The
Transmission Control Protocol (TCP) is one of the core protocols of the
Internet Protocol Suite. It is a reliable stream delivery service that
guarantees delivery of a data stream sent from one host to another without
duplication or losing data.
- FTP
File
Transfer Protocol (FTP) is a standard network protocol used to transfer files
from one host to another host over a TCP-based network, such as the Internet.
FTP is built on a client-server architecture and uses separate control and data
connections between the client and server. Authentication is accomplished
through the use of a clear-text sign-in protocol and is not considered to be
secure.
- UDP
The
User Datagram Protocol (UDP) is one of the core members of the Internet
Protocol Suite, the set of network protocols used for the Internet. With UDP,
computer applications can send messages, in this case referred to as datagrams,
to other hosts on an Internet Protocol (IP) network without requiring prior
communications to set up special transmission channels or data paths. UDP
provides an unreliable service and datagrams may arrive out of order, appear
duplicated, or go missing without notice.
- TCP/IP suite
The
TCP/IP suite is a collection of internet protocols developed by the Department
of Defense. Designed to permit communication among a variety of independent,
multivendor systems, support is provided for a wide variety of protocols and
services, including TCP, IP, UDP, ARP, and others, on many different types of
media. TCP/IP is routable across more than one local area network (LAN). Named for
it's two primary protocols, Transmission Control Protocol (TCP) and Internet
Protocol (IP), TCP/IP provides end-to-end connectivity specifying how data
should be formatted, addressed, transmitted, routed and received at the
destination.
- DHCP
The
Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol
that enables a server on an IP network to automatically assign an IP address to
a computer from a predetermined range of numbers. The most essential
information needed is an IP address, and a default route and routing prefix.
DHCP controls the assignment of unique dynamic IP addresses and routing
information, eliminating the manual task by a network administrator.
- TFTP
Trivial
File Transfer Protocol (TFTP) is a simple insecure protocol used to transfer
files. It is typically implemented on top of the User Datagram Protocol (UDP)
using port number 69. Packets are limited to a 512 byte limit and can be easily
lost. When a packet smaller than 512 bytes is received, the server assumes the
end of the file has been reached and closes the connection. Transmission is not
guaranteed to be complete and has no provision for user authentication. TFTP is
designed to be small and easy to implement, therefore, lacks most of the
features of FTP. TFTP only reads and writes files (or mail) to or from a remote
server, it cannot list directories. TFTP can be used for remote booting of
devices without hard drives. Used in conjunction with a bootp server, the
device receives its addressing information and the address of the TFTP server
from which it should boot.
- DNS
The
Domain Name System (DNS) is a hierarchical naming system for computers,
services, or any resource connected to the Internet or a private network.
Internet and TCP utilities such as telnet, FTP, and SMTP use DNS to translate
computer host and domain names to their corresponding IP addresses. DNS allows
you to type recognizable names into your Web browser and your computer will
automatically find that address on the Internet. Address information is stored
in several locations in a hierarchical structure.
- HTTPS
Hypertext
Transfer Protocol Secure (HTTPS) is a combination of Hypertext Transfer
Protocol (HTTP) with SSL/TLS protocol. It provides encrypted communication and
secure identification of a network web server. HTTPS connections are often used
for payment transactions on the World Wide Web and for sensitive transactions
in corporate information systems. HTTPS uses port 443 by default.
- HTTP
Hypertext
Transfer Protocol (HTTP) is an application-level protocol used to request and
deliver web pages between a server and browser. HTTP is the foundation of data
communication for the World Wide Web.
- ARP
Address
Resolution Protocol (ARP) is a low-level network protocol used for the
resolution of network layer IP addresses into corresponding link layer MAC
(Media Access Control) addresses. ARP is the standard of identifying a host's
hardware address when only its network IP address is known.
ARP operates at Layer 2 of the OSI model allowing packets or frames on a local network to be delivered to physical (MAC) addresses, not IP addresses. When a machine attempts to communicate with another on the same local network, it will first check it's own ARP cache for the desired IP and MAC addresses. If it doesn't find the desired entry, it will broadcast an ICMP ping request for the IP address to every machine on the local network. If the intended target is online, a reply is returned with the proper IP address and physical address.
ARP operates at Layer 2 of the OSI model allowing packets or frames on a local network to be delivered to physical (MAC) addresses, not IP addresses. When a machine attempts to communicate with another on the same local network, it will first check it's own ARP cache for the desired IP and MAC addresses. If it doesn't find the desired entry, it will broadcast an ICMP ping request for the IP address to every machine on the local network. If the intended target is online, a reply is returned with the proper IP address and physical address.
- SIP (VoIP)
The
Session Initiation Protocol (SIP) is a signaling protocol widely used for
controlling communication sessions such as voice and video calls over Internet
Protocol (IP). The protocol can be used for creating, modifying and terminating
two-party (unicast) or multiparty (multicast) sessions. Sessions may consist of
one or several media streams.
- RTP (VoIP)
The
Real-time Transport Protocol (RTP) defines a standardized packet format for
delivering audio and video over IP networks. RTP is used extensively in
communication and entertainment systems that involve streaming media, such as
telephony, video teleconference applications, television services and web-based
push-to-talk features.
- SSH
Secure
Shell (SSH) is a cryptographic remote login protocol for secure data
communication over an unsecured network. Designed as a replacement for telnet
and rlogin, which send information in plaintext, SSH client and server programs
provide strong host-to-host and user authentication as well as a number of
securely encrypted methods of communication to provide confidentiality and
integrity of data. SSH supports data stream compression between the client and
the server.
There are two major versions of the SSH protocol in widespread
use, SSH v1 and SSH v2. SSH v2 is more secure, and includes SFTP, which is
similar to FTP, but is SSH v2 encrypted.
- POP3
Post
Office Protocol (POP3) is a simple, standardized application-layer protocol
used for retrieving incoming email from a remote mail server over a TCP/IP
connection and saving to a local device. A POP3 server listens on well-known
port TCP/110.
- NTP
The
Network Time Protocol (NTP) is a networking protocol and software
implementation for synchronizing the clocks of computer systems over
packet-switched, variable-latency data networks.
- IMAP4
Internet
message access protocol (IMAP) is one of the two most prevalent Internet
standard protocols for e-mail retrieval, the other being the Post Office
Protocol (POP). Virtually all modern e-mail clients and mail servers support
both protocols as a means of transferring e-mail messages from a server. IMAP
is a client/server protocol in which e-mail is received and held by your
Internet server and downloaded from the server by request. Imap permits the
manipulation of remote mailboxes as though they were local, and works well with
slower modem connections.
- Telnet
Short
for Telecommunications network, TELNET is a text based interface protocol that
provides an insecure remote access to other computers. Telnet uses a command
line interface and can be accessed in Windows from the Start menu by clicking
<Start>, <Run>, then by typing: telnet (somesite) 23. Port number
23 is the default port used by telnet, but is usually optional and often not
required.
- SMTP
Simple
Mail Transfer Protocol (SMTP) is a reliable and efficient mail transport and
delivery protocol that is capable of transporting outgoing email across
multiple networks. SMTP requires a reliable data stream channel for
transmission.
- SNMP2/3
Simple
Network Management Protocol (SNMP) is an "Internet-standard protocol for
managing devices on IP networks. Devices that typically support SNMP include
routers, switches, servers, workstations, printers, modem racks, and
more." It is used mostly in network management systems to monitor
network-attached devices for conditions that warrant administrative attention.
- ICMP
The
Internet Control Message Protocol (ICMP) is one of the core protocols of the
Internet Protocol Suite. It is chiefly used by the operating systems of
networked computers to send error messages indicating, for example, that a
requested service is not available or that a host or router could not be
reached. ICMP can also be used to relay query messages.
- IGMP
The
Internet Group Management Protocol (IGMP) is a communications protocol used by
hosts and adjacent routers on IP networks to establish multicast group
memberships.
- TLS
Transport
Layer Security (TLS) is a cryptographic protocol that provides communication
security over the Internet. TLS encrypts the segments of network connections
above the Transport Layer, using asymmetric cryptography for key exchange,
symmetric encryption for privacy, and message authentication codes for message
integrity.
No comments:
Post a Comment