0% found this document useful (0 votes)
2 views2 pages

What Is A Network Protocol

A network protocol is a set of rules that governs data transmission between devices in a network, enabling communication despite differences in their design. Protocols are categorized into communication, management, and security types, with examples including HTTP, TCP, and SSL. These protocols work together in suites to manage tasks and ensure reliable, secure data exchange across networks.

Uploaded by

nadjabd31
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views2 pages

What Is A Network Protocol

A network protocol is a set of rules that governs data transmission between devices in a network, enabling communication despite differences in their design. Protocols are categorized into communication, management, and security types, with examples including HTTP, TCP, and SSL. These protocols work together in suites to manage tasks and ensure reliable, secure data exchange across networks.

Uploaded by

nadjabd31
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

What Is a Network Protocol

A network protocol is an established set of rules that determine how data is transmitted between different
devices in the same network. Essentially, it allows connected devices to communicate with each other,
regardless of any differences in their internal processes, structure or design. Network protocols are the
reason you can easily communicate with people all over the world, and thus play a critical role in modern
digital communications.

How Network Protocols Work

Network protocols take large-scale processes and break them down into small, specific tasks or functions.
This occurs at every level of the network, and each function must cooperate at each level to complete the
larger task at hand. The term protocol suite refers to a set of smaller network protocols working in
conjunction with each other.

Types of protocols
The protocols can be broadly classified into three major categories-
1. Communication
2. Management
3. Security
Network Protocol Example
Examples of Communication Protocols:
1. HTTP: It is a layer 7 protocol that is designed for transferring a hypertext between two or more
systems. HTTP works on a client-server model, most of the data sharing over the web are done
through using HTTP.
2. TCP: It lay-outs a reliable stream delivery by using sequenced acknowledgment. It is a connection-
oriented protocol i.e., it establishes a connection between applications before sending any data. It is
used for communicating over a network. It has many applications such as emails, FTP, streaming
media, etc.
3. UDP: It is a connectionless protocol that lay-out a basic but unreliable message service. It adds no
flow control, reliability, or error-recovery functions. UPD is functional in cases where reliability is not
required. It is used when we want faster transmission, for multicasting and broadcasting connections,
etc.
4. BGP: It is a routing protocol that controls how packets pass through the router in an independent
system one or more networks run by a single organization and connect to different networks. It
connects the endpoints of a LAN with other LANs and it also connects endpoints in different LANs to
one another.
5. ARP: ARP is a protocol that helps in mapping Logical addresses to the Physical addresses
acknowledged in a local network. For mapping and maintaining a correlation between these logical
and physical addresses a table known as ARP cache is used.
6. IP: It is a protocol through which data is sent from one host to another over the internet. It is used
for addressing and routing data packets so that they can reach their destination.
7. DHCP: it’s a protocol for network management and it’s used for the method of automating the
process of configuring devices on IP networks. A DHCP server automatically assigns an IP address and
various other configurational changes to devices on a network so they can communicate with other
IP networks. it also allows devices to use various services such as NTP, DNS, or any other protocol
based on TCP or UDP.
2. Management
These protocols assist in describing the procedures and policies that are used in monitoring, maintaining,
and managing the computer network. These protocols also help in communicating these requirements
across the network to ensure stable communication. Network management protocols can also be used
for troubleshooting connections between a host and a client.
Examples of Management Protocols:
1. ICMP: It is a layer 3 protocol that is used by network devices to forward operational information and
error messages. It is used for reporting congestions, network errors, diagnostic purposes, and
timeouts.
2. SNMP: It is a layer 7 protocol that is used for managing nodes on an IP network. There are three main
components in SNMP protocol i.e., SNMP agent, SNMP manager, and managed device. SNMP agent
has the local knowledge of management details, it translates those details into a form that is
compatible with the SNMP manager. The manager presents data acquired from SNMP agents, thus
helping in monitoring network glitches, network performance, and troubleshooting them.
3. Gopher: It is a type of file retrieval protocol that provides downloadable files with some description
for easy management, retrieving, and searching of files. All the files are arranged on a remote
computer in a stratified manner. It is an old protocol and it is not much used nowadays.
4. FTP: FTP is a Client/server protocol that is used for moving files to or from a host computer, it allows
users to download files, programs, web pages, and other things that are available on other services.
5. POP3: It is a protocol that a local mail client uses to get email messages from a remote email server
over a TCP/IP connection. Email servers hosted by ISPs also use the POP3 protocol to hold and
receive emails intended for their users. Eventually, these users will use email client software to look
at their mailbox on the remote server and to download their emails. After the email client downloads
the emails, they are generally deleted from the servers.
6. Telnet: It is a protocol that allows the user to connect to a remote computer program and to use it
i.e., it is designed for remote connectivity. Telnet creates a connection between a host machine and a
remote endpoint to enable a remote session.
3. Security
These protocols secure the data in passage over a network. These protocols also determine how the
network secures data from any unauthorized attempts to extract or review data. These protocols make
sure that no unauthorized devices, users, services can access the network data. Primarily, these
protocols depend on encryption to secure data.
Examples of Security Protocols:
1. SSL: It is a network security protocol mainly used for protecting sensitive data and securing internet
connections. SSL allows both servers to server and client to server communication. All the data
transferred through SSL is encrypted thus stopping any unauthorized person from accessing it.
2. HTTPS: It is the secured version of HTTP; this protocol ensures secure communication between two
computers where one sends the request through the browser and the other fetches the data from
the webserver.
3. TSL: It is a security protocol designed for data security and privacy over the internet, its functionality
is encryption, checking the integrity of data i.e., whether it has been tampered with or not and
Authentication. It is generally used for encrypted communication between servers and web apps, like
a web browser loading a website, it can also be used for encryption of messages, emails, VoIP.

You might also like