Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
HNS L III UC2 Installing and Managing Network Protocols .pdf
1. BPTC ICT/ HNS L-III
1 By Abenet Asmellash
UC: Installing and Managing Network Protocols
LO 1: LO1.Install and manage network protocols
Part of: The fundamentals of computer networking
Common network protocols and their functions explained
Networking makes the internet work, but neither can succeed without
protocols. Common network protocols and their functions are key for
communication and connection across the internet.
Without network protocols, the modern internet would cease to exist.
Network protocols enable the exchange of information across the internet and
work behind the scenes so effectively that many users don't think twice about
them or how the internet works. But it's critical for networking professionals to
know and understand protocols as the foundation of networking.
1. Address Resolution Protocol (ARP)
ARP translates IP addresses to MAC addresses and vice versa so LAN
endpoints can communicate with one another. ARP is necessary because IP
and MAC addresses are different lengths. Below is a breakdown of the
various address lengths:
IP version 4 (IPv4) addresses are 32 bits. Means it support 232
nodes
IPv6 addresses are 128 bits. Means it support 2128
nodes
MAC addresses -- a device's physical hardware number -- are 12
hexadecimal digits split into six pairs.
Translations between these addresses must occur for proper device
communication. ARP isn't required every time devices attempt to
communicate because the LAN's host stores the translated addresses in its
2. BPTC ICT/ HNS L-III
2 By Abenet Asmellash
ARP cache. As a result, the ARP translation process is mainly used when new
devices join the network.
ARP translates MAC and IP addresses between endpoints.
2. Border Gateway Protocol (BGP)
BGP makes the internet work. This routing protocol controls how packets pass
through routers in an autonomous system (AS) -- one or multiple networks run
by a single organization or provider -- and connect to different networks. BGP
can connect endpoints on a LAN to one another, and it can connect endpoints
in different LANs to one another over the internet.
External BGP directs network traffic from various ASes to the internet and vice
versa. Internal BGP directs network traffic between endpoints within a single
AS.
3. BPTC ICT/ HNS L-III
3 By Abenet Asmellash
BGP is often used for internet redundancy, WAN and IaaS connectivity.
3. Domain name system (DNS)
DNS is a database that includes a website's domain name and its
corresponding IP addresses. People use a domain name to access a website,
while devices use an IP address to locate a website.
DNS translates the domain name into IP addresses, and these translations
are included within the DNS. Servers can cache DNS data, which is required
to access the websites. DNS also includes the DNS protocol, which is within
the IP suite and details the specifications DNS uses to translate and
communicate.
DNS is important because it can provide users with information quickly and
enable access to remote hosts and resources across the internet.
4. Dynamic Host Configuration Protocol (DHCP)
DHCP assigns IP addresses to network endpoints so they can communicate
with other network endpoints over IP. Whenever a device joins a network with
a DHCP server for the first time, DHCP automatically assigns it a new IP
4. BPTC ICT/ HNS L-III
4 By Abenet Asmellash
address and continues to do so each time a device moves locations on the
network.
When a device connects to a network, a DHCP handshake takes place. In this
handshake process, the device and DHCP server communicate using the
following steps:
1. The device establishes a connection.
2. The server receives the connection and provides available IP addresses.
3. The device requests an IP address.
4. The server confirms the address to complete the process.
DHCP handshakes occur when a device initially connects to a network.
5. File Transfer Protocol (FTP)
5. BPTC ICT/ HNS L-III
5 By Abenet Asmellash
FTP is a client-server protocol, with which a client requests a file and the
server supplies it. FTP runs over TCP/IP -- a suite of communications
protocols -- and requires a command channel and a data channel to
communicate and exchange files, respectively. Clients request files through
the command channel and receive access to download, edit and copy the file,
among other actions, through the data channel.
FTP has grown less popular as most systems began to use HTTP for file
sharing. However, FTP is a common network protocol for more private file
sharing, such as in banking.
6. Hypertext Transfer Protocol (HTTP)
Like FTP, HTTP is a file sharing protocol that runs over TCP/IP. But HTTP
primarily works over web browsers and is commonly recognizable for most
users. When a user enters a website domain and aims to access it, HTTP
provides the access. HTTP connects to the domain's server and requests the
site's HTML, which is the code that structures and displays the page's design.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets
Layer or HTTP Secure. HTTPS can encrypt a user's HTTP requests and
webpages. This provides more security to users and can prevent common
cyber security threats, such as man-in-the-middle attacks.
6. BPTC ICT/ HNS L-III
6 By Abenet Asmellash
HTTP provides users with access to the various components of a website's domain.
7. Internet Protocol (IP)
IP functions similarly to a postal service. When users send and receive data
from their device, the data gets spliced into packets. Packets are like letters
with two IP addresses: one for the sender and one for the recipient.
After the packet leaves the sender, it goes to a gateway, like a post office, that
directs it in the proper direction. Packets continue to travel through gateways
until they reach their destinations.
IP is commonly paired with TCP to form TCP/IP, the overall internet protocol
suite. Together, IP sends packets to their destinations, and TCP arranges the
packets in the correct order, as IP sometimes sends packets out of order to
ensure the packets travel the fastest ways.
8. Open Shortest Path First (OSPF)
7. BPTC ICT/ HNS L-III
7 By Abenet Asmellash
OSPF works with IP to send packets to their destinations. IP aims to send
packets on the quickest route possible, which OSPF is designed to
accomplish. OSPF opens the shortest, or quickest, path first for packets. It
also updates routing tables -- a set of rules that control where packets travel --
and alerts routers of changes to the routing table or network when a change
occurs.
OSPF is similar to and supports Routing Information Protocol, which directs
traffic based on the number of hops it must take along a route, and it has also
replaced RIP in many networks. OSPF was developed as a more streamlined
and scalable alternative to RIP. For example, RIP sends updated routing
tables out every 30 seconds, while OSPF sends updates only when
necessary and makes updates to the particular part of the table where the
change occurred.
RIP
helps determine that the path via Router C results in fewer hops to the traffic's destination.
9. Simple Mail Transfer Protocol (SMTP)
SMTP is the most popular email protocol, is part of the TCP/IP suite and
controls how email clients send users' email messages. Email servers use
8. BPTC ICT/ HNS L-III
8 By Abenet Asmellash
SMTP to send email messages from the client to the email server to the
receiving email server. However, SMTP doesn't control how email clients
receive messages -- just how clients send messages.
That said, SMTP requires other protocols to ensure email messages are sent
and received properly. SMTP can work with Post Office Protocol 3 or Internet
Message Access Protocol, which control how an email server receives email
messages.
10. Telnet
Telnet is designed for remote connectivity, and it establishes connections
between a remote endpoint and a host machine to enable a remote session.
Telnet prompts the user at the remote endpoint to log on. Once the user is
authenticated, Telnet gives the endpoint access to network resources and
data at the host computer.
Telnet has existed since the 1960s and was arguably the first draft of the
modern internet. However, Telnet lacks sophisticated security protections
required for modern communications and technology, so it isn't commonly
used anymore.
11. Transmission Control Protocol (TCP)
TCP is the other half of TCP/IP and arranges packets in order so IP can
deliver them. Specifically, TCP numbers individual packets because IP can
send packets to their destinations through different routes and get them out of
order, so TCP amends this before IP delivers the packets.
TCP also detects errors in the sending process -- including if any packets are
missing based on TCP's numbered system -- and requires IP to retransmit
those packets before IP delivers the data to its destination. Through this
process, the TCP/IP suite controls communication across the internet.
9. BPTC ICT/ HNS L-III
9 By Abenet Asmellash
Key differences between TCP and UDP include packet order and use cases.
10. BPTC ICT/ HNS L-III
10 By Abenet Asmellash
12. User Datagram Protocol (UDP)
UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency
data transmissions between internet applications, making it ideal for VoIP or other audio and video requirements.
Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead, UDP transmits all
packets even if some haven't arrived.
UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works
more qickly than TCP, it's also less reliable.
In the world of technology, there are vast numbers of users' communicating with different devices in different languages. That
also includes many ways in which they transmit data along with the different software they implement. So, communicating
worldwide will not be possible if there were no fixed 'standards' that will govern the way user communicates for data as well as
the way our devices treat those data. Here we will be discussing these standard set of rules.
Yes, we're talking about "protocols" which are set of rules that help in governing the way a particular technology will function for
communication. In other words, it can be said that the protocols are digital languages implemented in the form of networking
algorithms. There are different networks and network protocols, user's use while surfing.
Overview of Network protocols
There are various types of protocols that support a major and compassionate role in communicating with different devices
across the network. These are:
1. Transmission Control Protocol (TCP)
2. Internet Protocol (IP)
3. User Datagram Protocol (UDP)
4. Post office Protocol (POP)
11. BPTC ICT/ HNS L-III
11 By Abenet Asmellash
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Hyper Text Transfer Protocol Secure (HTTPS)
9. Telnet
10.Gopher
Let's discuss each of them briefly:
1. Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a
network. It divides any message into series of packets that are sent from source to destination and there it gets
reassembled at the destination.
2. Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in
packets help in routing them through different nodes in a network until it reaches the destination system. TCP/IP is the
most popular protocol connecting the networks.
3. User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol
implemented primarily for creating loss-tolerating and low-latency linking between different applications.
4. Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
5. Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail.
6. File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include
program files, multimedia files, text files, and documents, etc.
7. Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML
tags are used for creating links. These links may be in any form like text or images. HTTP is designed on Client-server
principles which allow a client system for establishing a connection with the server machine for making a request. The
server acknowledges the request initiated by the client and responds accordingly.
8. Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a
standard protocol to secure the communication among two computers one using the browser and other fetching data
from web server. HTTP is used for transferring data between the client browser (request) and the web server (response)
in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. So it
can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.
9. Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed
as remote login. The system which requests for connection is the local computer, and the system which accepts the
connection is the remote computer.
12. BPTC ICT/ HNS L-III
12 By Abenet Asmellash
10.Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from
isolated sites. Gopher also works on the client/server principle.
Some Other Protocols
Some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning.
These are:
ARP (Address Resolution Protocol)
DHCP (Dynamic Host Configuration Protocol)
IMAP4 (Internet Message Access Protocol)
SIP (Session Initiation Protocol)
RTP (Real-Time Transport Protocol)
RLP (Resource Location Protocol)
RAP (Route Access Protocol)
L2TP (Layer Two Tunneling Protocol)
PPTP (Point To Point Tunneling Protocol)
SNMP (Simple Network Management Protocol)
TFTP (Trivial File Transfer Protocol)
LO: 2 Identify network protocol applications
Assignment for the next session