SlideShare a Scribd company logo
1 of 12
Download to read offline
BPTC ICT/ HNS L-III
1 By Abenet Asmellash
UC: Installing and Managing Network Protocols
LO 1: LO1.Install and manage network protocols
Part of: The fundamentals of computer networking
Common network protocols and their functions explained
Networking makes the internet work, but neither can succeed without
protocols. Common network protocols and their functions are key for
communication and connection across the internet.
Without network protocols, the modern internet would cease to exist.
Network protocols enable the exchange of information across the internet and
work behind the scenes so effectively that many users don't think twice about
them or how the internet works. But it's critical for networking professionals to
know and understand protocols as the foundation of networking.
1. Address Resolution Protocol (ARP)
ARP translates IP addresses to MAC addresses and vice versa so LAN
endpoints can communicate with one another. ARP is necessary because IP
and MAC addresses are different lengths. Below is a breakdown of the
various address lengths:
 IP version 4 (IPv4) addresses are 32 bits. Means it support 232
nodes
 IPv6 addresses are 128 bits. Means it support 2128
nodes
 MAC addresses -- a device's physical hardware number -- are 12
hexadecimal digits split into six pairs.
Translations between these addresses must occur for proper device
communication. ARP isn't required every time devices attempt to
communicate because the LAN's host stores the translated addresses in its
BPTC ICT/ HNS L-III
2 By Abenet Asmellash
ARP cache. As a result, the ARP translation process is mainly used when new
devices join the network.
ARP translates MAC and IP addresses between endpoints.
2. Border Gateway Protocol (BGP)
BGP makes the internet work. This routing protocol controls how packets pass
through routers in an autonomous system (AS) -- one or multiple networks run
by a single organization or provider -- and connect to different networks. BGP
can connect endpoints on a LAN to one another, and it can connect endpoints
in different LANs to one another over the internet.
External BGP directs network traffic from various ASes to the internet and vice
versa. Internal BGP directs network traffic between endpoints within a single
AS.
BPTC ICT/ HNS L-III
3 By Abenet Asmellash
BGP is often used for internet redundancy, WAN and IaaS connectivity.
3. Domain name system (DNS)
DNS is a database that includes a website's domain name and its
corresponding IP addresses. People use a domain name to access a website,
while devices use an IP address to locate a website.
DNS translates the domain name into IP addresses, and these translations
are included within the DNS. Servers can cache DNS data, which is required
to access the websites. DNS also includes the DNS protocol, which is within
the IP suite and details the specifications DNS uses to translate and
communicate.
DNS is important because it can provide users with information quickly and
enable access to remote hosts and resources across the internet.
4. Dynamic Host Configuration Protocol (DHCP)
DHCP assigns IP addresses to network endpoints so they can communicate
with other network endpoints over IP. Whenever a device joins a network with
a DHCP server for the first time, DHCP automatically assigns it a new IP
BPTC ICT/ HNS L-III
4 By Abenet Asmellash
address and continues to do so each time a device moves locations on the
network.
When a device connects to a network, a DHCP handshake takes place. In this
handshake process, the device and DHCP server communicate using the
following steps:
1. The device establishes a connection.
2. The server receives the connection and provides available IP addresses.
3. The device requests an IP address.
4. The server confirms the address to complete the process.
DHCP handshakes occur when a device initially connects to a network.
5. File Transfer Protocol (FTP)
BPTC ICT/ HNS L-III
5 By Abenet Asmellash
FTP is a client-server protocol, with which a client requests a file and the
server supplies it. FTP runs over TCP/IP -- a suite of communications
protocols -- and requires a command channel and a data channel to
communicate and exchange files, respectively. Clients request files through
the command channel and receive access to download, edit and copy the file,
among other actions, through the data channel.
FTP has grown less popular as most systems began to use HTTP for file
sharing. However, FTP is a common network protocol for more private file
sharing, such as in banking.
6. Hypertext Transfer Protocol (HTTP)
Like FTP, HTTP is a file sharing protocol that runs over TCP/IP. But HTTP
primarily works over web browsers and is commonly recognizable for most
users. When a user enters a website domain and aims to access it, HTTP
provides the access. HTTP connects to the domain's server and requests the
site's HTML, which is the code that structures and displays the page's design.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets
Layer or HTTP Secure. HTTPS can encrypt a user's HTTP requests and
webpages. This provides more security to users and can prevent common
cyber security threats, such as man-in-the-middle attacks.
BPTC ICT/ HNS L-III
6 By Abenet Asmellash
HTTP provides users with access to the various components of a website's domain.
7. Internet Protocol (IP)
IP functions similarly to a postal service. When users send and receive data
from their device, the data gets spliced into packets. Packets are like letters
with two IP addresses: one for the sender and one for the recipient.
After the packet leaves the sender, it goes to a gateway, like a post office, that
directs it in the proper direction. Packets continue to travel through gateways
until they reach their destinations.
IP is commonly paired with TCP to form TCP/IP, the overall internet protocol
suite. Together, IP sends packets to their destinations, and TCP arranges the
packets in the correct order, as IP sometimes sends packets out of order to
ensure the packets travel the fastest ways.
8. Open Shortest Path First (OSPF)
BPTC ICT/ HNS L-III
7 By Abenet Asmellash
OSPF works with IP to send packets to their destinations. IP aims to send
packets on the quickest route possible, which OSPF is designed to
accomplish. OSPF opens the shortest, or quickest, path first for packets. It
also updates routing tables -- a set of rules that control where packets travel --
and alerts routers of changes to the routing table or network when a change
occurs.
OSPF is similar to and supports Routing Information Protocol, which directs
traffic based on the number of hops it must take along a route, and it has also
replaced RIP in many networks. OSPF was developed as a more streamlined
and scalable alternative to RIP. For example, RIP sends updated routing
tables out every 30 seconds, while OSPF sends updates only when
necessary and makes updates to the particular part of the table where the
change occurred.
RIP
helps determine that the path via Router C results in fewer hops to the traffic's destination.
9. Simple Mail Transfer Protocol (SMTP)
SMTP is the most popular email protocol, is part of the TCP/IP suite and
controls how email clients send users' email messages. Email servers use
BPTC ICT/ HNS L-III
8 By Abenet Asmellash
SMTP to send email messages from the client to the email server to the
receiving email server. However, SMTP doesn't control how email clients
receive messages -- just how clients send messages.
That said, SMTP requires other protocols to ensure email messages are sent
and received properly. SMTP can work with Post Office Protocol 3 or Internet
Message Access Protocol, which control how an email server receives email
messages.
10. Telnet
Telnet is designed for remote connectivity, and it establishes connections
between a remote endpoint and a host machine to enable a remote session.
Telnet prompts the user at the remote endpoint to log on. Once the user is
authenticated, Telnet gives the endpoint access to network resources and
data at the host computer.
Telnet has existed since the 1960s and was arguably the first draft of the
modern internet. However, Telnet lacks sophisticated security protections
required for modern communications and technology, so it isn't commonly
used anymore.
11. Transmission Control Protocol (TCP)
TCP is the other half of TCP/IP and arranges packets in order so IP can
deliver them. Specifically, TCP numbers individual packets because IP can
send packets to their destinations through different routes and get them out of
order, so TCP amends this before IP delivers the packets.
TCP also detects errors in the sending process -- including if any packets are
missing based on TCP's numbered system -- and requires IP to retransmit
those packets before IP delivers the data to its destination. Through this
process, the TCP/IP suite controls communication across the internet.
BPTC ICT/ HNS L-III
9 By Abenet Asmellash
Key differences between TCP and UDP include packet order and use cases.
BPTC ICT/ HNS L-III
10 By Abenet Asmellash
12. User Datagram Protocol (UDP)
UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency
data transmissions between internet applications, making it ideal for VoIP or other audio and video requirements.
Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead, UDP transmits all
packets even if some haven't arrived.
UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works
more qickly than TCP, it's also less reliable.
In the world of technology, there are vast numbers of users' communicating with different devices in different languages. That
also includes many ways in which they transmit data along with the different software they implement. So, communicating
worldwide will not be possible if there were no fixed 'standards' that will govern the way user communicates for data as well as
the way our devices treat those data. Here we will be discussing these standard set of rules.
Yes, we're talking about "protocols" which are set of rules that help in governing the way a particular technology will function for
communication. In other words, it can be said that the protocols are digital languages implemented in the form of networking
algorithms. There are different networks and network protocols, user's use while surfing.
Overview of Network protocols
There are various types of protocols that support a major and compassionate role in communicating with different devices
across the network. These are:
1. Transmission Control Protocol (TCP)
2. Internet Protocol (IP)
3. User Datagram Protocol (UDP)
4. Post office Protocol (POP)
BPTC ICT/ HNS L-III
11 By Abenet Asmellash
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Hyper Text Transfer Protocol Secure (HTTPS)
9. Telnet
10.Gopher
Let's discuss each of them briefly:
1. Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a
network. It divides any message into series of packets that are sent from source to destination and there it gets
reassembled at the destination.
2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in
packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the
most popular protocol connecting the networks.
3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol
implemented primarily for creating loss-tolerating and low-latency linking between different applications.
4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
5. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail.
6. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include
program files, multimedia files, text files, and documents, etc.
7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML
tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server
principles which allow a client system for establishing a connection with the server machine for making a request. The
server acknowledges the request initiated by the client and responds accordingly.
8. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a
standard protocol to secure the communication among two computers one using the browser and other fetching data
from web server. HTTP is used for transferring data between the client browser (request) and the web server (response)
in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it
can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.
9. Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed
as remote login. The system which requests for connection is the local computer, and the system which accepts the
connection is the remote computer.
BPTC ICT/ HNS L-III
12 By Abenet Asmellash
10.Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from
isolated sites. Gopher also works on the client/server principle.
Some Other Protocols
Some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning.
These are:
 ARP (Address Resolution Protocol)
 DHCP (Dynamic Host Configuration Protocol)
 IMAP4 (Internet Message Access Protocol)
 SIP (Session Initiation Protocol)
 RTP (Real-Time Transport Protocol)
 RLP (Resource Location Protocol)
 RAP (Route Access Protocol)
 L2TP (Layer Two Tunneling Protocol)
 PPTP (Point To Point Tunneling Protocol)
 SNMP (Simple Network Management Protocol)
 TFTP (Trivial File Transfer Protocol)
LO: 2 Identify network protocol applications
Assignment for the next session

More Related Content

Similar to HNS L III UC2 Installing and Managing Network Protocols .pdf

Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internatKritika Purohit
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxSamyakJain710491
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer scienceAnushida1
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 

Similar to HNS L III UC2 Installing and Managing Network Protocols .pdf (20)

Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Tcp
TcpTcp
Tcp
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

HNS L III UC2 Installing and Managing Network Protocols .pdf

  • 1. BPTC ICT/ HNS L-III 1 By Abenet Asmellash UC: Installing and Managing Network Protocols LO 1: LO1.Install and manage network protocols Part of: The fundamentals of computer networking Common network protocols and their functions explained Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are key for communication and connection across the internet. Without network protocols, the modern internet would cease to exist. Network protocols enable the exchange of information across the internet and work behind the scenes so effectively that many users don't think twice about them or how the internet works. But it's critical for networking professionals to know and understand protocols as the foundation of networking. 1. Address Resolution Protocol (ARP) ARP translates IP addresses to MAC addresses and vice versa so LAN endpoints can communicate with one another. ARP is necessary because IP and MAC addresses are different lengths. Below is a breakdown of the various address lengths:  IP version 4 (IPv4) addresses are 32 bits. Means it support 232 nodes  IPv6 addresses are 128 bits. Means it support 2128 nodes  MAC addresses -- a device's physical hardware number -- are 12 hexadecimal digits split into six pairs. Translations between these addresses must occur for proper device communication. ARP isn't required every time devices attempt to communicate because the LAN's host stores the translated addresses in its
  • 2. BPTC ICT/ HNS L-III 2 By Abenet Asmellash ARP cache. As a result, the ARP translation process is mainly used when new devices join the network. ARP translates MAC and IP addresses between endpoints. 2. Border Gateway Protocol (BGP) BGP makes the internet work. This routing protocol controls how packets pass through routers in an autonomous system (AS) -- one or multiple networks run by a single organization or provider -- and connect to different networks. BGP can connect endpoints on a LAN to one another, and it can connect endpoints in different LANs to one another over the internet. External BGP directs network traffic from various ASes to the internet and vice versa. Internal BGP directs network traffic between endpoints within a single AS.
  • 3. BPTC ICT/ HNS L-III 3 By Abenet Asmellash BGP is often used for internet redundancy, WAN and IaaS connectivity. 3. Domain name system (DNS) DNS is a database that includes a website's domain name and its corresponding IP addresses. People use a domain name to access a website, while devices use an IP address to locate a website. DNS translates the domain name into IP addresses, and these translations are included within the DNS. Servers can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which is within the IP suite and details the specifications DNS uses to translate and communicate. DNS is important because it can provide users with information quickly and enable access to remote hosts and resources across the internet. 4. Dynamic Host Configuration Protocol (DHCP) DHCP assigns IP addresses to network endpoints so they can communicate with other network endpoints over IP. Whenever a device joins a network with a DHCP server for the first time, DHCP automatically assigns it a new IP
  • 4. BPTC ICT/ HNS L-III 4 By Abenet Asmellash address and continues to do so each time a device moves locations on the network. When a device connects to a network, a DHCP handshake takes place. In this handshake process, the device and DHCP server communicate using the following steps: 1. The device establishes a connection. 2. The server receives the connection and provides available IP addresses. 3. The device requests an IP address. 4. The server confirms the address to complete the process. DHCP handshakes occur when a device initially connects to a network. 5. File Transfer Protocol (FTP)
  • 5. BPTC ICT/ HNS L-III 5 By Abenet Asmellash FTP is a client-server protocol, with which a client requests a file and the server supplies it. FTP runs over TCP/IP -- a suite of communications protocols -- and requires a command channel and a data channel to communicate and exchange files, respectively. Clients request files through the command channel and receive access to download, edit and copy the file, among other actions, through the data channel. FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a common network protocol for more private file sharing, such as in banking. 6. Hypertext Transfer Protocol (HTTP) Like FTP, HTTP is a file sharing protocol that runs over TCP/IP. But HTTP primarily works over web browsers and is commonly recognizable for most users. When a user enters a website domain and aims to access it, HTTP provides the access. HTTP connects to the domain's server and requests the site's HTML, which is the code that structures and displays the page's design. Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure. HTTPS can encrypt a user's HTTP requests and webpages. This provides more security to users and can prevent common cyber security threats, such as man-in-the-middle attacks.
  • 6. BPTC ICT/ HNS L-III 6 By Abenet Asmellash HTTP provides users with access to the various components of a website's domain. 7. Internet Protocol (IP) IP functions similarly to a postal service. When users send and receive data from their device, the data gets spliced into packets. Packets are like letters with two IP addresses: one for the sender and one for the recipient. After the packet leaves the sender, it goes to a gateway, like a post office, that directs it in the proper direction. Packets continue to travel through gateways until they reach their destinations. IP is commonly paired with TCP to form TCP/IP, the overall internet protocol suite. Together, IP sends packets to their destinations, and TCP arranges the packets in the correct order, as IP sometimes sends packets out of order to ensure the packets travel the fastest ways. 8. Open Shortest Path First (OSPF)
  • 7. BPTC ICT/ HNS L-III 7 By Abenet Asmellash OSPF works with IP to send packets to their destinations. IP aims to send packets on the quickest route possible, which OSPF is designed to accomplish. OSPF opens the shortest, or quickest, path first for packets. It also updates routing tables -- a set of rules that control where packets travel -- and alerts routers of changes to the routing table or network when a change occurs. OSPF is similar to and supports Routing Information Protocol, which directs traffic based on the number of hops it must take along a route, and it has also replaced RIP in many networks. OSPF was developed as a more streamlined and scalable alternative to RIP. For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends updates only when necessary and makes updates to the particular part of the table where the change occurred. RIP helps determine that the path via Router C results in fewer hops to the traffic's destination. 9. Simple Mail Transfer Protocol (SMTP) SMTP is the most popular email protocol, is part of the TCP/IP suite and controls how email clients send users' email messages. Email servers use
  • 8. BPTC ICT/ HNS L-III 8 By Abenet Asmellash SMTP to send email messages from the client to the email server to the receiving email server. However, SMTP doesn't control how email clients receive messages -- just how clients send messages. That said, SMTP requires other protocols to ensure email messages are sent and received properly. SMTP can work with Post Office Protocol 3 or Internet Message Access Protocol, which control how an email server receives email messages. 10. Telnet Telnet is designed for remote connectivity, and it establishes connections between a remote endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to log on. Once the user is authenticated, Telnet gives the endpoint access to network resources and data at the host computer. Telnet has existed since the 1960s and was arguably the first draft of the modern internet. However, Telnet lacks sophisticated security protections required for modern communications and technology, so it isn't commonly used anymore. 11. Transmission Control Protocol (TCP) TCP is the other half of TCP/IP and arranges packets in order so IP can deliver them. Specifically, TCP numbers individual packets because IP can send packets to their destinations through different routes and get them out of order, so TCP amends this before IP delivers the packets. TCP also detects errors in the sending process -- including if any packets are missing based on TCP's numbered system -- and requires IP to retransmit those packets before IP delivers the data to its destination. Through this process, the TCP/IP suite controls communication across the internet.
  • 9. BPTC ICT/ HNS L-III 9 By Abenet Asmellash Key differences between TCP and UDP include packet order and use cases.
  • 10. BPTC ICT/ HNS L-III 10 By Abenet Asmellash 12. User Datagram Protocol (UDP) UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency data transmissions between internet applications, making it ideal for VoIP or other audio and video requirements. Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead, UDP transmits all packets even if some haven't arrived. UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works more qickly than TCP, it's also less reliable. In the world of technology, there are vast numbers of users' communicating with different devices in different languages. That also includes many ways in which they transmit data along with the different software they implement. So, communicating worldwide will not be possible if there were no fixed 'standards' that will govern the way user communicates for data as well as the way our devices treat those data. Here we will be discussing these standard set of rules. Yes, we're talking about "protocols" which are set of rules that help in governing the way a particular technology will function for communication. In other words, it can be said that the protocols are digital languages implemented in the form of networking algorithms. There are different networks and network protocols, user's use while surfing. Overview of Network protocols There are various types of protocols that support a major and compassionate role in communicating with different devices across the network. These are: 1. Transmission Control Protocol (TCP) 2. Internet Protocol (IP) 3. User Datagram Protocol (UDP) 4. Post office Protocol (POP)
  • 11. BPTC ICT/ HNS L-III 11 By Abenet Asmellash 5. Simple mail transport Protocol (SMTP) 6. File Transfer Protocol (FTP) 7. Hyper Text Transfer Protocol (HTTP) 8. Hyper Text Transfer Protocol Secure (HTTPS) 9. Telnet 10.Gopher Let's discuss each of them briefly: 1. Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. 2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the most popular protocol connecting the networks. 3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss-tolerating and low-latency linking between different applications. 4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails. 5. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail. 6. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc. 7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. The server acknowledges the request initiated by the client and responds accordingly. 8. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets. 9. Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer.
  • 12. BPTC ICT/ HNS L-III 12 By Abenet Asmellash 10.Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle. Some Other Protocols Some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning. These are:  ARP (Address Resolution Protocol)  DHCP (Dynamic Host Configuration Protocol)  IMAP4 (Internet Message Access Protocol)  SIP (Session Initiation Protocol)  RTP (Real-Time Transport Protocol)  RLP (Resource Location Protocol)  RAP (Route Access Protocol)  L2TP (Layer Two Tunneling Protocol)  PPTP (Point To Point Tunneling Protocol)  SNMP (Simple Network Management Protocol)  TFTP (Trivial File Transfer Protocol) LO: 2 Identify network protocol applications Assignment for the next session