SlideShare a Scribd company logo
Network Standard and
Protocol
Network Standard
International
Standard
Organizations
International
Standard
Organizations
cont.
Network Protocol
 A protocol is a set of rules and standards that basically define a language that
devices can use to communicate. There are a great number of protocols in use
extensively in networking, and they are often implemented in different layers.
 Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of
application layer protocols, built on these lower protocols, are HTTP (for accessing
web content), SSH, TLS/SSL, and FTP
Functions of the Network Protocol
How Network Protocols Work?
 Network protocols take large-scale processes and break them down into small,
specific tasks or functions. This occurs at every level of the network, and each
function must cooperate at each level to complete the larger task at hand. The
term protocol suite refers to a set of smaller network protocols working in
conjunction with each other.
 Network protocols are typically created according to industry standard by various
networking or information technology organizations.
List of Network Protocol
There are thousands of different network protocols, but they all perform one of three
primary actions:
 Communication
 Network management
 Security
Each type is necessary to use network devices swiftly and safely, and they work
together to facilitate that usage.
Communication
protocols that allow different network devices to communicate with each other. They are
in both analog and digital communications and can be used for important processes,
from transferring files between devices to accessing the internet.
 Automation: These protocols are used to automate different processes in both commercial and personal
settings, such as in smart buildings, cloud technology or self-driving vehicles.
 Instant messaging: Instantaneous, text-based communications on smartphones and computers occur
because of a number of different instant messaging network protocols.
 Routing: Routing protocols permit communication between routers and other network devices. There are
also routing protocols specifically for ad hoc networks.
 Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and computers — work due
to a variety of different Bluetooth protocols.
 File transfer: If you have ever moved files from one device to another, either via a physical or digital
medium, you’ve used file transfer protocols (FTP).
 Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the internet. The internet
could not operate as it currently does without IP
.
Network Management
These protocols affect various devices on a single network — including computers, routers
servers — to ensure each one, and the network as a whole, perform optimally.
 Connection: These protocols establish and maintain stable connections between different
devices on the same network.
 Link aggregation: Link aggregation protocols allow you to combine multiple network
connections into one link between two devices. This works to increase the strength of the
connection and helps sustain the connection should one of the links fail.
 Troubleshooting: Troubleshooting protocols allow network administrators to identify errors
affecting the network, evaluate the quality of the network connection, and determine how
administrators can fix any issues.
Security
Security protocols, also called cryptographic protocols, work to ensure that
the network and the data sent over it are protected from unauthorized
users.
 Encryption: Encryption protocols protect data and secure areas by requiring
users to input a secret key or password in order to access that information.
 Entity Authentication: Entity authentication protocols create a system that
requires different devices or users on a network to verify their identity before
accessing secure areas.
 Transportation: Transportation security protocols protect data while it is
transported from one network device to another.
Other examples of the most commonly
used network protocols:
 Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is
transmitted over the internet and determines how web servers and browsers
should respond to commands. This protocol (or its secure counterpart, HTTPS)
appears at the beginning of various URLs or web addresses online.
 Secure Socket Shell (SSH): This protocol provides secure access to a computer,
even if it’s on an unsecured network. SSH is particularly useful for network
administrators who need to manage different systems remotely.
 Short Message Service (SMS): This communications protocol was created to
send and receive text messages over cellular networks. SMS refers exclusively to
text-based messages. Pictures, videos or other media require Multimedia
Messaging Service (MMS), an extension of the SMS protocol.

More Related Content

Similar to PC 106 PPT-07

Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxRamesh S P Ramesh
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docxkndnewguade
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdfaravlitraders2012
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptxNaveenreddyMeegada
 
Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 

Similar to PC 106 PPT-07 (20)

Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Firewall
FirewallFirewall
Firewall
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
 
Computer Introduction-Lecture07
Computer Introduction-Lecture07Computer Introduction-Lecture07
Computer Introduction-Lecture07
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Giuzio angela
Giuzio angelaGiuzio angela
Giuzio angela
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Recently uploaded

一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理dsenv
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理beduwt
 
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...rajpal6695
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaangelicafronda7
 
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, BesCLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, Besaditiyad2020
 
LPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructureLPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructureankitaagnihotri0801
 
Portfolio slide deck example number one.pdf
Portfolio slide deck example number one.pdfPortfolio slide deck example number one.pdf
Portfolio slide deck example number one.pdfkayleeachang
 
一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理
一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理
一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理beduwt
 
Cultural Landscapes: Preserving Heritage Through Museums and Exhibitions
Cultural Landscapes: Preserving Heritage Through Museums and ExhibitionsCultural Landscapes: Preserving Heritage Through Museums and Exhibitions
Cultural Landscapes: Preserving Heritage Through Museums and Exhibitionsjaafarshaikh
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...luforfor
 
Sisters_Bond_storyboard.pdf_____________
Sisters_Bond_storyboard.pdf_____________Sisters_Bond_storyboard.pdf_____________
Sisters_Bond_storyboard.pdf_____________LauraBegliomini1
 
PHOTO PRESENTATION Z.pdf ...............
PHOTO PRESENTATION Z.pdf ...............PHOTO PRESENTATION Z.pdf ...............
PHOTO PRESENTATION Z.pdf ...............kahnanews24
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonClaireWilson398082
 
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.docjosegrimaldo17
 
Family Group Pottery Sessions in Abu Dhabi
Family Group Pottery Sessions in Abu DhabiFamily Group Pottery Sessions in Abu Dhabi
Family Group Pottery Sessions in Abu DhabiAbu Dhabi Pottery
 
Presentation slide deck example for portfolio
Presentation slide deck example for portfolioPresentation slide deck example for portfolio
Presentation slide deck example for portfoliokayleeachang
 
Tackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEsTackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEsikennaaghanya
 
indian folk dances and their significance
indian folk dances and their significanceindian folk dances and their significance
indian folk dances and their significanceksathish10
 
Copy of Final Presentation example for portfolio .pdf
Copy of Final Presentation example for portfolio .pdfCopy of Final Presentation example for portfolio .pdf
Copy of Final Presentation example for portfolio .pdfkayleeachang
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)CristianMestre
 

Recently uploaded (20)

一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
 
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, BesCLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
 
LPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructureLPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructure
 
Portfolio slide deck example number one.pdf
Portfolio slide deck example number one.pdfPortfolio slide deck example number one.pdf
Portfolio slide deck example number one.pdf
 
一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理
一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理
一比一原版UC Berkeley毕业证加利福尼亚大学|伯克利分校毕业证成绩单如何办理
 
Cultural Landscapes: Preserving Heritage Through Museums and Exhibitions
Cultural Landscapes: Preserving Heritage Through Museums and ExhibitionsCultural Landscapes: Preserving Heritage Through Museums and Exhibitions
Cultural Landscapes: Preserving Heritage Through Museums and Exhibitions
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
 
Sisters_Bond_storyboard.pdf_____________
Sisters_Bond_storyboard.pdf_____________Sisters_Bond_storyboard.pdf_____________
Sisters_Bond_storyboard.pdf_____________
 
PHOTO PRESENTATION Z.pdf ...............
PHOTO PRESENTATION Z.pdf ...............PHOTO PRESENTATION Z.pdf ...............
PHOTO PRESENTATION Z.pdf ...............
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
 
Family Group Pottery Sessions in Abu Dhabi
Family Group Pottery Sessions in Abu DhabiFamily Group Pottery Sessions in Abu Dhabi
Family Group Pottery Sessions in Abu Dhabi
 
Presentation slide deck example for portfolio
Presentation slide deck example for portfolioPresentation slide deck example for portfolio
Presentation slide deck example for portfolio
 
Tackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEsTackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEs
 
indian folk dances and their significance
indian folk dances and their significanceindian folk dances and their significance
indian folk dances and their significance
 
Copy of Final Presentation example for portfolio .pdf
Copy of Final Presentation example for portfolio .pdfCopy of Final Presentation example for portfolio .pdf
Copy of Final Presentation example for portfolio .pdf
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
 

PC 106 PPT-07

  • 3.
  • 6. Network Protocol  A protocol is a set of rules and standards that basically define a language that devices can use to communicate. There are a great number of protocols in use extensively in networking, and they are often implemented in different layers.  Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and FTP
  • 7. Functions of the Network Protocol
  • 8. How Network Protocols Work?  Network protocols take large-scale processes and break them down into small, specific tasks or functions. This occurs at every level of the network, and each function must cooperate at each level to complete the larger task at hand. The term protocol suite refers to a set of smaller network protocols working in conjunction with each other.  Network protocols are typically created according to industry standard by various networking or information technology organizations.
  • 9. List of Network Protocol There are thousands of different network protocols, but they all perform one of three primary actions:  Communication  Network management  Security Each type is necessary to use network devices swiftly and safely, and they work together to facilitate that usage.
  • 10. Communication protocols that allow different network devices to communicate with each other. They are in both analog and digital communications and can be used for important processes, from transferring files between devices to accessing the internet.  Automation: These protocols are used to automate different processes in both commercial and personal settings, such as in smart buildings, cloud technology or self-driving vehicles.  Instant messaging: Instantaneous, text-based communications on smartphones and computers occur because of a number of different instant messaging network protocols.  Routing: Routing protocols permit communication between routers and other network devices. There are also routing protocols specifically for ad hoc networks.  Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and computers — work due to a variety of different Bluetooth protocols.  File transfer: If you have ever moved files from one device to another, either via a physical or digital medium, you’ve used file transfer protocols (FTP).  Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the internet. The internet could not operate as it currently does without IP .
  • 11. Network Management These protocols affect various devices on a single network — including computers, routers servers — to ensure each one, and the network as a whole, perform optimally.  Connection: These protocols establish and maintain stable connections between different devices on the same network.  Link aggregation: Link aggregation protocols allow you to combine multiple network connections into one link between two devices. This works to increase the strength of the connection and helps sustain the connection should one of the links fail.  Troubleshooting: Troubleshooting protocols allow network administrators to identify errors affecting the network, evaluate the quality of the network connection, and determine how administrators can fix any issues.
  • 12. Security Security protocols, also called cryptographic protocols, work to ensure that the network and the data sent over it are protected from unauthorized users.  Encryption: Encryption protocols protect data and secure areas by requiring users to input a secret key or password in order to access that information.  Entity Authentication: Entity authentication protocols create a system that requires different devices or users on a network to verify their identity before accessing secure areas.  Transportation: Transportation security protocols protect data while it is transported from one network device to another.
  • 13. Other examples of the most commonly used network protocols:  Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is transmitted over the internet and determines how web servers and browsers should respond to commands. This protocol (or its secure counterpart, HTTPS) appears at the beginning of various URLs or web addresses online.  Secure Socket Shell (SSH): This protocol provides secure access to a computer, even if it’s on an unsecured network. SSH is particularly useful for network administrators who need to manage different systems remotely.  Short Message Service (SMS): This communications protocol was created to send and receive text messages over cellular networks. SMS refers exclusively to text-based messages. Pictures, videos or other media require Multimedia Messaging Service (MMS), an extension of the SMS protocol.