SlideShare a Scribd company logo
1 of 8
Internet Protocols 
By: Reilen Venaas
HTTP 
The Hypertext Transfer Protocol (HTTP) 
an internet protocol for putting out, common, 
multimedia information systems.
HTTPS 
Hypertext Transfer Protocol Secure (HTTPS) is a 
communications protocol for secure 
communication over a computer network
SSH 
Secure Shell (SSH) is a coded network protocol 
for secure data communication, remote 
command-line login, remote command 
execution.
POP3 
A protocol for receiving e-mail by downloading it 
to your computer from a mailbox on the server 
of an Internet service provider.
NTP 
Network Time Protocol (NTP) is a protocol that 
is used to synchronize computer clock times in a 
network of computers. NTP uses Coordinated 
Universal Time (UTC) to synchronize computer 
clock times to a millisecond, and sometimes to a 
fraction of a millisecond.
SSL 
Secure Sockets Layer (SSL) is a commonly-used 
protocol for managing the security of a message 
communication on the Internet.
SMS 
Short Message Service (SMS) is a text messaging 
service component of phone, Web, or mobile 
communication systems. It uses standardized 
communications protocols to allow fixed line or 
mobile phone devices to exchange short text 
messages.

More Related Content

What's hot

Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
ncct
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
WILLA REYES
 
Port forward
Port forwardPort forward
Port forward
lyndyv
 

What's hot (14)

Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Information System Security
Information System Security Information System Security
Information System Security
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
presentationweek11
presentationweek11presentationweek11
presentationweek11
 
Vpn
VpnVpn
Vpn
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Cyber security PPT
Cyber security PPTCyber security PPT
Cyber security PPT
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
 
Port forward
Port forwardPort forward
Port forward
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 

Viewers also liked

Geothermal energy
Geothermal energyGeothermal energy
Geothermal energy
hasouma90
 
Geo thermal ppt
Geo thermal pptGeo thermal ppt
Geo thermal ppt
srgirlsdk
 
Economic Aspects of Geothermal District. Heating and Power Generation. German...
Economic Aspects of Geothermal District. Heating and Power Generation. German...Economic Aspects of Geothermal District. Heating and Power Generation. German...
Economic Aspects of Geothermal District. Heating and Power Generation. German...
Gerd Tarand
 
Protection & relayppt 100
Protection & relayppt 100Protection & relayppt 100
Protection & relayppt 100
Jay Shah
 
Iran pakistan gas pipeline project.
Iran pakistan gas pipeline project.Iran pakistan gas pipeline project.
Iran pakistan gas pipeline project.
anwaar azad
 

Viewers also liked (20)

Geothermal energy
Geothermal energyGeothermal energy
Geothermal energy
 
GeoPower Europe, Dec. 6, 2011
GeoPower Europe, Dec. 6, 2011GeoPower Europe, Dec. 6, 2011
GeoPower Europe, Dec. 6, 2011
 
GEO's Presentation on In Situ Thermal Remediation to EPA Region 9
GEO's Presentation on In Situ Thermal Remediation to EPA Region 9GEO's Presentation on In Situ Thermal Remediation to EPA Region 9
GEO's Presentation on In Situ Thermal Remediation to EPA Region 9
 
Geothermal
GeothermalGeothermal
Geothermal
 
Geothermal energy
Geothermal energyGeothermal energy
Geothermal energy
 
Geothermal Energy
Geothermal   Energy  Geothermal   Energy
Geothermal Energy
 
Solar power
Solar powerSolar power
Solar power
 
Geo thermal ppt
Geo thermal pptGeo thermal ppt
Geo thermal ppt
 
REFF Germany, Feb. 29, 2012
REFF Germany, Feb. 29, 2012REFF Germany, Feb. 29, 2012
REFF Germany, Feb. 29, 2012
 
4 power gen-trans & distrib
4 power gen-trans & distrib4 power gen-trans & distrib
4 power gen-trans & distrib
 
Economic Aspects of Geothermal District. Heating and Power Generation. German...
Economic Aspects of Geothermal District. Heating and Power Generation. German...Economic Aspects of Geothermal District. Heating and Power Generation. German...
Economic Aspects of Geothermal District. Heating and Power Generation. German...
 
Geothermal energy
Geothermal energyGeothermal energy
Geothermal energy
 
Protection & relayppt 100
Protection & relayppt 100Protection & relayppt 100
Protection & relayppt 100
 
PAKISTAN AS A GEO THERMAL COUNTRY
PAKISTAN AS A GEO THERMAL COUNTRYPAKISTAN AS A GEO THERMAL COUNTRY
PAKISTAN AS A GEO THERMAL COUNTRY
 
Geothermal energy - Comparison of regulatory framework Germany - Italy
Geothermal energy - Comparison of regulatory framework Germany - Italy Geothermal energy - Comparison of regulatory framework Germany - Italy
Geothermal energy - Comparison of regulatory framework Germany - Italy
 
Geo thermal energy 1
Geo thermal energy 1Geo thermal energy 1
Geo thermal energy 1
 
Global Energy Consumption and alternative technologies
Global Energy Consumption and alternative technologiesGlobal Energy Consumption and alternative technologies
Global Energy Consumption and alternative technologies
 
Iran pakistan gas pipeline project.
Iran pakistan gas pipeline project.Iran pakistan gas pipeline project.
Iran pakistan gas pipeline project.
 
Renewable energy resources in pakistan
Renewable energy resources in pakistanRenewable energy resources in pakistan
Renewable energy resources in pakistan
 
Geothermal energy and its application
Geothermal energy and its applicationGeothermal energy and its application
Geothermal energy and its application
 

Similar to Internet protocols

TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
anjanacottonmills
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 

Similar to Internet protocols (20)

Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Protocol
ProtocolProtocol
Protocol
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Rules of data transmission
Rules of data transmissionRules of data transmission
Rules of data transmission
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Protocol
ProtocolProtocol
Protocol
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
PROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docxPROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docx
 
internet protocol
internet protocolinternet protocol
internet protocol
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
7 Protocols
7 Protocols7 Protocols
7 Protocols
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Secure shell
Secure shellSecure shell
Secure shell
 

Recently uploaded

Recently uploaded (20)

BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
 
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
 
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
Abortion Clinic In Pretoria ](+27832195400*)[ 🏥 Safe Abortion Pills in Pretor...
 
Alluxio Monthly Webinar | Simplify Data Access for AI in Multi-Cloud
Alluxio Monthly Webinar | Simplify Data Access for AI in Multi-CloudAlluxio Monthly Webinar | Simplify Data Access for AI in Multi-Cloud
Alluxio Monthly Webinar | Simplify Data Access for AI in Multi-Cloud
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
 
GraphSummit Milan & Stockholm - Neo4j: The Art of the Possible with Graph
GraphSummit Milan & Stockholm - Neo4j: The Art of the Possible with GraphGraphSummit Milan & Stockholm - Neo4j: The Art of the Possible with Graph
GraphSummit Milan & Stockholm - Neo4j: The Art of the Possible with Graph
 
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
Navigation in flutter – how to add stack, tab, and drawer navigators to your ...
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
Lessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfLessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdf
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
Test Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdfTest Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdf
 
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
 
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfThe Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
 
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
Workshop -  Architecting Innovative Graph Applications- GraphSummit MilanWorkshop -  Architecting Innovative Graph Applications- GraphSummit Milan
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
 

Internet protocols

  • 1. Internet Protocols By: Reilen Venaas
  • 2. HTTP The Hypertext Transfer Protocol (HTTP) an internet protocol for putting out, common, multimedia information systems.
  • 3. HTTPS Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network
  • 4. SSH Secure Shell (SSH) is a coded network protocol for secure data communication, remote command-line login, remote command execution.
  • 5. POP3 A protocol for receiving e-mail by downloading it to your computer from a mailbox on the server of an Internet service provider.
  • 6. NTP Network Time Protocol (NTP) is a protocol that is used to synchronize computer clock times in a network of computers. NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a millisecond, and sometimes to a fraction of a millisecond.
  • 7. SSL Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message communication on the Internet.
  • 8. SMS Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communications protocols to allow fixed line or mobile phone devices to exchange short text messages.