0% found this document useful (0 votes)
356 views14 pages

Types of Network Protocols and Their Uses - GeeksforGeeks

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
356 views14 pages

Types of Network Protocols and Their Uses - GeeksforGeeks

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Courses @35% Off Aptitude Engineering Mathematics Discrete Mathematics Operating System DBMS

Types of Network Protocols and Their Uses


Last Updated : 22 May, 2024

Network protocols are a set of rules that are responsible for the
communication of data between various devices in the network. These
protocols define guidelines and conventions for transmitting and receiving
data, ensuring efficient and reliable data communication.

What is Network Protocol?


A network protocol is a set of rules that govern data communication
between different devices in the network. It determines what is being
communicated, how it is being communicated, and when it is being
communicated. It permits connected devices to communicate with each
other, irrespective of internal and structural differences.

How do Network Protocols Work?


It is essential to understand how devices communicate over a network by
recognizing network protocols. The Open Systems Interconnection (OSI),
the most widely used model, illustrates how computer systems interact
with one another over a network. The communication mechanism between
two network devices is shown by seven different layers in the OSI model.
Every layer in the OSI model works based on different network protocols.
At every layer, one or more protocols are there for network
communication. To enable network-to-network connections, the Internet
Protocol (IP), for instance, routes data by controlling information like the
source and destination addresses of data packets. It is known as a network
layer protocol. Open In App
Types of Network Protocols
In most cases, communication across a network like the Internet uses the
OSI model. The OSI model has a total of seven layers. Secured
connections, network management, and network communication are the
three main tasks that the network protocol performs. The purpose of
protocols is to link different devices.

The protocols can be broadly classified into three major categories:

Network Communication
Network Management
Network Security

1. Network Communication
Communication protocols are really important for the functioning of a
network. They are so crucial that it is not possible to have computer
networks without them. These protocols formally set out the rules and
formats through which data is transferred. These protocols handle syntax,
semantics, error detection, synchronization, and authentication. Below
mentioned are some network communication protocol:

Hypertext Transfer Protocol(HTTP)

It is a layer 7 protocol that is designed for transferring a hypertext


between two or more systems. HTTP works on a client-server model,
most of the data sharing over the web is done through using HTTP.

Transmission Control Protocol(TCP)

TCP layouts a reliable stream delivery by using sequenced


acknowledgment. It is a connection-oriented protocol i.e., it establishes a
connection between applications before sending any data. It is used for

Open In App
communicating over a network. It has many applications such as emails,
FTP, streaming media, etc.

User Datagram Protocol(UDP)

It is a connectionless protocol that lay-out a basic but unreliable message


service. It adds no flow control, reliability, or error-recovery functions. UPD
is functional in cases where reliability is not required. It is used when we
want faster transmission, for multicasting and broadcasting connections,
etc.

Border Gateway Protocol(BGP)

BGP is a routing protocol that controls how packets pass through the
router in an independent system one or more networks run by a single
organization and connect to different networks. It connects the endpoints
of a LAN with other LANs and it also connects endpoints in different LANs
to one another.

Address Resolution Protocol(ARP)

ARP is a protocol that helps in mapping logical addresses to the physical


addresses acknowledged in a local network. For mapping and maintaining
a correlation between these logical and physical addresses a table known
as ARP cache is used.

Internet Protocol(IP)

It is a protocol through which data is sent from one host to another over
the internet. It is used for addressing and routing data packets so that they
can reach their destination.

Dynamic Host Configuration Protocol(DHCP)

Open In App
it’s a protocol for network management and it’s used for the method of
automating the process of configuring devices on IP networks. A DHCP
server automatically assigns an IP address and various other
configurational changes to devices on a network so they can communicate
with other IP networks. it also allows devices to use various services such
as NTP, DNS, or any other protocol based on TCP or UDP.

2. Network Management
These protocols assist in describing the procedures and policies that are
used in monitoring, maintaining, and managing the computer network.
These protocols also help in communicating these requirements across the
network to ensure stable communication. Network management protocols
can also be used for troubleshooting connections between a host and a
client.

Internet Control Message Protocol(ICMP)

It is a layer 3 protocol that is used by network devices to forward


operational information and error messages. ICMP is used for reporting
congestions, network errors, diagnostic purposes, and timeouts.

Simple Network Management Protocol(SNMP)

It is a layer 7 protocol that is used for managing nodes on an IP network.


There are three main components in the SNMP protocol i.e., SNMP agent,
SNMP manager, and managed device. SNMP agent has the local
knowledge of management details, it translates those details into a form
that is compatible with the SNMP manager. The manager presents data
acquired from SNMP agents, thus helping in monitoring network glitches,
and network performance, and troubleshooting them.

Gopher

Open In App
It is a type of file retrieval protocol that provides downloadable files with
some description for easy management, retrieving, and searching of files.
All the files are arranged on a remote computer in a stratified manner.
Gopher is an old protocol and it is not much used nowadays.

File Transfer Protocol(FTP)

FTP is a Client/server protocol that is used for moving files to or from a


host computer, it allows users to download files, programs, web pages,
and other things that are available on other services.

Post Office Protocol(POP3)

It is a protocol that a local mail client uses to get email messages from a
remote email server over a TCP/IP connection. Email servers hosted by
ISPs also use the POP3 protocol to hold and receive emails intended for
their users. Eventually, these users will use email client software to look at
their mailbox on the remote server and to download their emails. After the
email client downloads the emails, they are generally deleted from the
servers.

Telnet

It is a protocol that allows the user to connect to a remote computer


program and to use it i.e., it is designed for remote connectivity. Telnet
creates a connection between a host machine and a remote endpoint to
enable a remote session.

3. Network Security
These protocols secure the data in passage over a network. These
protocols also determine how the network secures data from any
unauthorized attempts to extract or review data. These protocols make
sure that no unauthorized devices, users, or services can access the

Open In App
network data. Primarily, these protocols depend on encryption to secure
data.

Secure Socket Layer(SSL)

It is a network security protocol mainly used for protecting sensitive data


and securing internet connections. SSL allows both server-to-server and
client-to-server communication. All the data transferred through SSL is
encrypted thus stopping any unauthorized person from accessing it.

Hypertext Transfer Protocol(HTTPS)

It is the secured version of HTTP. this protocol ensures secure


communication between two computers where one sends the request
through the browser and the other fetches the data from the web server.

Transport Layer Security(TLS)

It is a security protocol designed for data security and privacy over the
internet, its functionality is encryption, checking the integrity of data i.e.,
whether it has been tampered with or not, and authentication. It is
generally used for encrypted communication between servers and web
apps, like a web browser loading a website, it can also be used for
encryption of messages, emails, and VoIP.

Some Other Protocols

Internet Message Access Protocol (IMAP)

ICMP protocol is used to retrieve message from the mail server. By


using ICMP mail user can view and manage mails on his system.

Session Initiation Protocol (SIP)

Open In App
SIP is used in video, voice, and messaging application. This protocol is
used to initiating, Managing, Terminating the session between two
users while they are communicating.

Real-Time Transport Protocol (RTP)

This protocol is used to forward audio, video over IP network. This


protocol is used with SIP protocol to send audio, video at real-time.

Rout Access Protocol (RAP)

RAP is used in network management. It helps to user for accessing the


nearest router for communication. RAP is less efficient as compared to
SNMP.

Point To Point Tunnelling Protocol (PPTP)

It is used to implement VPN ( Virtual Private Network ). PPTP protocol


append PPP frame in IP datagram for transmission through IP based
network.

Trivial File Transfer Protocol (TFTP)

TFTP is the simplified version of FTP. TFTP is also used to transfer file
over internet

Resource Location Protocol (RLP)

RLP is used to assign the resource such as server, printer, or other


devices over the internet to the user. It is used to locate the resource to
the client for broadcast query.

Frequently Asked Question on Network Protocols –


FAQs
Open In App
What is the need of network protocols?

Network protocol is a set of rules that shows how data is transferred


between various devices connected to the same network.

Which protocol suite is used when accessing the Internet?

The protocol used while accessing the internet are TCP and UDP.

What is meant by IP multicasting?

IP Multicasting is defined as the types of group communication in


which data is sent simultaneously to multiple computers.

What are some important protocols of transport layer?

Important protocols of transport layer include-

Transmission Control Protocol (TCP).


User Datagram Protocol (UDP).
Stream Control Transmission Protocol (SCTP).

What are important protocols of Application layer?

Some important protocols of Application Layer include-


Open In App
Hyper Text Transfer Protocol (HTTP).
File transfer Protocol (FTP).
Simple Mail Transfer protocol (SMTP).
Domain Name System (DNS).

What is the full form of DHCP?

Full form of DHCP is Dynamic Host Configuration Protocol.

What is the function of DHCP?

Function of DHCP is to assign IP address to device on a network


automatically.

What is Virtual Local Area Network in networking?

A virtual local area network (VLAN) is a virtualized link that unites


various network nodes and devices from several LANs into a single
logical network.

Are you a student in Computer Science or an employed professional


looking to take up the GATE 2025 Exam? Of course, you can get a good
score in it but to get the best score our GATE CS/IT 2025 - Self-Paced
Course is available on GeeksforGeeks to help you with its preparation. Get
comprehensive coverage of all topics of GATE, detailed explanations, and
Open In App
practice questions for study. Study at your pace. Flexible and easy-to-
follow modules. Do well in GATE to enhance the prospects of your career.
Enroll now and let your journey to success begin!

Comment More info Next Article


Types of Internet Protocols

Similar Reads
Difference Between Network Layer Protocols and Application Layer…
Protocols are the set of rules that govern communication between devices in
computer network. These rules command how devices should send and…
5 min read

14 Most Common Network Protocols And Their Vulnerabilities


Network Protocols are a set of established rules which control and govern
the interchange of information by following a secure, reliable, and easy…
8 min read

Difference Between Network Topology and Network Protocols


Network Topology and Network Protocols are closely related but distinct
concepts in the field of computer networking. Network Topology refers to t…
5 min read

Types of Virtual Private Network (VPN) and its Protocols


VPN stands for Virtual Private Network (VPN), that allows a user to connect
to a private network over the Internet securely and privately. VPN creates a…
7 min read

Network Protocols and Communications


Open In App
Data communication are the exchange of data between two nodes via some
form of link (transmission medium) such as cable. Now these Data are…
2 min read

Mobile IP and Network Mobility Protocols


Mobile Internet Protocol and Network Mobility are both network concepts
that are related to each other which enables the devices and networks in th…
9 min read

Wireless Network Roaming and Handover Protocols


Wireless network roaming and handover protocols does play a significant
role in for mobile devices by ensuring seamless connectivity by switching…
7 min read

Collision-Free Protocols in Computer Network


Almost all collisions can be avoided in CSMA/CD but they can still occur
during the contention period. The collision during the contention period…
4 min read

Network Protocols
Network Protocols are a set of guidelines governing the exchange of
information in a simple, dependable and secure way. Network protocols are…
3 min read

Routing v/s Routed Protocols in Computer Network


The Network Layer of the OSI Model is responsible for providing logical
addressing, which routers use to select best path for routing packets. There…
6 min read

Article Tags : Computer Networks Computer Subject

Open In App
Corporate & Communications Address:-
A-143, 9th Floor, Sovereign Corporate
Tower, Sector- 136, Noida, Uttar Pradesh
(201305) | Registered Address:- K 061,
Tower K, Gulshan Vivante Apartment,
Sector 137, Noida, Gautam Buddh
Nagar, Uttar Pradesh, 201305

Company Explore
About Us Job-A-Thon Hiring Challenge
Legal Hack-A-Thon
Careers GfG Weekly Contest
In Media Offline Classes (Delhi/NCR)
Contact Us DSA in JAVA/C++
Advertise with us Master System Design
GFG Corporate Solution Master CP
Placement Training Program GeeksforGeeks Videos
Geeks Community

Languages DSA
Python Data Structures
Java Algorithms
C++ DSA for Beginners
PHP Basic DSA Problems
GoLang DSA Roadmap
SQL DSA Interview Questions
R Language Competitive Programming
Android Tutorial

Data Science & ML Web Technologies


Data Science With Python HTML
Data Science For Beginner CSS
Machine Learning JavaScript
ML Maths TypeScript
Data Visualisation ReactJS
Pandas NextJS
Open In App
NumPy NodeJs
NLP Bootstrap
Deep Learning Tailwind CSS

Python Tutorial Computer Science


Python Programming Examples GATE CS Notes
Django Tutorial Operating Systems
Python Projects Computer Network
Python Tkinter Database Management System
Web Scraping Software Engineering
OpenCV Tutorial Digital Logic Design
Python Interview Question Engineering Maths

DevOps System Design


Git High Level Design
AWS Low Level Design
Docker UML Diagrams
Kubernetes Interview Guide
Azure Design Patterns
GCP OOAD
DevOps Roadmap System Design Bootcamp
Interview Questions

School Subjects Commerce


Mathematics Accountancy
Physics Business Studies
Chemistry Economics
Biology Management
Social Science HR Management
English Grammar Finance
Income Tax

Databases Preparation Corner


SQL Company-Wise Recruitment Process
MYSQL Resume Templates
PostgreSQL Aptitude Preparation
PL/SQL Puzzles
MongoDB Company-Wise Preparation
Companies
Colleges

Competitive Exams More Tutorials


JEE Advanced Software Development
UGC NET Software Testing
UPSC Product Management
SSC CGL Open In App Project Management
SBI PO Linux
SBI Clerk Excel
IBPS PO All Cheat Sheets
IBPS Clerk Recent Articles

Free Online Tools Write & Earn


Typing Test Write an Article
Image Editor Improve an Article
Code Formatters Pick Topics to Write
Code Converters Share your Experiences
Currency Converter Internships
Random Number Generator
Random Password Generator

DSA/Placements Development/Testing
DSA - Self Paced Course JavaScript Full Course
DSA in JavaScript - Self Paced Course React JS Course
DSA in Python - Self Paced React Native Course
C Programming Course Online - Learn C with Data Structures Django Web Development Course
Complete Interview Preparation Complete Bootstrap Course
Master Competitive Programming Full Stack Development - [LIVE]
Core CS Subject for Interview Preparation JAVA Backend Development - [LIVE]
Mastering System Design: LLD to HLD Complete Software Testing Course [LIVE]
Tech Interview 101 - From DSA to System Design [LIVE] Android Mastery with Kotlin [LIVE]
DSA to Development [HYBRID]
Placement Preparation Crash Course [LIVE]

Machine Learning/Data Science Programming Languages


Complete Machine Learning & Data Science Program - [LIVE] C Programming with Data Structures
Data Analytics Training using Excel, SQL, Python & PowerBI - C++ Programming Course
[LIVE] Java Programming Course
Data Science Training Program - [LIVE] Python Full Course
Mastering Generative AI and ChatGPT

Clouds/Devops GATE
DevOps Engineering GATE CS & IT Test Series - 2025
AWS Solutions Architect Certification GATE DA Test Series 2025
Salesforce Certified Administrator Course GATE CS & IT Course - 2025
GATE DA Course 2025

@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved

Open In App

You might also like