Network protocols allow devices to communicate over a network by establishing rules and procedures for transmission of data. Common network protocols include HTTP for transferring web pages, FTP for file transfers but no encryption, SMTP for email transmission, and TCP/IP as the core internet protocol suite which includes IP for addressing and packet transmission and TCP for reliable data delivery. Other protocols include POP and IMAP for accessing email on servers, and VoIP for voice calls over internet.
Network protocols allow devices to communicate over a network by establishing rules and procedures for transmission of data. Common network protocols include HTTP for transferring web pages, FTP for file transfers but no encryption, SMTP for email transmission, and TCP/IP as the core internet protocol suite which includes IP for addressing and packet transmission and TCP for reliable data delivery. Other protocols include POP and IMAP for accessing email on servers, and VoIP for voice calls over internet.
Network protocols allow devices to communicate over a network by establishing rules and procedures for transmission of data. Common network protocols include HTTP for transferring web pages, FTP for file transfers but no encryption, SMTP for email transmission, and TCP/IP as the core internet protocol suite which includes IP for addressing and packet transmission and TCP for reliable data delivery. Other protocols include POP and IMAP for accessing email on servers, and VoIP for voice calls over internet.
procedures that all communicating devices must agree to confirm in order to establish a meaningful transmission of data. So when two computers connect with a particular protocol, they can talk to each other no matter what operating system they are using. Benefits of protocols: i) Hardware devices from different manufactures can work together ii) Manufactures of different networking devices can concentrate certain hardware devices HYPER TEXT TRANSFER PROTOCOL (HTTP) -Hypertext is the programming language that is used for creating web pages. -Http is used for transferring web pages to your browser. - When you type in a web address, it is preceded by http://www.uz.ac.zw. - The http tells the remote-computer that you want to connect to its web-server. FILE TRANSFER PROTOCOL (FTP) -This is used to upload or download files from another computer. - FTP has no security to data as the data is not encrypted prior to its transmission. SIMPLE MAIL TRANSFER PROTOCOL (SMTP) - Used to transfer e-mail messages between computers. - When you request your e-mail using your mail-client such as Microsoft Outlook, it connects to the mail server using the mail- protocol. - This enables e-mail to be delivered. TERMINAL EMULATION LOCAL NETWORK (TELNET) - It allows a computer user to gain access to another computer and use its software and data as if it were a normal terminal on its local network. - Once the PC has initiated the emulation, the user can log onto the remote computer and view anything on the remote computer that s/he has privileges to do. INTERNET CONTROL MESSAGE PROTOCOL (ICMP) - It provides troubleshooting, control and error messages when devices on a network communicate. - For example, routers generate error messages to the source address when network problems prevent delivery of packets of data. POINT –TO-POINT PROTOCOL - It is usedbetween individual users and their internet service provider, when using a telephone line. - Used for dialing in to your service provider and defines communication between two computers to see how they are connected directly. - The internet service provider will access the internet on the user's behalf using the TCP/IP. POST OFFICE PROTOCOL (POP) - A standard email protocol mainly used to receive emails from a server to an email client. - POP3 allows users to download emails to their - computers and have them read later. POP3 uses transport layer (4) ports - 110 (default non-encrypted port) and 995 (secure). INTERNET MESSAGE ACCESS PROTOCOL (IMAP) - This email protocol is used for accessing email on a remote web server from a client. - IMAP can be thought of as a remote file server. - It uses transport layer (4) ports 143 (default non encrypted port) and 993 (secure). SIMPLE MAIL TRANSFER PROTOCOL (SMTP) - A protocol for transferring e-mail across the Internet. - You send e-mail with SMTP then the mail is read using POP or IMAP. WIRELESS APPLICATION PROTOCOL (WAP) - It is a standard for mobile phones rules for connecting mobile phone users to the internet. - It allows users to access information instantly via hand-held wireless devices like mobile phones, smartphones, pagers etc. - WAP mobile phones can use e-mail, access pages to get information etc. VOICE OVER INTERNET PROTOCOL (VoIP) -A technology that allows one to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. - VoIP runs both voice and data communications over a single network, which can significantly reduce infrastructure costs. - The advantage is that as the internet carries the actual voice traffic , VoIP can be free or cost much less than a telephone call especially over long distances. INTERNET PROTOCOL SUITE - It is made up of the following: i) TRANSMISSION CONTROL PROTOCOL (TCP) ii) INTERNET PROTOCOL (IP) - It is a suite of communication protocols used to interconnect network devices on the internet. - TCP/IP can also be used as a communications protocol in a private network (intranet or extranet) - Provides the services of exchanging data directly between two networked computers. - It sends data as packets across a network to its correct destination. - It checks for and resend lost packets, and reassemble packets in the correct sequence. - It contain addresses that identify the sending computer and the receiving computer - IP packet contains a self-destructive counter that limits its lifetime so that the Internet doesn't get overloaded with broken packets wandering aimlessly in the channel. USER DATAGRAM PROTOCOL (UDP) - Performs the same function as the TCP but sends messages called datagrams instead of individual packets like the TCP does. - In addition, UDP does not provides error and flow control mechanism as TCP does. RESEARCH WORK - Explain the 7 layers of the Open System Interconnection (OSI) model Layer 7 - Application Layer, Layer 6 - Presentation Layer 5 - Session Layer, Layer 4 - Transport Layer Layer 3 - Network Layer, Layer - Data Link Layer Layer 1 - Physical Layer
- Identify the layers in which the above protocols are found.
- Make a detailed comparison between the OSI model and the TCP/IP suite.