Friday, 7 October 2016
Network Protocols
Posted by Unknown in: Networking Basics
In our last post we have learnt some networking basics and
today we will learn about network protocols like FTP, SMTP, POP, HTTP etc.
As a computer hacking learner you have heard about
networking protocols. I will give you a brief introduction to these network
protocols in this post. Here’s a definition of network protocols.
Read More:- Learn basics of networking
A
protocol is a set of rule that defines how one computer will communicate and
transmit data to other on network. A simple example of network protocol is HTTP
stands for Hypertext Transfer Protocol that defines how client and server will
communicate over internet.
Meaning in brief:-
Computer
network protocols help computers to transmit and communicate with other
computer easily because protocol have rules that defines this and computer
follow these rules. For example: - In
our school days we follow some rules like class, study, recess and other. Our computers have same types of rules to
follow in order to securely and reliably perform tasks over network.
Different Network Protocols:-
MAC: - MAC or Media Access Control is a communication
protocol commonly used to distinguish different specific devices. Every
computer or devices have unique MAC address which differentiates it from
others. If you will change your computer’s name, your computer can be
identified by your MAC.
ICMP: - ICMP or Internet Control Message Protocol is a
protocol that is used to send messages between computers to check availability
and connection strength by sending some packets. Usually these packets are sent
in case of ping and trace route.
Read More:- Phases of Ethical Hacking
HTTP:- HTTP stands for Hypertext Transfer Protocol. This
protocol is defined in the Application Layer that forms basis for communication
on web. It is the protocol which is responsible for working of our internet.
This protocol defines how web pages will be transferred and how the request
will be sent to server.
FTP: - Stands for File Transfer Protocol. It is also defined
in application layer. It is mainly used to send files from one host to another.
It is also used to send files to our web server.
SSH: - SSH stands for Secure Shell. It is implemented in the
application layer. It is encrypted
protocol used to communicate with remote device on very secure and encrypted
network. Its connection is end to end encrypted.
Read More:- Introduction to Ethical Hacking
POP and SMTP: - POP (Post Office Protocol) and SMTP (Simple
Mail Transfer Protocol) are protocols specifically used to send and receive
emails because email requires its own set of rules to send and receive
mails. The most common protocol for
sending emails is SMTP and most common protocol used by pc to receive emails is
POP whose latest version is POP3.
There are some other protocols not mentioned in this guide.
In later posts I will tell you about TCP/IP and OSI model.
Read More:- Google Dorks
About Admin of the Blog:
Vijay Jangra is the founder of Cybrary Tech .He is a Tech Geek, Ethical Hacker, Programmer and a Pro Blogger. He is passionate about and love to learn new things about Ethical Hacking. Contact Him Here
0 comments:
Post a Comment