top of page
Computer Circuit Board Macro
Search
Emmanuel and Andrea's Tech Tips

Internet Protocols

A protocol is a set of rules. The Internet Protocol is the foremost interchanges convention in the Internet convention suite for transferring datagrams across network limits. Its steering capacity empowers internetworking and basically builds up the Internet. Internet Protocols is the communication tool between computers in a network.


Since timing is crucial to network operations, protocols require data to arrive within a specific measure of time so that PCs don't pause vaguely for data or messages that may have been lost. Hence, systems keep up at least multiple times during the transmission of information. Protocols can also provide stand-by and surrogate actions if the network fails to meet the timing rules. Numerous protocols comprise a set-up of different other protocols that are stacked in layers. These layers rely upon the activity of different layers in the suite to work appropriately.


The main functions of the protocols are:

  • Identifying errors

  • Compressing the data

  • Deciding how the data should be sent

  • Addressing the data

  • Deciding how to announce sent and received data


Commonly Used Internet Protocols:

The following protocols are used to browse the web, send and receive an e-mail, and transfer data files.

  • Transmission Control Protocol or Internet Protocol

The dominant standard for internetworking. It represents a bunch of standards that specify how bundles of data and information are traded between PCs with one or more networks. It is also a set-up of correspondent protocols used to interconnect network gadgets on the web. TCP/IP can likewise be utilized as an interchanges protocol in a private PC network.

  • Internetwork Packet Exchange/Sequenced Packet Exchange

IPX and SPX are networking protocols utilized on networks using the Novell NetWare operating systems but turned out to be generally used on networks deploying Microsoft Windows LANs, as they replaced NetWare LANs. It conveys data and information similar to those included in TCP/IP. But unlike TCP/IP, IPX and SPX have a fixed boundary between the network and node part of the address.

  • NetBIOS Extended User Interface

NetBEUI is a protocol used primarily on small Windows NT networks. It is a non-routable transport protocol that provides network/network layer support while optimizing small to medium-sized operating systems (OS). This protocol is suitable for peer-to-peer networks, involving a few computers that are directly connected. It can be used in conjunction with another routable protocol, for example, TCP/IP. In short, NetBEUI works on internal LAN communication. This gives the network administrator the benefits of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP.

  • AppleTalk

AppleTalk is a protocol suite used to network Macintosh(Apple Mac) computers. AppleTalk includes several features that allow local area networks to be connected with no prior setup or the need for a centralized router or server of any sort. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. In 2009, It was dropped in favor of TCP/IP networking, allowing Apple computers to use the same standard to communicate with other computers.

  • Hypertext Transfer Protocol

HTTP is an essential protocol utilized on the Internet to control information transfer to and from a server host, in correspondence with an internet browser. HTTP's fundamental methods for communication between the web users and the servers that keep up the sites themselves. The one who developed the standards for HTTP is the Internet Engineering Task Force (IETF).

  • File Transfer Protocol

FTP is a client-server protocol used for transferring files to or from a host computer. It is built using separate control and data connections between the client and server allowing multiple simultaneous connections to remote file systems or manipulation.

  • Secure Shell

SSH is a cryptographic protocol and interface for executing security to network communications with a remote computer over an unsecured network. Any network service can be secured with Security Shell. Unix was initially the base command of SSH but now it is supported on Windows-based systems as well.

  • Telnet

Telnet is a networking protocol and software program utilized to access remote computers, typically the server, and terminals that lack security features. It was conceived in 1969 and standardized as one of the first Internet standards by the Internet Engineering Task Force (IETF).

  • Post Office Protocol

POP3 (version 3) is an application-layer Internet standard protocol that extracts and retrieves email from a remote mail server for access by the host machine. It is utilized to download e-mails and version 3 is in common use.

  • Internet Message Access Protocol

IMAP is a standard protocol for accessing email on a remote server from a local client. Like Post Office Protocol, IMAP also stores e-mails on a mail server but, it allows the end-user to view and manipulate the messages as though they were stored locally on the end user's computing devices.

  • Simple Mail Transfer Protocol

SMTP is a communication protocol for electronic mail transmission. It is a standard protocol for e-mail services that provide the ability to send and receive email messages. It also provides intermediary network service communication between the remote email provider or organizational email server and the local user accessing it, the reason why it is the most popular among protocols for emails.



 

We hope you got enlightened by how common protocols work because the more you understand each of these protocols, the more you will understand how networks and the Internet works.






18 views0 comments

Recent Posts

See All

Comments


Post: Blog2 Post
bottom of page