You are on page 1of 8

Grade 11

Section 4

Network
Protocols

___

By Jun Park
2

What is the difference between the different network communication


protocols?
The difference between the different network communication protocols are HTTP, TCP, and DNS

1. HTTP

The World Wide Web was built on the Hypertext Transfer Protocol (HTTP), which is used to load
web pages with hypertext links. Running on top of other layers of the network protocol stack,
HTTP is an application layer protocol created to transport data between networked devices. A
client machine makes a request to a server, which then sends a response message, in a normal
HTTP flow.

2. TCP/IP

Application applications and computing devices can communicate with one another via a
network thanks to the Transmission Control Protocol (TCP) communications standard. It is made
to send packets across the internet and make sure that data and messages are successfully sent
through networks.

3. DNS

The phonebook of the Internet is the Domain Name System (DNS). Domain names like espn.com
or the new york times.com are used by people to access information online. Through Internet
Protocol (IP) addresses, web browsers may communicate. In order for browsers to load Internet
resources, DNS converts domain names to IP addresses.

Source:

https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/

https://www.cloudflare.com/learning/dns/what-is-dns/

https://www.fortinet.com/resources/cyberglossary/tcp-ip
3

Three Most Used Network Communication protocols

The three most used network communication protocols are management


protocol, security protocol, and communication protocol.

Management Protocol

Network devices are managed via management protocols. Based on services, they can be used to
manage firewalls or other network devices through firewalls.The interface access control function
can be turned on to allow the majority of traffic for firewall management. The source of traffic
cannot be managed by this function, though. It is therefore strongly advised to disable the
interface access control function and build a security policy with precise matching conditions to
allow traffic from designated traffic senders.

Security Protocol

A security protocol is a way of exchanging messages that enables untrustworthy parties to


accomplish a goal. Cryptographic methods are frequently used in security protocols to achieve
the goal. Electronic voting, email postage stamps, anonymous email, and electronic cash for
micropayments are more examples of objectives. A back-and-forth pattern is typical in security
protocols with two parties. When there are more than two people involved in a security
procedure, the pattern could become more intricate.

Communication Protocol

Communication protocols are formally stated standards and formats for digital messages. They
must communicate within or between computing systems. In telecommunications networks and
other systems, communication protocols are crucial because they establish uniformity and
consistency for message transmission and reception.

Authentication, error detection and correction, and signaling can all be covered by
communications protocols. Additionally, they can explain the synchronization of analog and
digital communications as well as their syntax and semantics.

Source:

https://www.techopedia.com/definition/25705/communication-protocol
4

https://support.huawei.com/enterprise/en/doc/EDOC1100172313/8ef3228d/what-is-a-management-protocol

https://eng.libretexts.org/Bookshelves/Computer_Science/Programming_and_Computation_Fundamentals/Principles_of_Computer_System_Design_(Sa
ltzer_and_Kaashoek)/05%3A_Information_Security/5.06%3A_Security_Protocols

What is an IP?

A device on the internet or a local network can be identified by its IP address,


which is a special address. The rules defining the format of data delivered over
the internet or a local network are known as "Internet Protocol," or IP.

Sources:

https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address
5

How is an IP assigned?

Your ISP assigns your gadget a unique IP address. Your internet activity is routed
back to you by the ISP using your IP address after passing via the ISP. It is their
responsibility to provide your gadget an IP address because they are granting you
access to the internet.

Sources:

https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address
6

What is the TCP/IP communication protocol and how does it work?

The primary communication protocol for the World Wide Web is TCP/IP
(Transmission Control Protocol/Internet Protocol), often known as the Internet
Protocol Suite. TCP/IP permits simultaneous communication between all
Internet-connected devices.

4. How does it work?


Your machine has an IP address, which is how IP determines the address to
which data is sent. Once that IP address has been discovered, TCP guarantees
accurate data delivery. The pair make up the TCP/IP protocol family. In other
words, TCP sends and receives mail while IP sorts it.

Source:

https://www.avg.com/en/signal/what-is-tcp-ip#:~:text=IP%20obtains%20the%20
address%20where,sends%20and%20receives%20the%20mail.

https://www.bigcommerce.com/ecommerce-answers/what-is-tcp-ip/
7

What is the HTTP protocol?

The Hypertext Transfer Protocol is an application protocol for distributed,


collaborative, hypermedia information systems that enables data exchange
between users on the World Wide Web.

Source:

https://www.extrahop.com/resources/protocols/http/#:~:text=The%20Hypertext%20Tra
nsfer%20Protocol%20is,on%20the%20World%20Wide%20Web.
8

What is the FTP protocol?

Transmission Control Protocol/Internet Protocol (TCP/IP) connections can be


used to send files between computers using the FTP (File Transfer Protocol)
network protocol. FTP is regarded as an application layer protocol within the
TCP/IP family of protocols.

Source:

https://www.techtarget.com/searchnetworking/definition/File-Transfer-Protocol-FTP

You might also like