Network Protocol
Network Protocol
devices in the network. These protocols define guidelines and conventions for transmitting and receiving
data, ensuring efficient and reliable data communication.
A network protocol is a set of rules that govern data communication between different devices in the
network. It determines what is being communicated, how it is being communicated, and when it is being
communicated. It permits connected devices to communicate with each other, irrespective of internal
and structural differences.
It is essential to understand how devices communicate over a network by recognizing network protocols.
The Open Systems Interconnection (OSI), the most widely used model, illustrates how computer systems
interact with one another over a network. The communication mechanism between two network
devices is shown by seven different layers in the OSI model. Every layer in the OSI model works based on
different network protocols. At every layer, one or more protocols are there for network communication.
To enable network-to-network connections, the Internet Protocol (IP), for instance, routes data by
controlling information like the source and destination addresses of data packets. It is known as a
network layer protocol.
In most cases, communication across a network like the Internet uses the OSI model. The OSI model has
a total of seven layers. Secured connections, network management, and network communication are the
three main tasks that the network protocol performs. The purpose of protocols is to link different
devices.
Network Communication
Network Management
Network Security
1. Network Communication
Communication protocols are really important for the functioning of a network. They are so crucial that
it is not possible to have computer networks without them. These protocols formally set out the rules
and formats through which data is transferred. These protocols handle syntax, semantics, error
detection, synchronization, and authentication. Below mentioned are some network communication
protocol:
It is a layer 7 protocol that is designed for transferring a hypertext between two or more systems. HTTP
works on a client-server model, most of the data sharing over the web is done through using HTTP.
It is a connectionless protocol that lay-out a basic but unreliable message service. It adds no flow control,
reliability, or error-recovery functions. UPD is functional in cases where reliability is not required. It is
used when we want faster transmission, for multicasting and broadcasting connections, etc.
BGP is a routing protocol that controls how packets pass through the router in an independent system
one or more networks run by a single organization and connect to different networks. It connects the
endpoints of a LAN with other LANs and it also connects endpoints in different LANs to one another.
ARP is a protocol that helps in mapping logical addresses to the physical addresses acknowledged in a
local network. For mapping and maintaining a correlation between these logical and physical addresses a
table known as ARP cache is used.
Internet Protocol(IP)
It is a protocol through which data is sent from one host to another over the internet. It is used for
addressing and routing data packets so that they can reach their destination.
2. Network Management
These protocols assist in describing the procedures and policies that are used in monitoring, maintaining,
and managing the computer network. These protocols also help in communicating these requirements
across the network to ensure stable communication. Network management protocols can also be used
for troubleshooting connections between a host and a client.
It is a layer 3 protocol that is used by network devices to forward operational information and error
messages. ICMP is used for reporting congestions, network errors, diagnostic purposes, and timeouts.
It is a layer 7 protocol that is used for managing nodes on an IP network. There are three main
components in the SNMP protocol i.e., SNMP agent, SNMP manager, and managed device. SNMP agent
has the local knowledge of management details, it translates those details into a form that is compatible
with the SNMP manager. The manager presents data acquired from SNMP agents, thus helping in
monitoring network glitches, and network performance, and troubleshooting them.
Gopher
It is a type of file retrieval protocol that provides downloadable files with some description for easy
management, retrieving, and searching of files. All the files are arranged on a remote computer in a
stratified manner. Gopher is an old protocol and it is not much used nowadays.
FTP is a Client/server protocol that is used for moving files to or from a host computer, it allows users to
download files, programs, web pages, and other things that are available on other services.
It is a protocol that a local mail client uses to get email messages from a remote email server over a
TCP/IP connection. Email servers hosted by ISPs also use the POP3 protocol to hold and receive emails
intended for their users. Eventually, these users will use email client software to look at their mailbox on
the remote server and to download their emails. After the email client downloads the emails, they are
generally deleted from the servers.
Telnet
It is a protocol that allows the user to connect to a remote computer program and to use it i.e., it is
designed for remote connectivity. Telnet creates a connection between a host machine and a remote
endpoint to enable a remote session.
3. Network Security
These protocols secure the data in passage over a network. These protocols also determine how the
network secures data from any unauthorized attempts to extract or review data. These protocols make
sure that no unauthorized devices, users, or services can access the network data. Primarily, these
protocols depend on encryption to secure data.
It is a network security protocol mainly used for protecting sensitive data and securing internet
connections. SSL allows both server-to-server and client-to-server communication. All the data
transferred through SSL is encrypted thus stopping any unauthorized person from accessing it.
It is the secured version of HTTP. this protocol ensures secure communication between two computers
where one sends the request through the browser and the other fetches the data from the web server.
It is a security protocol designed for data security and privacy over the internet, its functionality is
encryption, checking the integrity of data i.e., whether it has been tampered with or not, and
authentication. It is generally used for encrypted communication between servers and web apps, like a
web browser loading a website, it can also be used for encryption of messages, emails, and VoIP.
ICMP protocol is used to retrieve message from the mail server. By using ICMP mail user can view and
manage mails on his system.
Session Initiation Protocol (SIP)
SIP is used in video, voice, and messaging application. This protocol is used to initiating, Managing,
Terminating the session between two users while they are communicating.
This protocol is used to forward audio, video over IP network. This protocol is used with SIP protocol to
send audio, video at real-time.
RAP is used in network management. It helps to user for accessing the nearest router for
communication. RAP is less efficient as compared to SNMP.
It is used to implement VPN ( Virtual Private Network ). PPTP protocol append PPP frame in IP datagram
for transmission through IP based network.
TFTP is the simplified version of FTP. TFTP is also used to transfer file over internet
RLP is used to assign the resource such as server, printer, or other devices over the internet to the user. It
is used to locate the resource to the client for broadcast query.
Network protocol is a set of rules that shows how data is transferred between various devices connected
to the same network.
The protocol used while accessing the internet are TCP and UDP.
IP Multicasting is defined as the types of group communication in which data is sent simultaneously to
multiple computers.
A virtual local area network (VLAN) is a virtualized link that unites various network nodes and devices
from several LANs into a single logical network.