0% found this document useful (0 votes)
1 views

Basic Internet Protocols

Internet Protocols

Uploaded by

jhonnydisel6
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Basic Internet Protocols

Internet Protocols

Uploaded by

jhonnydisel6
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Internet Protocol:

Protocol

A protocol is a set of rules that govern how data is processed and formatted in a network.
In the context of the internet, the Internet Protocol (IP) is the fundamental protocol that
allows data to be sent between devices on the internet:

How it works

IP works by breaking data into packets, each containing information about the packet's
source and destination. These packets are then sent across networks and devices until
they reach their destination.

IP addresses

Each device or domain that connects to the internet has a unique IP address that
identifies it.

Working of Internet Protocol

Step by step working of internet protocol:

Dividing Data into Packets: When you send information over the internet, IP split it
into small parts called packets. Each packet contains a piece of the data and the address
of where it needs to go.

Addressing: Every device connected to the internet has its own IP address. This address
helps identify where the data is being sent from and where it should be delivered.

Routing the Packets: As the packets travel across the internet, they pass through several
devices called routers. These routers help direct the packets toward the correct
destination, like how mail is sorted at different post offices.

Reassemble the Data: Once all the packets arrive at the destination, they are put back
together to recreate the original message or file.

Handling Missing Packets: If some packets don’t arrive, the system can request that
they be sent again, making sure the complete data is received.

This process helps data move efficiently across the internet, no matter how far it needs
to travel or how many networks it passes through.
Internet Protocol:
Internet protocols are the foundational rules and standards that govern how data is
transmitted over networks like the internet. These protocols ensure that devices can
communicate with each other reliably, efficiently, and securely. Here’s an overview of
some of the basic internet protocols:

1. Internet Protocol (IP)

• Function: The core protocol used for routing and addressing data packets across
networks.
• Versions:
o IPv4 (Internet Protocol version 4): Uses a 32-bit address (e.g.,
192.168.0.1).
o IPv6 (Internet Protocol version 6): Uses a 128-bit address (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334) to address the
growing number of internet-connected devices.
• Role: Breaks data into packets, assigns source and destination addresses, and
routes packets to their destination.

2. Transmission Control Protocol (TCP)

• Function: Ensures reliable and ordered delivery of data between devices.


• Characteristics:
o Connection-oriented (establishes a connection before data transfer).
o Error-checking and recovery mechanisms.
o Used for applications where data integrity is critical (e.g., web browsing,
email, file transfers).

3. User Datagram Protocol (UDP)

• Function: Provides a faster, connectionless transmission of data.


• Characteristics:
o No error-checking or recovery.
o Suitable for applications where speed is more important than reliability
(e.g., video streaming, online gaming, VoIP).

4. Hypertext Transfer Protocol (HTTP)

• Function: Used for transmitting web pages and resources between web servers
and browsers.
• Versions:
o HTTP/1.1: The most widely used version.
o HTTP/2: Faster and more efficient.
o HTTP/3: Uses QUIC instead of TCP for reduced latency.
• Secure Variant: HTTPS (Hypertext Transfer Protocol Secure) uses SSL/TLS
for encryption.
5. File Transfer Protocol (FTP)

• Function: Transfers files between a client and a server over a network.


• Characteristics:
o Provides commands for uploading, downloading, and managing files.
o SFTP (Secure FTP) is a more secure version using SSH.

6. Simple Mail Transfer Protocol (SMTP)

• Function: Used for sending emails.


• Role: Handles the delivery of emails from clients to servers and between servers.
• Protocols for Receiving Emails:
o POP3 (Post Office Protocol 3): Downloads emails to the client and
removes them from the server.
o IMAP (Internet Message Access Protocol): Synchronizes emails across
devices, keeping them on the server.

7. Domain Name System (DNS)

• Function: Translates human-readable domain names (like


www.example.com) into IP addresses.
• Role: Acts like a phonebook for the internet, making it easier to find servers
without needing to remember numerical IP addresses.

8. Dynamic Host Configuration Protocol (DHCP)

• Function: Automatically assigns IP addresses to devices on a network.


• Role: Ensures devices can join a network without manual configuration by
administrators.

9. Secure Shell (SSH)

• Function: Provides secure remote access to devices over an encrypted


connection.
• Role: Commonly used for managing servers and secure data transfers.

10. Transport Layer Security (TLS) / Secure Sockets Layer (SSL)

• Function: Ensures data security and integrity over the internet.


• Role: Encrypts data sent between clients and servers, commonly used with
HTTPS.

Summary Table of Internet Protocols

Protocol Purpose Layer


IP Routing and addressing packets Network Layer
TCP Reliable data transmission Transport Layer
UDP Fast, connectionless data transfer Transport Layer
Protocol Purpose Layer
HTTP/HTTPS Web communication Application Layer
FTP/SFTP File transfer Application Layer
SMTP Sending emails Application Layer
POP3/IMAP Receiving emails Application Layer
DNS Domain name resolution Application Layer
DHCP Automatic IP address assignment Network Layer
SSH Secure remote access Application Layer
TLS/SSL Data encryption Transport Layer

These protocols form the backbone of internet communication and ensure data flows
efficiently and securely across the network.

You might also like