1/51
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet Protocol
a set of rules that allows devices to communicate with each other over the Internet.
Internet Protocol
It is like the address system used for sending data.
IP Address
A unique address that identifies the device over the network
IP Address
It is almost like a set of rules governing the structure of data sent over the Internet or through a local network.
IP Address
helps the Internet to distinguish between different routers, computers, and websites
IP Address
It serves as a specific machine identifier in a specific network and helps to improve visual communication between source and destination.
Dividing Data into Packets
When you send information over the internet, IP split it into small parts called packets. Each packet contains a piece of the data and the address of where it needs to go.
Addressing
Every device connected to the internet has its own IP address. This address helps identify where the data is being sent from and where it should be delivered.
Routing the Packets
As the packets travel across the internet, they pass through several devices called routers. These routers help direct the packets toward the correct destination, like how mail is sorted at different post offices.
Reassemble the Data
Once all the packets arrive at the destination, they are put back together to recreate the original message or file.
Handling Missing Packets
If some packets don’t arrive, the system can request that they be sent again, making sure the complete data is received.
TCP/IP(Transmission Control Protocol/ Internet Protocol)
the IP protocol ensures that each computer that is connected to the Internet is having a specific serial number called the IP address.
TCP/IP(Transmission Control Protocol/ Internet Protocol)
specifies how data is exchanged over the internet and how it should be broken into IP packets.
TCP/IP(Transmission Control Protocol/ Internet Protocol)
makes sure that the packets have information about the source of the message data, the destination of the message data, the sequence in which the message data should be re-assembled, and checks if the message has been sent correctly to the specific destination.
TCP/IP(Transmission Control Protocol/ Internet Protocol)
also known as a connection-oriented protocol.
SMTP(Simple Mail Transfer Protocol)
protocol is important for sending and distributing outgoing emails.
SMTP(Simple Mail Transfer Protocol)
This protocol uses the header of the mail to get the email id of the receiver and enters the mail into the queue of outgoing mail. And as soon as it delivers the mail to the receiving email id, it removes the email from the outgoing list.
SMTP(Simple Mail Transfer Protocol)
The message or the electronic mail may consider the text, video, image, etc. It helps in setting up some communication server rules.
PPP(Point-to-Point Protocol)
a communication protocol that is used to create a direct connection between two communicating devices.
PPP(Point-to-Point Protocol)
This protocol defines the rules using which two devices will authenticate with each other and exchange information with each other
FTP (File Transfer Protocol)
This protocol is used for transferring files from one system to the other.
FTP (File Transfer Protocol)
This works on a client-server model.
FTP (File Transfer Protocol)
When a machine requests for file transfer from another machine, the FTO sets up a connection between the two and authenticates each other using their ID and Password. And, the desired file transfer takes place between the machines.
SFTP(Secure File Transfer Protocol)
also known as SSH FTP refers to File Transfer Protocol (FTP) over Secure Shell (SSH) as it encrypts both commands and data while in transmission.
SFTP(Secure File Transfer Protocol)
acts as an extension to SSH and encrypts files and data then sends them over a secure shell data stream.
SFTP(Secure File Transfer Protocol)
This protocol is used to remotely connect to other systems while executing commands from the command line.
HTTP(Hyper Text Transfer Protocol)
used to transfer hypertexts over the internet and it is defined by the www(world wide web) for information transfer.
HTTP(Hyper Text Transfer Protocol)
This protocol defines how the information needs to be formatted and transmitted. And, it also defines the various actions the web browsers should take in response to the calls made to access a particular web page.
HTTP(Hyper Text Transfer Protocol)
Whenever a user opens their web browser, the user will indirectly use HTTP as this is the protocol that is being used to share text, images, and other multimedia files on the World Wide Web.
HTTPS(HyperText Transfer Protocol Secure)
extension of the Hypertext Transfer Protocol (HTTP).
HTTPS(HyperText Transfer Protocol Secure)
It is used for secure communication over a computer network with the SSL/TLS protocol for encryption and authentication
TELNET(Terminal Network)
a standard TCP/IP protocol used for virtual terminal service given by ISO. This enables one local machine to connect with another
TELNET(Terminal Network)
The computer which is being connected is called a remote computer and which is connecting is called the local computer.
TELNET(Terminal Network)
lets us display anything being performed on the remote computer in the local computer.
TELNET(Terminal Network)
This operates on the client/server principle.
POP3(Post Office Protocol 3)
has two Message Access Agents (MAAs) where one is client MAA (Message Access Agent) and another is server MAA(Message Access Agent) for accessing the messages from the mailbox.
POP3(Post Office Protocol 3)
This protocol helps us to retrieve and manage emails from the mailbox on the receiver mail server to the receiver’s computer.
POP3(Post Office Protocol 3)
It can also be called a one-way client-server protocol. The POP3 works on two ports i.e port 110 and port 995.
IPv4
It is the most popular version of the Internet Protocol and is in charge of distributing data packets throughout the network.
IPv6
A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses. Contrarily, IPv6 uses 128-bit addresses, which enable a significantly greater number of unique addresses.
ICMP
a network protocol that is used to send error messages and operational information about network conditions. It is an integral part of the Internet Protocol (IP) suite and is used to help diagnose and troubleshoot issues with network connectivity.
ICMP
can also be used by network management tools to test the reachability of a host and measure the round-trip time for packets to travel from the source to the destination and back.
UDP
a connectionless, unreliable transport layer protocol.
UDP
Unlike TCP, it does not establish a reliable connection between devices before transmitting data, and it does not guarantee that data packets will be received in the order they were sent or that they will be received at all.
UDP
simply sends packets of data to a destination without any error checking or flow control.
IMAP
Internet Message Access Protocol
IMAP
a protocol used for retrieving emails from a mail server. It allows users to access and manage their emails on the server, rather than downloading them to a local device. This means that the user can access their emails from multiple devices and the emails will be synced across all devices.
IMAP
more flexible than POP3 (Post Office Protocol version 3) as it allows users to access and organize their emails on the server, and also allows multiple users to access the same mailbox.
SSH
protocol used for secure remote login and other secure network services. It provides a secure and encrypted way to remotely access and manage servers, network devices, and other computer systems.
Gopher
a type of file retrieval protocol that provides downloadable files with some description for easy management, retrieving, and searching of files. All the files are arranged on a remote computer in a stratified manner. It is an old protocol and it is not much used nowadays.