Protocols

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

INTRODUCTION TO COMPUTER NETWORKS

NETWORK PROTOCOLS :
 A network protocol is a set of rules for communication among networked
devices.
 Protocols generally includes rules of how and when a device can send or
receive the data, how is the sent data packaged, and how it reaches its
destination.
 We will discuss following three protocols:

1. HTTP (Hyper Text Transfer Protocol)

2. HTTPS(Hyper Text Transfer Protocol Secured)

3. FTP(File Transfer Protocol)

4. TCP/IP (Transmission Control Protocol / Internet Protocol)

5. PPP (Point to Point Protocol):

HTTP (Hyper Text Transfer Protocol)

 Hypertext Transfer Protocol is a set of rule which is used for transferring the
files like, audio, video, graphic image, text and other multimedia files on the
WWW (World Wide Web).

 When an HTTP client (a browser) sends a request to an HTTP server (web


server) , the server sends responses back to the client after which the client
disconnects the connection. This transfer of requests and responses is done
following HTTP protocol.

 The standard (default) port for HTTP connection is 80, but other port can also
be used.

 HTTP does not have any security.

 The HTTP was designed mainly to fetch the html document and send it to the
client.
HTTPS(Hyper Text Transfer Protocol Secure)

 HTTPS has a secure transfer. Using the HTTPS, sensitive information that we
want to transfer from one user to another user can be done securely.

 HTTPS is used to encrypt or decrypt user HTTP page or HTTP page requests
that are returned by the webserver.

 In HTTPS, the standard port to transfer the information is 443.

 It is the default protocol for conduction financial transactions on the web.

 HTTPS protocol uses HTTP on connection encrypted by SSL (Secure Socket


Layer)

Secure Socket Layer :


 Secure Sockets Layer (SSL) is a protocol which help users
protect their data during transfer by creating a uniquely encrypted
channel for private communications over the public Internet.
Video url: https://www.youtube.com/watch?v=hExRDVZHhig&t=95s
FTP(File Transfer Protocol)
 FTP is a standard internet protocol provided by TCP/IP used for transmitting the
files from one host to another.

 It is mainly used for transferring the web page files from their creator to the
computer that acts as a server for other computers on the internet.

 It is also used for downloading the files to computer from other servers.

 It transfers the data more reliably and efficiently.

 Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example,
 two systems may have different file conventions.
 Two systems may have different ways to represent text
and data.
 Two systems may have different directory structures.

FTP protocol overcomes these problems by establishing two connections


between hosts. One connection is used for data transfer, and another
connection is used for the control connection.

Video url: https://www.youtube.com/watch?v=tOj8MSEIbfA


TCP/IP (Transmission Control Protocol / Internet Protocol)

 It is a connection-oriented protocol that means it establishes the connection prior


to the communication that occurs between the computing devices in a network.
This protocol is used with an IP protocol, so together, they are referred to as
a TCP/IP.

 The main functionality of the TCP is


 to take the data from the sender and divide them into several packets .
 provide numbering to these packets
 finally transmits these packets to the destination(receiver).

 It also supports the acknowledgment mechanism, which checks the state and
sound arrival of the data. In the acknowledgment mechanism, the receiver sends
either positive or negative acknowledgment to the sender so that the sender can
get to know whether the data packet has been received or needs to resend.

 This protocol ensures that the data reaches the intended receiver in the same order
in which it is sent.

 The main task of IP is to deliver the packets from source to the destination based
on the IP addresses available in the packet headers.

 IP defines the packet structure that hides the data which is to be delivered as well
as the addressing method that labels the datagram with a source and destination
information.

Video url: https://www.youtube.com/watch?v=uwoD5YsGACg&t=4s
Common protocols of TCP/IP include the following:

 HTTP (Hyper Text Transfer Protocol) handles the communication between a web

server and a web browser.

 HTTPS (Secure HTTP) handles secure communication between a web server and a

web browser.

 FTP (File Transfer Protocol) handles transmission of files between computers.

PPP (Point to Point Protocol):

 It is a protocol for direct communication between two computers,


typically a personal computer connected by phone line to a server.
 Most Internet service providers (ISPs) use PPP for customer dial-up
access to the Internet.
 PPP is used over many types of physical networks including cellular
telephone, serial cable, phone line,specialized radio links, and fiber optic
links.

Identification of computers and users over a network

 MAC (Media Access Control) address


 IP Address

MAC (Media Access Control) address

 Each NIC has a universally unique address assigned to it by its


manufacturer. This address is known as the MAC (Media Access
Control) address of the card.

 It is the physical address

 MAC address of an NIC is permanent and never change.

 MAC addresses are 12-digit hexadecimal (or 48 bit) numbers.

 MAC addresses are usually written in one of the following two formats:

MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
 The first half (MM:MM:MM) of a MAC address contains the ID
number of the manufacturer

 The second half (SS:SS:SS) of a MAC address represents the


serial number assigned to the NIC by its manufacturer.

For example, in the following MAC address,

00:A0:C9 : 14:C8:35

The prefix 00:A0:C9 indicates the manufacturer

Last three numbers 14:C8:35 are given by the manufacturer to this NIC

IP Address

 An IP address is a group of four bytes (or 32 bits) each of which can be a


number from 0 to 255.
 It is the logical address
 A typical IP address looks like this:

59.177.134.72
 On a network, IP address of a machine, and not the MAC address of its NIC, is
used to identify it.
 MAC address is used only when a specific machine is to be targeted. For
example, suppose we want to block a specific PC to access some network
resource. If we use the PCs IP address, then the PC is not blocked
permanently as its IP address may change when it connects to the network
next time. Instead, if the PCs MAC address is used for the purpose, then the
job is done.
 There are two versions of IP addresses
 version 4 (IPv4)
 version 6 (IPv6)

version 4 (IPv4)
 IPv4 uses 32 bits for an IP address
 Using IPv4 only 2 (approximately 4 billion) distinct devices can be
addressed.

version 6 (IPv6)

 IPv6 uses 128 bits for an IP address


 Using IPv6 2 (approximately 4 Bn x 4 Bn x 4 Bn x 4 Bn) distinct devices
can be addressed.
 IPv6 also includes an important feature: a set of possible migration and
transition plans from IPv4.

You might also like