A protocol is a set of rules for exchanging data between devices and ensuring messages are sent and received properly. The main protocols discussed are Transmission Control Protocol (TCP) which ensures packet delivery across networks, Internet Protocol (IP) which provides addressing to route information, Hypertext Transfer Protocol (HTTP) for accessing web pages, Simple Mail Transfer Protocol (SMTP) for email transfer, and File Transfer Protocol (FTP) for copying files between devices.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
TCP - TCP breaks data into manageable packets and tracks information such as source and
destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of
the data.
IP - This is a connectionless protocol, which means that a session is not created before sending
data. IP is responsible for addressing and routing of packets between computers. It does not
guarantee delivery and does not give acknowledgement of packets that are lost or sent out of
order as this is the responsibility of higher layer protocols such as TCP.
UDP - A connectionless, datagram service that provides an unreliable, best-effort delivery.
ICMP - Internet Control Message Protocol enables systems on a TCP/IP network to share status
and error information such as with the use of PING and TRACERT utilities.
SMTP - Used to reliably send and receive mail over the Internet.
FTP - File transfer protocol is used for transferring files between remote systems. Must resolve
host name to IP address to establish communication. It is connection oriented (i.e. verifies that
packets reach destination).
TFTP - Same as FTP but not connection oriented.
ARP - provides IP-address to MAC address resolution for IP packets. A MAC address is your
computer\'s unique hardware number and appears in the form 00-A0-F1-27-64-E1 (for example).
Each computer stores an ARP cache of other computers ARP-IP combinations.
POP3 - Post Office Protocol. A POP3 mail server holds mail until the workstation is ready to
receive it.
IMAP - Like POP3, Internet Message Access Protocol is a standard protocol for accessing e-
mail from your local server. IMAP (the latest version is IMAP4) is a client/server protocol in
which e-mail is received and held for you by your Internet server.
TELNET - Provides a virtual terminal or remote login across the network that is connection-
based. The remote server must be running a Telnet service for clients to connect.
HTTP - The Hypertext Transfer Protocol is the set of rules for exchanging files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. It is the protocol
controlling the transfer and addressing of HTTP requests and responses.
HTTPS - Signifies that a web page is using the Secure Sockets Layer (SSL) protocol and is
providing a secure connection. This is used for secure internet business transactions.
NTP - Network Time Protocol is a protocol that is used to synchronize computer clock times in
a network of computers.
SNMP - Stands for Simple Network Management Protocol and is used for monitoring and status
information on a network. SNMP can be used to monitor any device that is SNMP capable and
this can include computers, printers, routers, servers, gateways and many more using agents on
the target systems. The agents report information back to the management systems by the use of
“traps” which capture snapshot data of the system. This trap information could be system errors,
resource information, or other info.
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP IP, because it's most important protocols, the Transmission Control Protocol TCP and the Internet Protocol IP , were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP IP provides end to end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment link the internet layer, connecting hosts across independent networks, thus establishing internetworking the transport layer handling host to host communication and the application layer, which provides process to process application data exchange. Our aim is describe operation and models of TCP IP suite in data communication networking. Ei Ei Khaing "Comparison of DOD and OSI Model in the Internet Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27834.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/27834/comparison-of-dod-and-osi-model-in-the-internet-communication/ei-ei-khaing
This slide is design for communication and computer students. students can get help from this slide about TCP/IP and protocols of internet. this slide has basic knowledge about TCP and its layers.
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
TCP : RFC 793
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language
or protocol of the Internet. It can also be used as a communications protocol in a private network
(either an intranet or an extranet). When you are set up with direct access to the Internet, your
computer is provided with a copy of the TCP/IP program just as every other computer that you
may send messages to or get information from also has a copy of TCP/IP.
UDP: RFC 768
UDP (User Datagram Protocol) is an alternative communications protocol to Transmission
Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
connections between applications on the Internet. Both UDP and TCP run on top of the Internet
Protocol (IP) and are sometimes referred to as UDP/IP or TCP/IP. Both protocols send short
packets of data, called datagrams.
UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, a checksum capability to verify that the data
arrived intact.
IPv4: RFC 791
Internet Protocol being a layer-3 protocol (OSI) takes data Segments from layer-4 (Transport)
and divides it into packets. IP packet encapsulates data unit received from above layer and add to
its own header information.
IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best
effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing
or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an
upper layer transport protocol, such as the Transmission Control Protocol (TCP).
IPv6 : RFC 2460
IPv6 (Internet Protocol version 6) is a set of specifications from the Internet Engineering Task
Force (IETF) that\'s essentially an upgrade of IP version 4 (IPv4). The basics of IPv6 are similar
to those of IPv4 -- devices can use IPv6 as source and destination addresses to pass packets over
a network, and tools like ping work for network testing as they do in IPv4, with some slight
variations.
The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from 32
bits to 128 bits. This extension anticipates considerable future growth of the Internet and
provides relief for what was perceived as an impending shortage of network addresses. IPv6 also
supports auto-configuration to help correct most of the shortcomings in version 4, and it has
integrated security and mobility features.
HTTP : RFC 1945
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web
user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an
application protocol that runs on top of the TCP/IP suite of protocols (the foundation protocols
for the Internet).
HTTP concepts include (as the Hypertext part of the name implies) the idea that .
Identify and describe each phase (numbered) in the TCP trace- Make sur.docxmckerliejonelle
Identify and describe each phase (numbered) in the TCP trace. Make sure to mention the specific reason for switching to a different phase.
Solution
TCP/IP is a two-layer program. The higherlayer, Transmission Control Protocol, manages the assembling of a message or file into smallerpackets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles theaddress part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they\'ll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be \"stateless\" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
PRO+
Content
Find more PRO+ content and other member only offers,here.
E-Handbook
Readying the data center for the IoT era
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web\'s Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a \"suite.\"
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider\'s modem.
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).
.
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
TCP - TCP breaks data into manageable packets and tracks information such as source and
destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of
the data.
IP - This is a connectionless protocol, which means that a session is not created before sending
data. IP is responsible for addressing and routing of packets between computers. It does not
guarantee delivery and does not give acknowledgement of packets that are lost or sent out of
order as this is the responsibility of higher layer protocols such as TCP.
UDP - A connectionless, datagram service that provides an unreliable, best-effort delivery.
ICMP - Internet Control Message Protocol enables systems on a TCP/IP network to share status
and error information such as with the use of PING and TRACERT utilities.
SMTP - Used to reliably send and receive mail over the Internet.
FTP - File transfer protocol is used for transferring files between remote systems. Must resolve
host name to IP address to establish communication. It is connection oriented (i.e. verifies that
packets reach destination).
TFTP - Same as FTP but not connection oriented.
ARP - provides IP-address to MAC address resolution for IP packets. A MAC address is your
computer\'s unique hardware number and appears in the form 00-A0-F1-27-64-E1 (for example).
Each computer stores an ARP cache of other computers ARP-IP combinations.
POP3 - Post Office Protocol. A POP3 mail server holds mail until the workstation is ready to
receive it.
IMAP - Like POP3, Internet Message Access Protocol is a standard protocol for accessing e-
mail from your local server. IMAP (the latest version is IMAP4) is a client/server protocol in
which e-mail is received and held for you by your Internet server.
TELNET - Provides a virtual terminal or remote login across the network that is connection-
based. The remote server must be running a Telnet service for clients to connect.
HTTP - The Hypertext Transfer Protocol is the set of rules for exchanging files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. It is the protocol
controlling the transfer and addressing of HTTP requests and responses.
HTTPS - Signifies that a web page is using the Secure Sockets Layer (SSL) protocol and is
providing a secure connection. This is used for secure internet business transactions.
NTP - Network Time Protocol is a protocol that is used to synchronize computer clock times in
a network of computers.
SNMP - Stands for Simple Network Management Protocol and is used for monitoring and status
information on a network. SNMP can be used to monitor any device that is SNMP capable and
this can include computers, printers, routers, servers, gateways and many more using agents on
the target systems. The agents report information back to the management systems by the use of
“traps” which capture snapshot data of the system. This trap information could be system errors,
resource information, or other info.
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP IP, because it's most important protocols, the Transmission Control Protocol TCP and the Internet Protocol IP , were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP IP provides end to end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment link the internet layer, connecting hosts across independent networks, thus establishing internetworking the transport layer handling host to host communication and the application layer, which provides process to process application data exchange. Our aim is describe operation and models of TCP IP suite in data communication networking. Ei Ei Khaing "Comparison of DOD and OSI Model in the Internet Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27834.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/27834/comparison-of-dod-and-osi-model-in-the-internet-communication/ei-ei-khaing
This slide is design for communication and computer students. students can get help from this slide about TCP/IP and protocols of internet. this slide has basic knowledge about TCP and its layers.
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
TCP : RFC 793
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language
or protocol of the Internet. It can also be used as a communications protocol in a private network
(either an intranet or an extranet). When you are set up with direct access to the Internet, your
computer is provided with a copy of the TCP/IP program just as every other computer that you
may send messages to or get information from also has a copy of TCP/IP.
UDP: RFC 768
UDP (User Datagram Protocol) is an alternative communications protocol to Transmission
Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating
connections between applications on the Internet. Both UDP and TCP run on top of the Internet
Protocol (IP) and are sometimes referred to as UDP/IP or TCP/IP. Both protocols send short
packets of data, called datagrams.
UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, a checksum capability to verify that the data
arrived intact.
IPv4: RFC 791
Internet Protocol being a layer-3 protocol (OSI) takes data Segments from layer-4 (Transport)
and divides it into packets. IP packet encapsulates data unit received from above layer and add to
its own header information.
IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best
effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing
or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an
upper layer transport protocol, such as the Transmission Control Protocol (TCP).
IPv6 : RFC 2460
IPv6 (Internet Protocol version 6) is a set of specifications from the Internet Engineering Task
Force (IETF) that\'s essentially an upgrade of IP version 4 (IPv4). The basics of IPv6 are similar
to those of IPv4 -- devices can use IPv6 as source and destination addresses to pass packets over
a network, and tools like ping work for network testing as they do in IPv4, with some slight
variations.
The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from 32
bits to 128 bits. This extension anticipates considerable future growth of the Internet and
provides relief for what was perceived as an impending shortage of network addresses. IPv6 also
supports auto-configuration to help correct most of the shortcomings in version 4, and it has
integrated security and mobility features.
HTTP : RFC 1945
HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic
images, sound, video, and other multimedia files) on the World Wide Web. As soon as a Web
user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an
application protocol that runs on top of the TCP/IP suite of protocols (the foundation protocols
for the Internet).
HTTP concepts include (as the Hypertext part of the name implies) the idea that .
Identify and describe each phase (numbered) in the TCP trace- Make sur.docxmckerliejonelle
Identify and describe each phase (numbered) in the TCP trace. Make sure to mention the specific reason for switching to a different phase.
Solution
TCP/IP is a two-layer program. The higherlayer, Transmission Control Protocol, manages the assembling of a message or file into smallerpackets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles theaddress part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they\'ll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be \"stateless\" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
PRO+
Content
Find more PRO+ content and other member only offers,here.
E-Handbook
Readying the data center for the IoT era
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web\'s Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a \"suite.\"
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider\'s modem.
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).
.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
This 7-second Brain Wave Ritual Attracts Money To You.!
PROTOCOLS AND ITS TYPES.docx
1. PROTOCOLS AND ITS TYPES
PROTOCOLS:-
A protocol is a set of rules for the exchange of data between a terminal and
computer or between two computers. Think of protocol as a sort of
recommunication agreement about the form in which a message or data is to
be sent and receipt is to be acknowledge.
Types of protocols:-
1. Transmission control protocol.
2. Internet protocol.
3. Hypertext transfer protocol.
4. Simple mail transfer protocol.
5. File transfer protocol.
TRANSMISSION CONTROL PROTOCOL (TCP)
This protocol ensures the delivery of information packets across internets.
INTERNET PROTOCOL (IP)
This important protocol is responsible for providing logical addressing called IP address to route
information between networks.
HYPERTEXT TRANSFER PROTOCOL(HTTP).
This protocol is used to access, send and receive Hypertext markup language (HTML) files on the
internet.
SIMPLE MAIL TRANSFER PROTOCOL.(SMTP)
This protocol is used to transfer email between computers.
FILE TRANSFER PROTOCOL.(FTP)
This protocol is responsible for allowing file to be copied between devices.