1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet Protocol (IP)
is a set of rules that allows devices to communicate with each other over the Internet.
It is like the address system used for sending data.
IP address
A unique address that identifies the device over the network.
It is almost like a set of rules governing the structure of data sent over the Internet or through a local network.
Dividing Data into Packets
When you send information over the internet, IP split it into small parts called packets
Each packet contains a piece of the data and the address of where it needs to go.
Addressing
Every device connected to the internet has its own IP address.
This address helps identify where the data is being sent from and where it should be delivered
Routing the Packets
As the packets travel across the internet, they pass through several devices called routers.
These routers help direct the packets toward the correct destination, like how mail is sorted at different post offices.
Reassemble the Data
Once all the packets arrive at the destination, they are put back together to recreate the original message or file
Handling Missing Packets
If some packets don’t arrive, the system can request that they be sent again, making sure the complete data is received
Types of Internet Protocol
TCP/IP
SMTP
PPP
FTP
SFTP
HTTP
HTTPS
TELNET
POP
IPv4
IPv6
ICMP
UDP
IMAP
SSH
Gopher
Transmission Control Protocol/ Internet Protocol
the IP protocol ensures that each computer that is connected to the Internet is having a specific serial number called the IP address.
also known as a connection-oriented protocol.
It specifies how data is exchanged over the internet and how it should be broken into IP packets.
Simple Mail Transfer Protocol
is important for sending and distributing outgoing emails
This protocol uses the header of the mail to get the email id of the receiver and enters the mail into the queue of outgoing mail.
Point-to-Point Protocol
is a communication protocol that is used to create a direct connection between two communicating devices.
File Transfer Protocol
This protocol is used for transferring files from one system to the other.
This works on a client-server model.
Secure File Transfer Protocol
also known as SSH FTP refers to File Transfer Protocol (FTP)
it encrypts both commands and data while in transmission.
acts as an extension to SSH and encrypts files and data then sends them over a secure shell data stream.
Hyper Text Transfer Protocol
is used to transfer hypertexts over the internet and it is defined by the www(world wide web) for information transfer.
This protocol defines how the information needs to be formatted and transmitted.
HyperText Transfer Protocol Secure
is an extension of the Hypertext Transfer Protocol (HTTP).
It is used for secure communication over a computer network with the SSL/TLS protocol for encryption and authentication.
Terminal Network
is a standard TCP/IP protocol used for virtual terminal service given by ISO.
This enables one local machine to connect with another.
The computer which is being connected is called a remote computer
which is connecting is called the local computer.
Post Office Protocol 3
It has two Message Access Agents (MAAs) where one is client MAA (Message Access Agent) and another is server MAA(Message Access Agent) for accessing the messages from the mailbox.
IPv4
The fourth and initially widely used version of the Internet Protocol
It is the most popular version of the Internet Protocol and is in charge of distributing data packets throughout the network.
IPv6
The most recent version of the Internet Protocol
A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses.
Internet Control Message Protocol - ICMP
is a network protocol that is used to send error messages and operational information about network conditions.
It is an integral part of the Internet Protocol (IP) suite and is used to help diagnose and troubleshoot issues with network connectivity
User Datagram Protocol - UDP
is a connectionless, unreliable transport layer protocol.
Unlike TCP, it does not establish a reliable connection between devices before transmitting data, and it does not guarantee that data packets will be received in the order they were sent or that they will be received at all.
Internet Message Access Protocol
Is a protocol used for retrieving emails from a mail server.
It allows users to access and manage their emails on the server, rather than downloading them to a local device.
Secure Shell
is a protocol used for secure remote login and other secure network services.
It provides a secure and encrypted way to remotely access and manage servers, network devices, and other computer systems
Gopher
a type of file retrieval protocol that provides downloadable files with some description for easy management, retrieving, and searching of files.