Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

TCP – TCP enables data to be transferred between applications and devices on a network

and is used in the TCP IP model. It is designed to break down a message, such as an
email, into packets of data to ensure the message reaches its destination successfully
and as quickly as possible.
UDP – a communications protocol that is primarily used to establish low-latency and
loss-tolerating connections between applications on the internet. UDP speeds up
transmissions by enabling the transfer of data before an agreement is provided by the
receiving party.
DNS – turns domain names into IP addresses, which allow browsers to get to websites
and other internet resources. Every device on the internet has an IP address, which
other devices can use to locate the device.
ARP – a protocol or procedure that connects an ever-changing Internet Protocol (IP)
address to a fixed physical machine address, also known as a media access control
(MAC) address, in a local-area network (LAN)
ICMP – used for reporting errors and performing network diagnostics. In the error
reporting process, ICMP sends messages from the receiver to the sender when data
does not come though as it should.
ICMPv6 – implementation of the Internet Control Message Protocol (ICMP) for Internet
Protocol version 6 (IPv6). ICMPv6 is an integral part of IPv6 and performs error reporting
and diagnostic functions. Internet Control Message Protocol for IPv6.
IPv4 – It is the underlying technology that makes it possible for us to connect our
devices to the web. Whenever a device accesses the Internet, it is assigned a unique,
numerical IP address such as 99.48. 227.227.
IPv6 – the newest version of internet protocol formulated by the IETF, which helps
identify and local endpoint systems on a computer network and route online traffic
while addressing the problem of IPv4 address depletion due to prolonged internet use
worldwide
PING – the time it takes for a small data set to be transmitted from your device to a
server on the Internet and back to your device again
FRAGMENT for IP – breaks packets into smaller pieces (fragments), so that the resulting
pieces can pass through a link with a smaller maximum transmission unit (MTU) than the
original packet size. The fragments are reassembled by the receiving host.
CHECKSUMS – value that represents the number of bits in a transmission message and
is used by IT professionals to detect high-level errors within data transmissions.
ECHO – a protocol that is used for debugging and measurement. It works by sending
back all the data that was received from the source. The protocol works on TCP and UDP,
typically on port 7
CHARGEN – service is an internet protocol defined in RFC 864. It is intended for testing
and measurement purposes. Primarily used for testing or troubleshooting line printers.
NTP – uses Coordinated Universal Time (UTC) to synchronize computer clock times with
extreme precision
DHCP – a network protocol that is used to configure network devices to communicate
on an IP network. A DHCP client uses the DHCP protocol to acquire configuration
information, such as an IP address, a default route, and one or more DNS server
addresses from a DHCP server
TFTP – a simple protocol for exchanging files between two TCP/IP machines. TFTP
servers allow connections from a TFTP Client for sending and receiving files. The TFTP
protocol supports only file send and receive operations
NETBIOS – an abbreviation of Network Basic Input/Output System. The primary purpose
of NetBIOS is to allow applications on separate computers to communicate and establish
sessions to access shared resources, such as files and printers, and to find each other
over a local area network
SNMP – an internet standard protocol used to monitor and manage network devices
connected over an IP. SNMP is used for communication between routers, switches,
firewalls, load balancers, servers, CCTV cameras, and wireless devices.
SYSLOG – a protocol that computer systems use to send event data logs to a central
location for storage. Logs can then be accessed by analysis and reporting software to
perform audits, monitoring, troubleshooting, and other essential IT operational tasks.
RIP – a distance vector protocol that uses hop count as its primary metric. RIP defines
how routers should share information when moving traffic among an interconnected
group of local area networks.
TRACEROUTE – A traceroute provides a map of how data on the internet travels from
your computer to its destination.
FTP – a way to download, upload, and transfer files from one location to another on the
Internet and between computer systems. FTP enables the transfer of files back and forth
between computers or through the cloud. Users require an Internet connection in order
to execute FTP transfers.
SSH – Secure Shell is a network protocol that gives users, particularly system
administrators, a secure way to access a computer over an unsecured network.
TELNET – a network protocol used to virtually access a computer and to provide a two-
way, collaborative and text-based communication channel between two machines
SMTP – What is SMTP (Simple Mail Transfer Protocol)? SMTP (Simple Mail Transfer
Protocol) is a TCP/IP protocol used in sending and receiving email. SMTP is used most
commonly by email clients, including Gmail, Outlook, Apple mail and Yahoo mail.
HTTP – a method for encoding and transporting information between a client (such as a
web browser) and a web server. HTTP is the primary protocol for transmission of
information across the Internet.
HTTPS – a protocol that secures communication and data transfer between a user's web
browser and a website
POP3 – the most commonly used protocol for receiving email over the internet
IMAP – Internet Message Access Protocol, or IMAP, is a standard email retrieval
(incoming) protocol. It stroes email messages on a mail server and enable the recipient
to view and manipulate them as though they were stored locally on their device(s).
LDAP – a protocol that helps users find data about organizations, persons, and more.
LDAP has two main goals: to store data in the LDAP directory and authenticate users to
access the directory.
OSI MODEL

You might also like