Network Protocols

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 13

Category Protocol Description

HTTP is used by
Web browsers
and Web servers
to exchange files
(such as Web
pages) through
the World Wide
Web and
intranets. HTTP
can be described
as an
HyperText information
Transfer Protocol requesting and
(HTTP) responding
protocol. It is
typically used to
Web browsing request and
send Web
documents, but
is also used as
the protocol for
communication
between agents
using different
TCP/IP protocols.

HTTPS is a
secure form of
HTTP over SSL HTTP that uses
(HTTPS) SSL to encrypt
data before it is
transmitted.

Security protocols Secure Sockets SSL secures


Layer (SSL) messages being
transmitted on
the Internet. It
uses RSA for
authentication
and encryption.
Web browsers
use SSL (Secure
Sockets Layer)
to ensure safe
Web
transactions.
URLs that begin
with https://
trigger your Web
browser to use
SSL.

Transport Layer TLS ensures that


Security (TLS) messages being
transmitted on
the Internet are
private and
tamper proof.
TLS is
implemented
through two
protocols:
• TLS Record--
Can
provide
connection
security
with
encryption
(with DES
for
example).
• TLS
Handshake
--Provides
mutual
authenticat
ion and
choice of
encryption
method.
TLS version 1.2
(TLS1.2) is an
updated version
which improves
on past security
flaws found in
TLS 1.0 and 1.1

File transfer File Transfer FTP provides a


Protocol (FTP) generic method
of transferring
files. It can
include file
security through
usernames and
passwords, and
it allows file
transfer between
dissimilar
computer
systems. FTP
can transfer
both binary and
text files,
including HTML,
to another host.
FTP URLs are
preceded by
ftp:// followed by
the DNS name of
the FTP server.
To log in to an
FTP server, use:
ftp://username@
servername.

TFTP is similar to
FTP. It lets you
transfer files
between a host
and an FTP
server. However,
it provides no
user
authentication
and no error
detection. TFTP
Trivial File
is often used
Transfer Protocol
when
(TFTP)
transferring files
such as video,
audio, or
images. Because
it does not
perform error
detection, TFTP
is faster than
FTP, but might
be subject to file
errors.

Secure File SFTP is a file


Transfer Protocol transfer protocol
(SFTP) that uses Secure
Shell (SSH) to
secure data
transfers. SSH
ensures that
SFTP
transmissions
use encrypted
commands and
data which
prevent data
from being
transmitted over
the network in
clear text.

SCP is
associated with
Unix/Linux
networks and
used to transfer
files between
Secure Copy systems. Like
(SCP) SFTP, SCP relies
on SSH to ensure
that data and
passwords are
not transmitted
over the network
in clear text.

E-mail Simple Mail SMTP is used to


Transfer Protocol route electronic
(SMTP) mail through the
internetwork.
SMTP is used:
• Between mail
servers for
sending
and
relaying
mail.
• By all e-mail
clients to
send mail.
• By some e-mail
client
programs,
such as
Microsoft
Outlook,
for
receiving
mail from
an
Exchange
server.

POP3 is part of
the TCP/IP
protocol suite
and is used to
retrieve e-mail
from a remote
server to a local
client over a
Post Office TCP/IP
Protocol 3 (POP3) connection. With
POP3, e-mail
messages are
downloaded to
the client.
An e-mail client
that uses POP3
for receiving
mail uses SMTP
for sending mail.

Internet Message IMAP4 is an e-


Access Protocol 4 mail retrieval
(IMAP4) protocol
designed to
enable users to
access their e-
mail from
various locations
without the need
to transfer
messages or
files back and
forth between
computers.
Messages
remain on the
remote mail
server and are
not
automatically
downloaded to a
client system.
An e-mail client
that uses IMAP4
for receiving
mail uses SMTP
for sending mail.

Network services Dynamic Host DHCP is a


Configuration method for
Protocol (DHCP) automatically
assigning
addresses and
other
configuration
parameters to
network hosts.
Using a DHCP
server, hosts
receive
configuration
information at
startup, reducing
the amount of
manual
configuration
required on each
host.

DNS is a system
that is
distributed
throughout the
internetwork to
provide
address/name
Domain Name
resolution. For
System (DNS)
example, the
name
www.mydomai
n.comwould be
identified with a
specific IP
address.

NTP is used to
communicate
time
Network Time synchronization
Protocol (NTP) information
between
systems on a
network.

Lightweight LDAP is used to


Directory Access allow searching
Protocol (LDAP) and updating of
a directory
service. The
LDAP directory
service follows a
client/server
model. One or
more LDAP
servers contain
the directory
data, the LDAP
client connects
to an LDAP
Server to make a
directory service
request.

Network SNMP is a
management protocol
designed for
managing
complex
networks. SNMP
lets network
hosts exchange
Simple Network
configuration
Management
and status
Protocol (SNMP)
information. This
information can
be gathered by
management
software and
used to monitor
and manage the
network.

Remote Terminal Telnet allows an


Emulation attached
(Telnet) computer to act
as a dumb
terminal, with
data processing
taking place on
the TCP/IP host
computer. It is
still widely used
to provide
connectivity
between
dissimilar
systems. Telnet
can also be used
to test a service
by the use of
HTTP
commands.

SSH allows for


secure
interactive
control of
remote systems.
SSH uses RSA
public key
cryptography for
both connection
and
Secure Shell authentication.
(SSH) SSH uses the
IDEA algorithm
for encryption by
default, but is
able to use
Blowfish and
DES. SSH is a
secure and
acceptable
alternative to
Telnet.
TCP provides
services that
ensure accurate
and timely
delivery of
network
communications
between two
Transmission hosts. TCP
Control Protocol provides the
(TCP) following
services to
ensure message
delivery:
• Sequencing of
data
packets
• Flow control
Transport
• Error checking
protocols

UDP is a host-to-
host protocol like
TCP. However, it
does not include
mechanisms for
ensuring timely
and accurate
User Datagram delivery.
Protocol (UDP) Because it has
less overhead, it
offers fast
communications,
but at the
expense of
possible errors
or data loss.

Control protocols Internet Control ICMP works


closely with IP in
providing error
and control
information, by
allowing hosts to
exchange packet
status
information,
which helps
move the
packets through
the
internetwork.
Two common
management
utilities, ping
and traceroute,
use ICMP
Message Protocol
messages to
(ICMP)
check network
connectivity.
ICMP also works
with IP to send
notices when
destinations are
unreachable,
when devices'
buffers overflow,
the route and
hops packets
take through the
network, and
whether devices
can
communicate
across the
network.

Internet Group IGMP is a


protocol for
defining host
groups. All group
members can
receive
broadcast
messages
intended for the
group (called
Membership
multicasts).
Protocol (IGMP)
Multicast groups
can be
composed of
devices within
the same
network or
across networks
(connected with
a router).

You might also like