Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

NETWORK PROTOCOLS

 A protocol is a set of communication rules and


procedures that all communicating devices must agree
to confirm in order to establish a meaningful
transmission of data.
 So when two computers connect with a particular
protocol, they can talk to each other no matter what
operating system they are using.
 Benefits of protocols:
i) Hardware devices from different manufactures can
work together
ii) Manufactures of different networking devices can
concentrate certain hardware devices
 HYPER TEXT TRANSFER PROTOCOL (HTTP)
-Hypertext is the programming language that
is used for creating web pages.
-Http is used for transferring web pages to
your browser.
- When you type in a web address, it is
preceded by http://www.uz.ac.zw.
- The http tells the remote-computer that you
want to connect to its web-server.
 FILE TRANSFER PROTOCOL (FTP)
-This is used to upload or download files
from another computer.
- FTP has no security to data as the data is not
encrypted prior to its transmission.
 SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
- Used to transfer e-mail messages between
computers.
- When you request your e-mail using your
mail-client such as Microsoft Outlook, it
connects to the mail server using the mail-
protocol.
- This enables e-mail to be delivered.
 TERMINAL EMULATION LOCAL NETWORK
(TELNET)
- It allows a computer user to gain access to
another computer and use its software and
data as if it were a normal terminal on its
local network.
- Once the PC has initiated the emulation,
the user can log onto the remote computer
and view anything on the remote computer
that s/he has privileges to do.
 INTERNET CONTROL MESSAGE PROTOCOL
(ICMP)
- It provides troubleshooting, control and
error messages when devices on a network
communicate.
- For example, routers generate error
messages to the source address when
network problems prevent delivery of
packets of data.
 POINT –TO-POINT PROTOCOL
- It is usedbetween individual users and their
internet service provider, when using a
telephone line.
- Used for dialing in to your service provider
and defines communication between two
computers to see how they are connected
directly.
- The internet service provider will access the
internet on the user's behalf using the
TCP/IP.
 POST OFFICE PROTOCOL (POP)
- A standard email protocol mainly used to
receive emails from a server to an email client.
- POP3 allows users to download emails to their
- computers and have them read later. POP3
uses transport layer (4) ports
- 110 (default non-encrypted port) and 995
(secure).
 INTERNET MESSAGE ACCESS PROTOCOL (IMAP)
- This email protocol is used for accessing email
on a remote web server from a client.
- IMAP can be thought of as a remote file server.
- It uses transport layer (4) ports 143 (default non
encrypted port) and 993 (secure).
 SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
- A protocol for transferring e-mail across
the Internet.
- You send e-mail with SMTP then the mail
is read using POP or IMAP.
 WIRELESS APPLICATION PROTOCOL (WAP)
- It is a standard for mobile phones rules for
connecting mobile phone users to the
internet.
- It allows users to access information
instantly via hand-held wireless devices like
mobile phones, smartphones, pagers etc.
- WAP mobile phones can use e-mail, access
pages to get information etc.
 VOICE OVER INTERNET PROTOCOL (VoIP)
-A technology that allows one to make voice
calls using a broadband Internet
connection instead of a regular (or analog)
phone line.
- VoIP runs both voice and data
communications over a single network,
which can significantly reduce
infrastructure costs.
- The advantage is that as the internet carries
the actual voice traffic , VoIP can be free or
cost much less than a telephone call
especially over long distances.
 INTERNET PROTOCOL SUITE
- It is made up of the following:
i) TRANSMISSION CONTROL PROTOCOL (TCP)
ii) INTERNET PROTOCOL (IP)
- It is a suite of communication protocols
used to interconnect network devices on the
internet.
- TCP/IP can also be used as a
communications protocol in a private
network (intranet or extranet)
- Provides the services of exchanging data
directly between two networked computers.
- It sends data as packets across a network to its
correct destination.
- It checks for and resend lost packets, and
reassemble packets in the correct sequence.
- It contain addresses that identify the sending
computer and the receiving computer
- IP packet contains a self-destructive counter
that limits its lifetime so that the Internet
doesn't get overloaded with broken packets
wandering aimlessly in the channel.
 USER DATAGRAM PROTOCOL (UDP)
- Performs the same function as the TCP but
sends messages called datagrams instead of
individual packets like the TCP does.
- In addition, UDP does not provides error
and flow control mechanism as TCP does.
 RESEARCH WORK
- Explain the 7 layers of the Open System Interconnection
(OSI) model
Layer 7 - Application Layer, Layer 6 - Presentation
Layer 5 - Session Layer, Layer 4 - Transport Layer
Layer 3 - Network Layer, Layer - Data Link Layer
Layer 1 - Physical Layer

- Identify the layers in which the above protocols are found.


- Make a detailed comparison between the OSI model and
the TCP/IP suite.

You might also like