SlideShare a Scribd company logo
1 of 8
Internet Protocols 
By: Reilen Venaas
HTTP 
The Hypertext Transfer Protocol (HTTP) 
an internet protocol for putting out, common, 
multimedia information systems.
HTTPS 
Hypertext Transfer Protocol Secure (HTTPS) is a 
communications protocol for secure 
communication over a computer network
SSH 
Secure Shell (SSH) is a coded network protocol 
for secure data communication, remote 
command-line login, remote command 
execution.
POP3 
A protocol for receiving e-mail by downloading it 
to your computer from a mailbox on the server 
of an Internet service provider.
NTP 
Network Time Protocol (NTP) is a protocol that 
is used to synchronize computer clock times in a 
network of computers. NTP uses Coordinated 
Universal Time (UTC) to synchronize computer 
clock times to a millisecond, and sometimes to a 
fraction of a millisecond.
SSL 
Secure Sockets Layer (SSL) is a commonly-used 
protocol for managing the security of a message 
communication on the Internet.
SMS 
Short Message Service (SMS) is a text messaging 
service component of phone, Web, or mobile 
communication systems. It uses standardized 
communications protocols to allow fixed line or 
mobile phone devices to exchange short text 
messages.

More Related Content

What's hot

Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting publicantitree
 
Information System Security
Information System Security Information System Security
Information System Security Elijah Konzo
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
presentationweek11
presentationweek11presentationweek11
presentationweek11s1150106
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure ShellWILLA REYES
 
Cyber security PPT
Cyber security PPTCyber security PPT
Cyber security PPTKavin Raval
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 

What's hot (14)

Meek and domain fronting public
Meek and domain fronting publicMeek and domain fronting public
Meek and domain fronting public
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Information System Security
Information System Security Information System Security
Information System Security
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
presentationweek11
presentationweek11presentationweek11
presentationweek11
 
Vpn
VpnVpn
Vpn
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Cyber security PPT
Cyber security PPTCyber security PPT
Cyber security PPT
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Fire wall security
Fire wall securityFire wall security
Fire wall security
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
 
Port forward
Port forwardPort forward
Port forward
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 

Viewers also liked (16)

GEO's Presentation on In Situ Thermal Remediation to EPA Region 9
GEO's Presentation on In Situ Thermal Remediation to EPA Region 9GEO's Presentation on In Situ Thermal Remediation to EPA Region 9
GEO's Presentation on In Situ Thermal Remediation to EPA Region 9
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Retrospectives dpm summit
Retrospectives dpm summitRetrospectives dpm summit
Retrospectives dpm summit
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Slavskoe
SlavskoeSlavskoe
Slavskoe
 
Cost of childcare created by anytimearound.com
Cost of childcare created by anytimearound.com Cost of childcare created by anytimearound.com
Cost of childcare created by anytimearound.com
 
Kapsul
KapsulKapsul
Kapsul
 
Ensayo gerencia de proyectos
Ensayo gerencia de proyectosEnsayo gerencia de proyectos
Ensayo gerencia de proyectos
 
[Guest Speaker] Yue Rong - GEOs Gas Thermal Remediation Workshop Series - Los...
[Guest Speaker] Yue Rong - GEOs Gas Thermal Remediation Workshop Series - Los...[Guest Speaker] Yue Rong - GEOs Gas Thermal Remediation Workshop Series - Los...
[Guest Speaker] Yue Rong - GEOs Gas Thermal Remediation Workshop Series - Los...
 
GEOs Gas Thermal Remediation Workshop Series - Los Angeles (Nov 2014)
GEOs Gas Thermal Remediation Workshop Series - Los Angeles (Nov 2014)GEOs Gas Thermal Remediation Workshop Series - Los Angeles (Nov 2014)
GEOs Gas Thermal Remediation Workshop Series - Los Angeles (Nov 2014)
 
Tugas so
Tugas soTugas so
Tugas so
 
Flormar, noviembre
Flormar, noviembreFlormar, noviembre
Flormar, noviembre
 
C3 Technology - When and How to Use
C3 Technology - When and How to UseC3 Technology - When and How to Use
C3 Technology - When and How to Use
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Refusal Letter Example
Refusal Letter ExampleRefusal Letter Example
Refusal Letter Example
 

Similar to Internet protocols

Similar to Internet protocols (20)

Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Protocol
ProtocolProtocol
Protocol
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Rules of data transmission
Rules of data transmissionRules of data transmission
Rules of data transmission
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Protocol
ProtocolProtocol
Protocol
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
PROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docxPROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docx
 
internet protocol
internet protocolinternet protocol
internet protocol
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
7 Protocols
7 Protocols7 Protocols
7 Protocols
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Secure shell
Secure shellSecure shell
Secure shell
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 

Internet protocols

  • 1. Internet Protocols By: Reilen Venaas
  • 2. HTTP The Hypertext Transfer Protocol (HTTP) an internet protocol for putting out, common, multimedia information systems.
  • 3. HTTPS Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network
  • 4. SSH Secure Shell (SSH) is a coded network protocol for secure data communication, remote command-line login, remote command execution.
  • 5. POP3 A protocol for receiving e-mail by downloading it to your computer from a mailbox on the server of an Internet service provider.
  • 6. NTP Network Time Protocol (NTP) is a protocol that is used to synchronize computer clock times in a network of computers. NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a millisecond, and sometimes to a fraction of a millisecond.
  • 7. SSL Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message communication on the Internet.
  • 8. SMS Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communications protocols to allow fixed line or mobile phone devices to exchange short text messages.