Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
35 views23 pages

14.5 Network Protocols

The document provides an overview of various network protocols, including tunneling protocols, SSL, TLS, IPsec, BitTorrent, ICMP, ARP, DHCP, HTTP/HTTPS, FTP, SMTP, POP, IMAP, Telnet, and SSH. Each protocol's purpose, functionality, security features, and applications are discussed, highlighting their roles in secure data transmission and network communication. Additionally, a quiz link is provided for further understanding of these protocols.

Uploaded by

haris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views23 pages

14.5 Network Protocols

The document provides an overview of various network protocols, including tunneling protocols, SSL, TLS, IPsec, BitTorrent, ICMP, ARP, DHCP, HTTP/HTTPS, FTP, SMTP, POP, IMAP, Telnet, and SSH. Each protocol's purpose, functionality, security features, and applications are discussed, highlighting their roles in secure data transmission and network communication. Additionally, a quiz link is provided for further understanding of these protocols.

Uploaded by

haris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

14.

5 Network protocols By Waqqad


Tunnelling
Protocol
• Purpose:
• Allows secure transmission of private data
across a public network, enhancing data
privacy.
• Process:
• Uses a technique called encapsulation,
where private data packets are disguised as
public ones.
• Application:
• Commonly used in VPNs to secure data as
it travels across public networks.
Tunnelling
Protocol
• Security:
• Encapsulation prevents unauthorized
interception by making the data
appear non-sensitive.
• Importance:
• Essential for safely transmitting
confidential data over the internet,
supporting network security.
Secure Sockets
Layer (SSL)
• Function:
• Ensures secure connections between
web clients (like browsers) and servers
(web or mail servers).
• Encryption:
• Uses public and private key encryption
to protect transmitted data over a
secure connection.
• Legacy:
• Primarily replaced by TLS due to
advancements in security algorithms.
Secure Sockets
Layer (SSL)
• Usage:
• Still in use in some
applications but less
common due to security
enhancements in TLS.
• Relevance:
• A foundational protocol for
internet security, offering
essential encryption
practices.
Transport Layer
Security (TLS)
• Update of SSL:
• Improved upon SSL, using more
advanced and secure encryption
algorithms.
• Data Protection:
• Encrypts data between web clients
and servers to protect against
eavesdropping and tampering.
• Authentication:
• Ensures data authenticity, verifying the
identities of both parties in a
connection.
Transport Layer
Security (TLS)
• Adoption:
• Widely used in modern secure
internet applications, such as banking
and e-commerce.
• Importance:
• Critical for protecting sensitive
information and ensuring secure
online communications.
Internet Protocol
Security (IPsec)
• Primary Purpose:
• Encrypts and authenticates data packets sent
across the internet to prevent unauthorized
access.
• Core Role in VPNs:
• Key component of the VPN tunneling process,
securing private data transmission.
• Security Techniques:
• Uses complex encryption and authentication to
verify packet integrity and origin.
Internet Protocol
Security (IPsec)
• Usage:
• Common in secure connections across
public and private networks, especially
within business environments.
• Advantage:
• Enhances data privacy by securing
packets at the network layer, adding a
robust security layer.
BitTorrent Protocol
• Purpose:
• Used as a communications protocol in peer-to-peer (P2P) file
sharing to transfer large files like videos efficiently.
• Swarm Concept:
• Creates a "swarm" by connecting multiple sources, or hosts, to
distribute download load across the network.
• File Segmentation:
• Breaks the file into smaller pieces, downloading them
simultaneously from various hosts in the swarm.
• Reassembly:
• Reorganizes downloaded pieces into the correct order to
construct the complete file upon download completion.
Key BitTorrent
Roles and Security
• Peer:
• Refers to any user attempting to download parts of the file from the
swarm.
• Seed:
• A user in the swarm that uploads pieces of the file to other peers to
support file distribution.
• Data Integrity:
• Each piece of the file is protected to prevent modifications,
ensuring the file's integrity during transfer.
• Efficient Load Sharing:
• Spreads data upload and download load across many users,
reducing strain on any single host.
Internet Control Message
Protocol (ICMP)
• Primary Function:
• ICMP is an error-reporting protocol used to communicate errors
back to the data sender when issues occur in data delivery.
• Error Messages:
• Generates specific error messages for scenarios like
unreachable destinations, packet loss, and network congestion.
• Ping Functionality:
• ICMP is used in the ping command to test connectivity and
measure round-trip time to a networked device.
• Troubleshooting Tool:
• Essential in network troubleshooting and diagnostics to identify
problems in data packet delivery
Address Resolution
Protocol (ARP)
• IP to MAC Translation:
• ARP translates IP addresses to MAC addresses, allowing
devices to locate one another on a local network.
• Layer Interaction:
• Operates between the OSI model's network layer (IP
addresses) and data link layer (MAC addresses).
• Broadcast Request:
• Sends a broadcast on the network to request the MAC
address of a device with a known IP.
• ARP Cache:
• Stores IP-to-MAC mappings temporarily to improve efficiency
in communication on the network.
Inverse Address Resolution
Protocol (InARP)

• MAC to IP Translation:
• InARP performs the reverse of ARP, translating MAC addresses
back into IP addresses.
• Local Network Use:
• Mainly used within a local network for dynamic address discovery
in certain network protocols.
• Protocol Support
• Primarily supports ATM and Frame Relay networks where IP
addresses aren’t initially known.
• Dynamic Address Resolution:
• Helps devices automatically discover IP addresses in cases where
only MAC addresses are available.
Dynamic Host Configuration
Protocol (DHCP)

• Automatic IP Assignment:
• DHCP dynamically assigns IP addresses to devices on a network,
reducing the need for manual configuration.
• IP Address Management:
• Manages and reuses IP addresses by leasing them to devices for a
set period, then reclaiming them for others.
• Configuration Information:
• Provides additional network configuration details like subnet mask,
default gateway, and DNS servers.
• Simplified Network Administration:
• Reduces workload for network administrators by automating IP
address distribution.
Hypertext Transfer Protocol
(HTTP and HTTPS)

• Content Transfer:
• HTTP is used to transfer the content of web pages from a web
server to a web browser across the internet.
• Standard Protocol:
• HTTP is the standard protocol for web page transfer, used in
most web interactions.
• HTTPS for Security:
• HTTPS is the secure version of HTTP, incorporating SSL to
encrypt data and secure online transactions.
• Data Integrity:
• HTTPS ensures data integrity, verifying that web page content
is unaltered from the server to the client.
File Transfer
Protocol (FTP)
• File Transfers:
• FTP is used to transfer files between a client and server in a
network, allowing file uploads and downloads.
• Data Access Control:
• FTP provides login and password authentication to manage
access to files and directories.
• Two Modes:
• Supports both active and passive modes to optimize file transfers
based on firewall configurations.
• Unencrypted:
• FTP does not inherently provide encryption, so it’s typically used
within secure or private networks.
Simple Mail Transfer
Protocol (SMTP)
• Email Sending Protocol:
• SMTP is used to send emails from a client to a mail server
and between mail servers.
• Server-to-Server Communication:
• SMTP facilitates server-to-server email transfers across
networks for message delivery.
• Text-Based Protocol:
• It operates as a text-based protocol, enabling clear and
simple communication for email headers and body.
• Delivery-Only:
• SMTP is a delivery protocol, handling only outgoing
messages, not email retrieval.
Post Office
Protocol (POP)
• Email Retrieval:
• POP is used to retrieve emails from a mail server to a user’s
device for offline access.
• Deletes from Server:
• Once downloaded, the email is deleted from the server,
storing it only on the local device.
• Offline Access:
• POP enables users to access emails without a continuous
network connection, once messages are downloaded.
• Limited Synchronization:
• It lacks synchronization with the server, so any device access
doesn’t reflect changes on other devices
Internet Message
Access Protocol
(IMAP)
• Server Storage:
• IMAP allows email retrieval without deleting it from the server, enabling access
from multiple devices.
• Synchronization:
• It synchronizes emails between the server and multiple devices, reflecting
changes across all devices.
• Partial Downloading:
• IMAP allows users to download only the headers first, saving bandwidth until
full content is requested.
• User-Controlled Deletion:
• Emails remain on the server until the user chooses to delete them, enhancing
storage management.
Telnet
• Remote Access:
• Telnet enables remote access to another computer over the
internet or network for command-based interactions.
• Unencrypted Communication:
• Telnet transmits data in plain text, which poses security risks in
unprotected networks.
• Command-Line Interface:
• It provides a command-line interface, allowing users to execute
commands on the remote device.
• Port 23:
• Operates over port 23 by default, which is often blocked or
restricted in secure environments due to security concerns.
Secure
Shell (SSH)
• Secure Remote Access:
• SSH provides a secure way to access and manage a remote
computer over an unsecure network.
• Encrypted Communication:
• It encrypts data to ensure secure communication between the
client and server, mitigating security risks.
• Authentication Protocol:
• SSH uses strong authentication methods like public-key
authentication to verify user identity.
• Port 22:
• Operates over port 22 by default, commonly used for secure
system administration and file transfers.
Check Your Understanding

• Quiz Title: Understanding of network protocols:


• Quiz Link:
https://quizizz.com/admin/quiz/672d217d5215
0f2aea8159a7

You might also like