0% found this document useful (0 votes)
18 views35 pages

Networking Protocol

The document outlines various types of network protocols, including communication, security, management, transport, and routing protocols, detailing their functions and examples. It explains the roles of these protocols in data transmission, security, and network management, highlighting commonly used protocols like HTTP, FTP, and TCP/IP. Additionally, it provides a real-life example of how protocols work together during web browsing.

Uploaded by

jayjavier010709
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views35 pages

Networking Protocol

The document outlines various types of network protocols, including communication, security, management, transport, and routing protocols, detailing their functions and examples. It explains the roles of these protocols in data transmission, security, and network management, highlighting commonly used protocols like HTTP, FTP, and TCP/IP. Additionally, it provides a real-life example of how protocols work together during web browsing.

Uploaded by

jayjavier010709
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

WORD!

SCRAMBLE
UNSCRABLE THIS WORD!

TPHT
HTTP
UNSCRABLE THIS WORD!

CPDH
DHCP
UNSCRABLE THIS WORD!

PFT
FTP
UNSCRABLE THIS WORD!

PMIC
ICMP
UNSCRABLE THIS WORD!

PTC
TCP
UNSCRABLE THIS WORD!

DPU
UDP
NETWORK PROTOCOL

- ARE STANDARDIZED RULES AND


CONVENTIONS THAT GOVERN HOW
DATA IS TRANSMITTED, RECEIVED, AND
INTERPRETED ACROSS A NETWORK.
TYPES OF NETWORKING PROTOCOLS

• 1. COMMUNICATION PROTOCOLS
• 2. SECURITY PROTOCOLS
• 3. MANAGEMENT PROTOCOLS
• 4. TRANSPORT PROTOCOLS
• 5. ROUTING PROTOCOLS
1. COMMUNICATION PROTOCOLS

• ARE SETS OF RULES THAT ALLOW


DEVICES AND SYSTEMS TO EXCHANGE
INFORMATION
TYPES OF COMMUNICATION
PROTOCOLS
• NETWORK COMMUNICATION
PROTOCOLS:
• - TCP/IP (TRANSMISSION CONTROL
PROTOCOL/INTERNET PROTOCOL)
- UDP (USER DATAGRAM PROTOCOL)
- ICMP (INTERNET CONTROL MESSAGE
PROTOCOL)
APPLICATION LAYER PROTOCOLS:

• HTTP/HTTPS (HYPERTEXT TRANSFER


PROTOCOL)
• FTP (FILE TRANSFER PROTOCOL)
• SMTP/POP3/IMAP (EMAIL PROTOCOLS)
DATA LINK LAYER PROTOCOLS

• - ETHERNET
• - WI-FI (802.11)
"HAVE YOU EVER WONDERED
HOW WEBSITES ENSURE YOUR
DATA IS SAFE WHEN MAKING
AN ONLINE PURCHASE OR
SENDING AN EMAIL?"
SECURITY PROTOCOL

• ARE METHODS THAT PROTECT DATA


AND COMMUNICATIONS OVER
NETWORKS.
• HTTP (HYPERTEXT TRANSFER
PROTOCOL)
• HTTPS (SECURE HYPERTEXT
TRANSFER PROTOCOL)
• SSL (SECURE SOCKETS LAYER)
• TLS (TRANSPORT LAYER SECURITY)
KEY OBJECTIVES OF SECURITY
PROTOCOLS

• 1. CONFIDENTIALITY
• 2. INTEGRITY
• 3. AUTHENTICATION
• 4. NON-REPUDIATION
• 5. ACCESS CONTROL
COMMON SECURITY PROTOCOLS

• SSL/TLS (SECURE SOCKET LAYER/TRANSPORT LAYER


SECURITY)
• IPSEC (INTERNET PROTOCOL SECURITY)
• HTTPS (HYPERTEXT TRANSFER PROTOCOL SECURE)
• SECURE SHELL (SSH)
• PRETTY GOOD PRIVACY (PGP)
ROUTING PROTOCOLS

• OSPF (OPEN SHORTEST PATH FIRST)


• BGP (BORDER GATEWAY PROTOCOL)
ROLES OF COMMUNICATION PROTOCOLS

• INTEROPERABILITY
• DATA INTEGRITY
• NETWORK EFFICIENCY
• ERROR HANDLING
• SECURITY
MANAGEMENT PROTOCOL

• USED TO MANAGE NETWORK DEVICES,


SUCH AS FIREWALLS, ROUTERS, AND
OTHER DEVICES. THEY CAN BE USED FOR
MONITORING, CONFIGURING, AND
TROUBLESHOOTING.
PURPOSE OF MANAGEMENT PROTOCOLS

• MONITORING
• CONFIGURATION
• DIAGNOSTICS
• CONTROL
• SECURITY MANAGEMENT
COMMON MANAGEMENT PROTOCOLS

• SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP):


• NETWORK TIME PROTOCOL (NTP):
• INTERNET CONTROL MESSAGE PROTOCOL (ICMP):
• BORDER GATEWAY PROTOCOL (BGP):
• REMOTE NETWORK MONITORING (RMON):
• FILE TRANSFER PROTOCOL (FTP) MANAGEMENT EXTENSIONS:
TRANSPORT PROTOCOLS

•COMMUNICATION STANDARDS
THAT ALLOW DEVICES AND
PROGRAMS TO EXCHANGE DATA
OVER A NETWORK.
FUNCTIONS OF TRANSPORT PROTOCOLS

• DATA SEGMENTATION AND REASSEMBLY:


• RELIABLE DATA TRANSFER:
• FLOW CONTROL:
• ERROR DETECTION AND CORRECTION:
• MULTIPLEXING
• CONNECTION MANAGEMENT:
TYPES OF TRANSPORT PROTOCOLS

• TRANSMISSION CONTROL PROTOCOL (TCP):


• USER DATAGRAM PROTOCOL (UDP):
• STREAM CONTROL TRANSMISSION PROTOCOL (SCTP):
• DATAGRAM CONGESTION CONTROL PROTOCOL (DCCP):
ROUTING PROTOCOLS

• A ROUTING PROTOCOL IS A SET OF


RULES THAT ALLOW ROUTERS TO
COMMUNICATE WITH EACH OTHER
TO DECIDE HOW TO ROUTE DATA.
TYPES OF ROUTING PROTOCOLS

• DISTANCE-VECTOR ROUTING PROTOCOLS:


• LINK-STATE ROUTING PROTOCOLS:
• PATH-VECTOR ROUTING PROTOCOLS:
• HYBRID ROUTING PROTOCOLS:
ROUTING PROTOCOL METRICS

• 1. HOP COUNT
• 2. BANDWIDTH
• 3. DELAY
• 4. COST
• 5. LOAD
• 6. RELIABLITY
COMMONLY USED PROTOCOLS IN NETWORKING

• HTTP/HTTPS (HYPERTEXT TRANSFER PROTOCOL)

• - TRANSFERS WEB PAGES AND OTHER RESOURCES.

• FTP (FILE TRANSFER PROTOCOL)

• - TRANSFERS FILES BETWEEN DEVICES.

• DNS (DOMAIN NAME SYSTEM)

• - RESOLVES HUMAN-READABLE DOMAIN NAMES TO IP ADDRESSES.

• SMTP/POP3/IMAP

• - HANDLES EMAIL TRANSMISSION AND RETRIEVAL.


COMMONLY USED PROTOCOLS IN NETWORKING

• DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)


• - AUTOMATICALLY ASSIGNS IP ADDRESSES TO DEVICES IN A NETWORK.
• IP (INTERNET PROTOCOL)
• - PROVIDES LOGICAL ADDRESSES TO DEVICES AND MANAGES DATA ROUTING.
• ICMP (INTERNET CONTROL MESSAGE PROTOCOL)
• - DIAGNOSES NETWORK CONNECTIVITY ISSUES.
REAL-LIFE EXAMPLE: WEB BROWSING

• WHEN YOU VISIT A WEBSITE, THE FOLLOWING PROTOCOLS WORK TOGETHER:

1. DNS RESOLVES THE DOMAIN NAME TO AN IP ADDRESS.

2. HTTP/HTTPS REQUESTS AND TRANSFERS THE WEBPAGE CONTENT.

3. TCP/IP ENSURES THE DATA PACKETS ARE DELIVERED RELIABLY.

4. ETHERNET/WI-FI HANDLES THE PHYSICAL TRANSMISSION OF DATA.

You might also like