Protocols
Protocols
Protocols
NETWORK PROTOCOLS :
A network protocol is a set of rules for communication among networked
devices.
Protocols generally includes rules of how and when a device can send or
receive the data, how is the sent data packaged, and how it reaches its
destination.
We will discuss following three protocols:
Hypertext Transfer Protocol is a set of rule which is used for transferring the
files like, audio, video, graphic image, text and other multimedia files on the
WWW (World Wide Web).
The standard (default) port for HTTP connection is 80, but other port can also
be used.
The HTTP was designed mainly to fetch the html document and send it to the
client.
HTTPS(Hyper Text Transfer Protocol Secure)
HTTPS has a secure transfer. Using the HTTPS, sensitive information that we
want to transfer from one user to another user can be done securely.
HTTPS is used to encrypt or decrypt user HTTP page or HTTP page requests
that are returned by the webserver.
It is mainly used for transferring the web page files from their creator to the
computer that acts as a server for other computers on the internet.
It is also used for downloading the files to computer from other servers.
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example,
two systems may have different file conventions.
Two systems may have different ways to represent text
and data.
Two systems may have different directory structures.
It also supports the acknowledgment mechanism, which checks the state and
sound arrival of the data. In the acknowledgment mechanism, the receiver sends
either positive or negative acknowledgment to the sender so that the sender can
get to know whether the data packet has been received or needs to resend.
This protocol ensures that the data reaches the intended receiver in the same order
in which it is sent.
The main task of IP is to deliver the packets from source to the destination based
on the IP addresses available in the packet headers.
IP defines the packet structure that hides the data which is to be delivered as well
as the addressing method that labels the datagram with a source and destination
information.
Video url: https://www.youtube.com/watch?v=uwoD5YsGACg&t=4s
Common protocols of TCP/IP include the following:
HTTP (Hyper Text Transfer Protocol) handles the communication between a web
HTTPS (Secure HTTP) handles secure communication between a web server and a
web browser.
MAC addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half (MM:MM:MM) of a MAC address contains the ID
number of the manufacturer
00:A0:C9 : 14:C8:35
Last three numbers 14:C8:35 are given by the manufacturer to this NIC
IP Address
59.177.134.72
On a network, IP address of a machine, and not the MAC address of its NIC, is
used to identify it.
MAC address is used only when a specific machine is to be targeted. For
example, suppose we want to block a specific PC to access some network
resource. If we use the PCs IP address, then the PC is not blocked
permanently as its IP address may change when it connects to the network
next time. Instead, if the PCs MAC address is used for the purpose, then the
job is done.
There are two versions of IP addresses
version 4 (IPv4)
version 6 (IPv6)
version 4 (IPv4)
IPv4 uses 32 bits for an IP address
Using IPv4 only 2 (approximately 4 billion) distinct devices can be
addressed.
version 6 (IPv6)