Protocol
Protocol is a standard used to define a method of exchanging
data over a computer network
DHCP
Dynamic Host
Configuration Protocol, DHCP is a protocol used to assign an IP address to a computer
or device that has been connected to a network automatically. Routers, switches, or servers that
use DHCP to assign addresses to other computers
can make setup and management easier for the network administrator.
FTP
File Transfer Protocol, FTP is the
most common way of sending and receiving files between two computers. A
good example of how FTP is used today is by web developers, who connect to
their web server
using an FTP program (e.g., FileZilla)
and send updated versions of their web pages to the server.
HTTP
HyperText Transfer Protocol, HTTP is a set of standards that allow users of
the World Wide Web to exchange information found on web pages.
·
The term HTTP was coined by Ted Nelson.
· The standard port for HTTP
connections is port 80.
· HTTP/0.9 was the
first version of the HTTP, and was introduced in 1991.
HTTPS
Hypertext Transfer Protocol Secure, HTTPS is a protocol which
uses HTTP on a connection encrypted
by transport-layer
security. HTTPS is used to protect transmitted data from
eavesdropping. It is the default protocol for conducting financial transactions
on the web
HTTPS uses port 443 to transfer its information.
ERROR CODE
01
(Moved permanently)
302 (Moved temporarily)
304 (Loaded Cached copy)
307 (Internal redirect)
400 (Bad request)
401 (Authorization required)
402 (Payment required)
403 (Forbidden)
404 (Not found)
405 (Method not allowed)
406 (Not acceptable)
407 (Proxy authentication required)
408 (Request timeout)
409 (Conflict)
410 (Gone)
411 (Length required)
412 (Precondition failed)
413 (Request entity too large)
414 (Request URI too large)
302 (Moved temporarily)
304 (Loaded Cached copy)
307 (Internal redirect)
400 (Bad request)
401 (Authorization required)
402 (Payment required)
403 (Forbidden)
404 (Not found)
405 (Method not allowed)
406 (Not acceptable)
407 (Proxy authentication required)
408 (Request timeout)
409 (Conflict)
410 (Gone)
411 (Length required)
412 (Precondition failed)
413 (Request entity too large)
414 (Request URI too large)
SSL (Secure Sockets Layer) is a
standard security protocol for establishing encrypted links between a web
server and a browser in an online communication
History.
Netscape Communications created HTTPS in 1994 for its Netscape Navigator web
browser. Originally, HTTPS was used with the SSL protocol.
ICMP
ICMP is an extension to the Internet Protocol defined by RFC
792 and an error reporting protocol for
IP
Internet Protocol (IP) is the
fundamental protocol
for communications on the Internet.
It specifies the way information is packetized, addressed,
transferred, routed,
and received by networked
devices.
Its development began
in 1974, led by computer scientists Bob Kahn and Vint Cerf. It is
frequently used in conjunction with the Transmission Control Protocol, or TCP. Together they are
referred to as TCP/IP.
L2TP
Layer 2 Tunneling Protocol, L2TP is a
tunneling, Session Layer protocol, using the UDP port 1701 on a Virtual
Private Network (VPN).
It does not include any encryption and relies on other
methods to provide data security and privacy
NETBEUI
NETBios Enhanced User Interface, NetBEUI was
originally developed by IBM
in 1985 as an enhanced
version of the NetBIOS
protocol.
NetBEUI is used by network operating systems as a form of communicating with
other computers utilizing the same protocol.
OSPF
Open Shortest Path First, OSPF is an IP link-state network routing protocol
that helps determine the most efficient path to the next hop in a network
POP
Post Office Protocol, POP or POP mail is one of the most commonly used protocols
used to receive e-mail on
many e-mail clients. There are two different versions of POP: POP2 and POP3.
POP2 was an early standard of POP that was only capable of receiving e-mail and
required SMTP
to send e-mail. POP3 is the latest standard and can send and receive e-mail
only using POP, but can also be used to receive e-mail and then use SMTP to
send e-mail.
PPPOE
Point-to-Point over Ethernet, PPPoE is defined
in RFC 2516 and is
commonly used with cable,
DSL, etc. to
connect to the Internet
using the PPP and
Ethernet protocols.
PPP
Point-to-Point Protocol, PPP is a communication
protocol that enables a user to utilize their dial-up connection
(commonly a modem) to connect to other network protocols like TCP/IP and IPX
RDP
Remote Desktop Protocol, RDP is the protocol that
enables Remote Desktop Connection to communicate with Microsoft Terminal
Services. The Remote Desktop Protocol is commonly accessed through port 3389.
SSH
Secure Shell, SSH (developed by SSH
Communications Security Ltd.) is a secure protocol for remote logins. Using an
SSH client, a user can connect to a server to transfer information in a more
secure manner than other methods, such as telnet
SMTP
Simple Mail Transfer Protocol, SMTP is an Internet
standard for the sending of e-mail messages over port 25. While it
is mostly used for transfer from one mail server to another, some client mail
applications use SMTP for relaying messages; whereas receiving happens via POP or IMAP.
SNMP
Simple Network Management Protocol, SNMP was first
introduced in 1988 and
is a query, command, and response protocol. SNMP
examines and changes configuration parameters of LAN and WAN connected repeaters,
bridges,
routers,
switches,
and other devices connected to a network.
TCP/IP
Transmission Control Protocol/Internet Protocol, TCP/IP
is a set of rules (protocols)
governing communications among all computers on the Internet. More
specifically, TCP/IP dictates how information should be packaged (turned into
bundles of information called packets), sent, and
received, as well as how to get to its destination. TCP/IP was developed in 1978 and driven by Bob Kahn and Vint Cerf.
FTP
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP
connections.
What
are the different layers of TCP/IP?
There are four total layers of
TCP/IP protocol, each of which is listed below with a brief description.
- Network Access Layer
- This layer is concerned with building packets.
- Internet Layer
- This layer uses Internet Protocol (IP) to describe
how packets are to be delivered.
- Transport Layer
- This layer utilizes User Datagram Protocol (UDP) and
Transmission Control Protocol (TCP) to ensure
the proper transmission of data.
- Application Layer
- This layer deals with application network processes. These processes
include File Transfer Protocol (FTP), HyperText
Transfer Protocol (HTTP),
and Simple Mail Transfer Protocol (SMTP).
UDP
User Datagram Protocol and defined in RFC 768, UDP is
an alternative protocol to the TCP/IP that runs on
top of IP and is sometimes referred to as UDP/IP. Unlike TCP/IP, UDP does not
divide each transmission into packets, which
allows for a faster transmission. However, UDP does not provide error checking.
VOIP
IP telephone or Internet phone, VoIP is short for Voice over Internet Protocol, and it enables users to
make calls over the Internet. To make a call, a telephone is connected
to a network cable,
rather than a phone line,
or a call is made over a computer. VoIP allows long distance phone calls to be
cheaper, although sometimes with lower audio quality.
ARP
Address Resolution Protocol, ARP is used with the IP for mapping a 32-bit
Internet Protocol address to a MAC address
that is recognized in the local network specified in RFC 826. Once recognized,
the server or networking device returns a response containing the required
address.
are two networking methods for transferring data
between two nodes or hosts. For a
packet-switched
network, data is transferred by dividing the data into individual
packets and passing it through the circuits to the other host. In
packet-switched networks, the route is not exclusively determined when the
packets hit the wire.
Comments
Post a Comment