SlideShare a Scribd company logo
1 of 8
Internet Protocols
By: Reilen Venaas
HTTP
The Hypertext Transfer Protocol (HTTP)
an internet protocol for putting out, common,
multimedia information systems.
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a
communications protocol for secure
communication over a computer network
SSH
Secure Shell (SSH) is a coded network protocol
for secure data communication, remote
command-line login, remote command
execution.
POP3
A protocol for receiving e-mail by downloading it
to your computer from a mailbox on the server
of an Internet service provider.
NTP
Network Time Protocol (NTP) is a protocol that
is used to synchronize computer clock times in a
network of computers. NTP uses Coordinated
Universal Time (UTC) to synchronize computer
clock times to a millisecond, and sometimes to a
fraction of a millisecond.
SSL
Secure Sockets Layer (SSL) is a commonly-used
protocol for managing the security of a message
communication on the Internet.
SMS
Short Message Service (SMS) is a text messaging
service component of phone, Web, or mobile
communication systems. It uses standardized
communications protocols to allow fixed line or
mobile phone devices to exchange short text
messages.

More Related Content

What's hot

Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting publicantitree
 
Information System Security
Information System Security Information System Security
Information System Security Elijah Konzo
 
presentationweek11
presentationweek11presentationweek11
presentationweek11s1150106
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure ShellWILLA REYES
 
Cyber security PPT
Cyber security PPTCyber security PPT
Cyber security PPTKavin Raval
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 

What's hot (14)

Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Information System Security
Information System Security Information System Security
Information System Security
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
presentationweek11
presentationweek11presentationweek11
presentationweek11
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
Vpn
VpnVpn
Vpn
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Cyber security PPT
Cyber security PPTCyber security PPT
Cyber security PPT
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
 
Port forward
Port forwardPort forward
Port forward
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 

Similar to Internet protocols

Similar to Internet protocols (20)

Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Protocol
ProtocolProtocol
Protocol
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Rules of data transmission
Rules of data transmissionRules of data transmission
Rules of data transmission
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Protocol
ProtocolProtocol
Protocol
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
PROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docxPROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docx
 
internet protocol
internet protocolinternet protocol
internet protocol
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
7 Protocols
7 Protocols7 Protocols
7 Protocols
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Secure shell
Secure shellSecure shell
Secure shell
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 

Internet protocols

  • 2. HTTP The Hypertext Transfer Protocol (HTTP) an internet protocol for putting out, common, multimedia information systems.
  • 3. HTTPS Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network
  • 4. SSH Secure Shell (SSH) is a coded network protocol for secure data communication, remote command-line login, remote command execution.
  • 5. POP3 A protocol for receiving e-mail by downloading it to your computer from a mailbox on the server of an Internet service provider.
  • 6. NTP Network Time Protocol (NTP) is a protocol that is used to synchronize computer clock times in a network of computers. NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a millisecond, and sometimes to a fraction of a millisecond.
  • 7. SSL Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message communication on the Internet.
  • 8. SMS Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communications protocols to allow fixed line or mobile phone devices to exchange short text messages.