at once.

Many organizations use FTP because of its ability to send large


files or lots of files at once in a way that’s fast and efficient.
Unfortunately, this efficiency comes at the cost of security as FTP
transmits all data in plain text.

For this reason, many organizations opt to use a secure version


of FTP called File Transfer Protocol Secure Sockets Layer
(FTPS), which functions the same but uses SSL encryption to
obscure the transferred data.

4. Hypertext Transfer Protocol (HTTP)

HTTP is a communication protocol that enables systems to


communicate on the World Wide Web. With HTTP, a client will
send a hypertext message request to a web server asking for
access to the resources needed to load a web page.

The server hosting the content will then respond and enable the
client to load all the necessary text, images and videos featured
on the page. HTTP’s request-response cycle is outlined briefly
below:

• The client sends an HTTP request message to the web


server to request access to the web page content.
• The web server processes the request message.
• The web server sends a response message that includes the
requested content or web page.
• The client receives the message and loads the content in the
web browser for the end user to view.
There is also an encrypted version of HTTP called HTTPS, which
uses SSL/TLS encryption to encrypt requests and responses so
they can’t be accessed by third parties.

5. Simple Network Management Protocol (SNMP)

SNMP is an application layer protocol that’s used to collect


management information from devices such as computers,
routers, switchers, firewalls and printers.

Network monitoring platforms often use SNMP to monitor the


performance and status of devices throughout a network in real
time.

The protocol works with an SNMP manager or software client


sending SNMP GET requests to SNMP-enabled devices.

SNMP-enabled devices each have a local SNMP agent that


collects performance data from the device and will forward this
information to the SNMP manager so that an administrator can
get a top-down view of performance and status.

6. Internet Control Message Protocol (ICMP)

ICMP is a network protocol that devices use to warn about


connectivity issues and errors. ICMP can notify devices that a
forwarded message was too long or arrived out of order, and will
issue an error message requesting that the device resend the
content.

Troubleshooting tools such as Ping send ICMP requests to a


device and measure the round-trip time, or the time it takes for
the device to respond to the request. The amount of delay in the
response can then be used to measure the quality of the
connection.

Other tools such as traceroute use ICMP to troubleshoot and


measure the efficiency of network routes, telling the user how
much time it took to traverse from one device to another.

Sometimes, cybercriminals will use the protocol as part of an


ICMP flood attack where they attempt to overwhelm a server
with illegitimate ICMP requests to take its computing resources
away from the end user.

7. Post Office Protocol (POP)

POP3 is a network protocol that enables a server to retrieve


emails from a remote server and download them to the local
device. Whenever the client connects to the server via TCP, it
automatically downloads all the new messages to it, making
them accessible to the user both online and off-line.

Email platforms like Microsoft Outlook can use POP3 to collect


email messages from remote servers via TCP/IP so that they’re
available off-line.

Under the default setting, all emails are deleted from the server
automatically once the download is complete, but the user can
also configure it to store emails on the server for a certain time
period.

8. Internet Message Access Protocol (IMAP)

IMAP is another protocol that’s used for retrieving emails. With


IMAP, whenever a user clicks on an email, it isn’t downloaded or
stored on their computer locally but remains on the remote
server, enabling the user to check their email from multiple
devices.

The main difference between IMAP and POP3 is that the latter
only allows users to download and access emails locally on the
same computer. IMAP also doesn’t automatically delete emails
from the server.

9. Simple Mail Transfer Protocol (SMTP)

SMTP is a mail delivery protocol that allows a device to send and


deploy email to a remote endpoint with a TCP connection

Unlike POP3, SMTP cannot retrieve emails from a mailbox, and


unlike POP3, it doesn’t automatically delete emails.

Bottom Line

If you’re struggling to get to grips with the different types of


network protocols, try to focus on understanding TCP/IP first, as
this is the technical foundation that many of the most important
communication protocols will use to communicate.

You might also like