Network protocols allow communication between different network-enabled devices, for example, laptops, tablets, smartphones, desktops, servers, and other network-enabled devices
Establishes a dedicated connection between the devices in a network before transmitting data, and this connection is maintained throughout the communication and is terminated once the communication is over
Doesn't establish a dedicated connection between devices before transmitting data. A connectionless protocol sends each packet as an independent unit and transmits them separately
TCP chunks up data into data packets that can be sent securely and quickly while minimizing the chance of data loss. It provides a stable and reliable mechanism
IP is responsible for the addressing of a data packet. IP encapsulates the data packet to be delivered and adds an address header. The header contains information on the sender and recipient IP addresses. This protocol isn't concerned about the order in which the packets are sent or received. It also doesn't guarantee that a packet will be delivered, only the address
UDP is a connectionless protocol that offers a low-latency implementation. For real-time services like computer gaming, voice or video communication, live conferences; we need UDP. Since high performance is needed, UDP permits packets to be dropped instead of processing delayed packets. There is no error checking in UDP, so it also saves bandwidth. UDP is more efficient in terms of both latency and bandwidth
The HTTP protocol uses TCP/IP to deliver web page content from a server to your browser. HTTP can also handle the download and upload of files from remote servers
FTP is used to transfer files between different computers on a network. Typically, FTP is used to upload files to a server from a remote location. While you can use FTP to download files, web-based downloads are typically handled through HTTP
POP3 is one of three email protocols. It's most commonly used by an email client to allow you to receive emails. This protocol uses TCP for the management and delivery of an email
SMTP is another one of the three email protocols. It's most commonly used to send emails from an email client via an email server. This protocol uses the TCP for management and transmission of the email
IMAP is the more powerful of the three email protocols. With IMAP and an email client, you can manage a single mailbox on an email server in your organization
SSL is a standard encryption and security protocol. It provides a secure and encrypted connection between your computer and the target server or device that you accessed over the internet. It works by encrypting communication, ensuring that data exchanged between the two parties remains confidential and tamper-proof. SSL uses public-key cryptography and digital certificates to authenticate servers and encrypt data. While initially the standard, it has been largely replaced by its successor, TLS (Transport Layer Security)
TLS is the successor to SSL and provides a stronger and more robust security encryption protocol. It's designed to stop message forgery and tampering and eavesdropping. It's typically used to protect web browser communications, email, VoIP, and instant messaging. While TLS is now used, the replacement security protocol is often still called SSL
HTTPS is a combination of the standard HTTP protocol (used for transferring web pages) and the secure SSL/TLS protocol. It essentially adds a layer of security to HTTP communication, making it ideal for transmitting sensitive data like passwords, credit card information, and personal details. When you see a website address with "https://" at the beginning, it means the connection is secured with SSL/TLS
SSH is a cryptographic network security protocol that provides a secure data connection across a network. For secure remote access, file transfer, or creating secure tunnels, use SSH
It provides a robust authentication for client-server-based applications through secret-key cryptography. Kerberos assumes that all endpoints in the network are insecure
SNMP is an internet protocol that allows for the collection of data from devices on your network and the management of those devices. The device has to support SNMP to gather information. Devices that typically support SNMP include switches, routers, servers, laptops, desktops, and printers
ICMP is one of the protocols included within the Internet Protocol suite (IPS). It allows network-connected devices to send warning and error messages, along with operation information about the success or failure of a connection request, or if a service is unavailable. Unlike other network transport protocols like UDP and TCP, ICMP isn't used to send or receive data from devices on the network
Task of communication broken up into modules (layers) for example file transfer could use three modules: File transfer application, Communication service module, Network access module
Protocol Data Units (PDU): At each layer, protocols are used to communicate. Control information is added to user data at each layer. Transport layer may fragment user data. Each fragment has a transport header added. This gives a transport protocol data unit
Standardized Protocol Architecture is required for devices to communicate. Vendors have more marketable products. Customers can insist on standards based equipment. Two standards: OSI (Open System Interconnections) Reference model and TCP/IP protocol
OSI = Open Systems Interconnection: deals with open systems, i.e. systems open for communications with other systems. Specified in ISO 7498. Model has 7 layers: Application, Presentation, Session, Transport, Network, Data Link, Physical
Developed by the US Defense Advanced Research Project Agency (DARPA) for its packet switched network (ARPANET). Used by the global Internet. Layers: Application, Host to host or transport, Internet, Network access, Physical
User Datagram Protocol (UDP) is an alternative to TCP/IP. It is a communication protocol used across the Internet for especially time-sensitive transmissions such as video. It has no guaranteed delivery, no preservation of sequence, no protection against duplication, and minimum overhead