The Types of Protocols That Exist on The Internet Network

A protocol is a set of rules or standards or allow a relationship, communication and transfer of data between two or more computer point. The protocol can be implemented in hardware, software or a combination of both. At the lowest level, the protocol defines a hardware connection. Protocol is used to determine the type of services to be performed on the internet. Here are some types of protocols that exist within the Internet network.

The Types of Protocols That Exist on The Internet Network

DNS (Domain Name System)

Domain Name System is a system used to distribute the database to search the computer name (name resolution) on the network using TCP / IP. DNS is used in applications that connect to the Internet such as web browsers or e-mail, which helps map the DNS host name of a computer to an IP address.

TCP / IP (Transmission Control Protocol / Internet Protocol)

TCP / IP is a data communications standard used by the Internet community in the process of exchanging data from one computer to another computer on the network Internet. This protocol can not stand alone, because this protocol is a set of protocols (protocol suite). This protocol is a protocol that is most widely used today. The data are implemented in software (software) operating system. The term given to this software is the TCP / IP stack

TCP / IP was developed in the late 1970s to early 1980s as a standard protocol for connecting computers and network to establish a comprehensive network (WAN). TCP / IP is an open networking standard that is independent of the physical network transport mechanism used, so it can be used anywhere. This protocol uses a simple address scheme known as an IP address (IP Address), which allows up to several hundred million computers to be interconnected with each other on the Internet. This protocol is routable, which means that the protocol is suitable for connecting different systems (such as Microsoft Windows and UNIX) to form a heterogeneous network.

UDP (User Datagram Protocol)

UDP is a transport layer protocol TCP / IP communications support is not reliable (unreliable), without connection (connectionless) between the hosts on the network using TCP / IP. This protocol is defined in RFC 768.

PPP (Point-to-Point Protocol)

Point-to-Point Protocol is a network packet encapsulation protocol that is widely used in wide area network (WAN). This protocol is an industry standard that runs at the data-link layer and was developed in the early 1990s as a response to the problems that occur on the protocol Serial Line Internet Protocol (SLIP), which only supports static IP addressing to its clients. Compared with its predecessor (SLIP), PPP is far better, considering this protocol work faster, offer error correction, and negotiating sessions dynamically without any intervention from the user. In addition, this protocol also supports many network protocols simultaneously. PPP is defined in RFC 1661 and RFC 1662.

SMTP (Simple Mail Transfer Protocol)

SMTP is a commonly used protocol for sending electronic mail or email on the Internet. This protocol used to transmit data from electronic mail sender's computer to the recipient's mail server.

SLIP (Serial Line Internet Protocol)

Serial Line Internet Protocol considered closely related to the following definition
Abbreviated as SLIP. A protocol that allows transfer of IP data over telephone lines. Other tools in the SLIP is a PPP that detect errors and configuration. This system requires one server computer as containers, and gradually will be replaced by standard PPP which has a higher processing speed.

ICMP (Internet Control Message Protocol)

is one of the core protocols of the family. ICMP is different destinations with TCP and UDP in terms of ICMP is not used directly by the user's network applications. one exception is the ping application that sends ICMP Echo Request messages (and receives Echo Reply) to determine if the destination computer is reachable and how long packets sent reciprocate the destination computer. internet protocol. ICMP is used primarily by the operating system the computer network to send an error message stating, for example, that the destination computer can not be reached.

IMAP (Internet Message Access Protocol)

 IMAP (Internet Message Access Protocol) is a standard protocol for accessing / retrieving e-mails from the server. IMAP allows users to select an e-mail message that he will take, create a folder on the server, search for a particular e-mail message, even deleted e-mail messages that exist. This ability is far better than POP (Post Office Protocol) which only allows us to take his / download any messages without exception.

POP3 (Post Office Protocol)

POP3 stands for Post Office Protocol version 3, which is the protocol used to retrieve email from the email server. POP3 protocol is made due to the design of the mail system that requires an email server hosting email for a while until the email is retrieved by the recipient is entitled. The presence of these email servers due to the fact only a small part of the email recipient's computer that constantly connect to the Internet network.

FTP (File Transfer Protocol)

FTP is an internet protocol that runs at the application layer which is a standard for transferring computer files between machines in a network the Internet. FTP or protocol Transmission Control Protocol (TCP) for data communication between client and server, so between the two components will be made to a communication session before data transfer begins. FTP only uses standard authentication method, which uses the User name and password are sent in unencrypted form. Registered users can use the username and password to access, download, and upload the files you want. Generally, users have full access list, there are several directories, so that they can file, containing directories and even delete files. Unregistered users can also use the anonymous login method, by using the anonymous user name and password are filled in using the e-mail address. An FTP server is accessed by using a Universal Resource Identifier (URI) using the format ftp: // servername. FTP client can contact the FTP server by opening the URI.

TELNET (Telecommunication Network)

Telnet is a network protocol used on the Internet connection or Local Area Network (LAN). TELNET was developed in 1969 and standardized as IETF STD 8, one of the first Internet standards. TELNET has some limitations that are considered as a security risk.

LDAP (Lightweight Directory Access Protocol)

LDAP is a software protocol for enabling everyone seeking resource organizations, individuals and others, such as files or printers on the network both on the internet. LDAP protocol to form a directory containing a hierarchy tree has branches, ranging from country (countries), organization, department up to the individual. By using LDAP, one can find information about other people without knowing the location of the person to be searched.

HTTP (Hypertext Transfer Protocol)

HTTP (Hypertext Transfer Protocol) is a protocol used by WWW (World Wide Web). HTTP defines how messages can be formatted and sent from the server to the client. HTTP also regulate the actions of what should be done by the web server and the web browser in response to the commands on the HTTP protocol this. For example, if you type an Internet address or URL in a web browser, the browser sends an HTTP command to the web server. Web server will then receive this command and perform activities in accordance with the order requested by the web browser. The results of this activity will be sent back to the web browser to display to us.

SSH (Secure Shell)

SSH is a network protocol that enables secure exchange of data between two computers. SSH can be used to control a computer remotely send the file, create encrypted Tunnel and others. This protocol has the advantage compared to similar protocols such as Telnet, FTP, Danrsh, because SSH has a system Authentication, Authorization, and their own encryption. With so security of a communication session via SSH support is becoming more assured. SSH is more secure than a similar protocol, but the SSH protocol is vulnerable to some kind of face-specific attacks. In general, this attack is shown on the first version of the SSH (SSH-1) which is a level of security that is weaker than the second version of the SSH (SSH-2). One of the first attacks on the SSH version is the MAN IN THE MIDDLE attacks during key exchange. SSH protocol and the algorithm used in both versions of SSH, then attacks that occurred on SSH SSH and how to overcome them. To enhance the security of SSH protocol can be done by using cryptography to authenticate the card.

HTTPS (HTTP Secure)

HTTPS is the secure version of HTTP, because it uses encryption or secure network, a communication protocol of the World Wide Web. Discovered by Netscape Communications Corporation to provide authentication and encrypted communication and is used in electronic commerce. In addition to using plain text communication, HTTPS encrypt session data using the protocol SSL (Secure Socket Layer) or TLS protocol (Transport Layer Security). Both of these protocols provide adequate protection against eavesdroppers, and the man in the middle attacks. In general, the HTTPS port is 443.

SSL (Secure Socket Layer)

SSL is arguably the most widely used for encryption. SSL is part of HTTPS, SSL is used not only the security of web connection, but for a variety of applications that require encryption of network end-to-end. Secure Sockets Layer (SSL) is a system used to encrypt transmission of information on the internet, so that data can be transmitted securely. SSL protocol governing the security and integrity using encryption, authentication, and message authentication code. SSL protocol provides communications privacy over the internet. SSL does not support file encryption, access-control, or virus protection, so SSL can not help organize sensitive data before and after the safe delivery.

The SSL protocol consists of two sub-protocols:
  • SSL record protocol and the SSL handshake protocol. SSL record protocol defines the format used to transmit data.
  • While SSL handshake protocol involves SSL record protocol to exchange a series of messages between an SSL enabled server and SSL-enabled client when they first connect to SSL.
Thus I write this article, hopefully useful, do not forget to subscribe to this article, have a nice day.
loading...
loading...

Comments

Popular posts from this blog

Dunia Yang Menakjubkan

Natural Beauty Of Western Sumatera Indonesia

6 Games Terminal Linux-based CLI

OverClock Adalah Cara Efektif Untuk Meningkatkan Kinerja Komputer

Differences in Language Java And C++ Program