14.
5 Network protocols By Waqqad
Tunnelling
Protocol
• Purpose:
• Allows secure transmission of private data
across a public network, enhancing data
privacy.
• Process:
• Uses a technique called encapsulation,
where private data packets are disguised as
public ones.
• Application:
• Commonly used in VPNs to secure data as
it travels across public networks.
Tunnelling
Protocol
• Security:
• Encapsulation prevents unauthorized
interception by making the data
appear non-sensitive.
• Importance:
• Essential for safely transmitting
confidential data over the internet,
supporting network security.
Secure Sockets
Layer (SSL)
• Function:
• Ensures secure connections between
web clients (like browsers) and servers
(web or mail servers).
• Encryption:
• Uses public and private key encryption
to protect transmitted data over a
secure connection.
• Legacy:
• Primarily replaced by TLS due to
advancements in security algorithms.
Secure Sockets
Layer (SSL)
• Usage:
• Still in use in some
applications but less
common due to security
enhancements in TLS.
• Relevance:
• A foundational protocol for
internet security, offering
essential encryption
practices.
Transport Layer
Security (TLS)
• Update of SSL:
• Improved upon SSL, using more
advanced and secure encryption
algorithms.
• Data Protection:
• Encrypts data between web clients
and servers to protect against
eavesdropping and tampering.
• Authentication:
• Ensures data authenticity, verifying the
identities of both parties in a
connection.
Transport Layer
Security (TLS)
• Adoption:
• Widely used in modern secure
internet applications, such as banking
and e-commerce.
• Importance:
• Critical for protecting sensitive
information and ensuring secure
online communications.
Internet Protocol
Security (IPsec)
• Primary Purpose:
• Encrypts and authenticates data packets sent
across the internet to prevent unauthorized
access.
• Core Role in VPNs:
• Key component of the VPN tunneling process,
securing private data transmission.
• Security Techniques:
• Uses complex encryption and authentication to
verify packet integrity and origin.
Internet Protocol
Security (IPsec)
• Usage:
• Common in secure connections across
public and private networks, especially
within business environments.
• Advantage:
• Enhances data privacy by securing
packets at the network layer, adding a
robust security layer.
BitTorrent Protocol
• Purpose:
• Used as a communications protocol in peer-to-peer (P2P) file
sharing to transfer large files like videos efficiently.
• Swarm Concept:
• Creates a "swarm" by connecting multiple sources, or hosts, to
distribute download load across the network.
• File Segmentation:
• Breaks the file into smaller pieces, downloading them
simultaneously from various hosts in the swarm.
• Reassembly:
• Reorganizes downloaded pieces into the correct order to
construct the complete file upon download completion.
Key BitTorrent
Roles and Security
• Peer:
• Refers to any user attempting to download parts of the file from the
swarm.
• Seed:
• A user in the swarm that uploads pieces of the file to other peers to
support file distribution.
• Data Integrity:
• Each piece of the file is protected to prevent modifications,
ensuring the file's integrity during transfer.
• Efficient Load Sharing:
• Spreads data upload and download load across many users,
reducing strain on any single host.
Internet Control Message
Protocol (ICMP)
• Primary Function:
• ICMP is an error-reporting protocol used to communicate errors
back to the data sender when issues occur in data delivery.
• Error Messages:
• Generates specific error messages for scenarios like
unreachable destinations, packet loss, and network congestion.
• Ping Functionality:
• ICMP is used in the ping command to test connectivity and
measure round-trip time to a networked device.
• Troubleshooting Tool:
• Essential in network troubleshooting and diagnostics to identify
problems in data packet delivery
Address Resolution
Protocol (ARP)
• IP to MAC Translation:
• ARP translates IP addresses to MAC addresses, allowing
devices to locate one another on a local network.
• Layer Interaction:
• Operates between the OSI model's network layer (IP
addresses) and data link layer (MAC addresses).
• Broadcast Request:
• Sends a broadcast on the network to request the MAC
address of a device with a known IP.
• ARP Cache:
• Stores IP-to-MAC mappings temporarily to improve efficiency
in communication on the network.
Inverse Address Resolution
Protocol (InARP)
• MAC to IP Translation:
• InARP performs the reverse of ARP, translating MAC addresses
back into IP addresses.
• Local Network Use:
• Mainly used within a local network for dynamic address discovery
in certain network protocols.
• Protocol Support
• Primarily supports ATM and Frame Relay networks where IP
addresses aren’t initially known.
• Dynamic Address Resolution:
• Helps devices automatically discover IP addresses in cases where
only MAC addresses are available.
Dynamic Host Configuration
Protocol (DHCP)
• Automatic IP Assignment:
• DHCP dynamically assigns IP addresses to devices on a network,
reducing the need for manual configuration.
• IP Address Management:
• Manages and reuses IP addresses by leasing them to devices for a
set period, then reclaiming them for others.
• Configuration Information:
• Provides additional network configuration details like subnet mask,
default gateway, and DNS servers.
• Simplified Network Administration:
• Reduces workload for network administrators by automating IP
address distribution.
Hypertext Transfer Protocol
(HTTP and HTTPS)
• Content Transfer:
• HTTP is used to transfer the content of web pages from a web
server to a web browser across the internet.
• Standard Protocol:
• HTTP is the standard protocol for web page transfer, used in
most web interactions.
• HTTPS for Security:
• HTTPS is the secure version of HTTP, incorporating SSL to
encrypt data and secure online transactions.
• Data Integrity:
• HTTPS ensures data integrity, verifying that web page content
is unaltered from the server to the client.
File Transfer
Protocol (FTP)
• File Transfers:
• FTP is used to transfer files between a client and server in a
network, allowing file uploads and downloads.
• Data Access Control:
• FTP provides login and password authentication to manage
access to files and directories.
• Two Modes:
• Supports both active and passive modes to optimize file transfers
based on firewall configurations.
• Unencrypted:
• FTP does not inherently provide encryption, so it’s typically used
within secure or private networks.
Simple Mail Transfer
Protocol (SMTP)
• Email Sending Protocol:
• SMTP is used to send emails from a client to a mail server
and between mail servers.
• Server-to-Server Communication:
• SMTP facilitates server-to-server email transfers across
networks for message delivery.
• Text-Based Protocol:
• It operates as a text-based protocol, enabling clear and
simple communication for email headers and body.
• Delivery-Only:
• SMTP is a delivery protocol, handling only outgoing
messages, not email retrieval.
Post Office
Protocol (POP)
• Email Retrieval:
• POP is used to retrieve emails from a mail server to a user’s
device for offline access.
• Deletes from Server:
• Once downloaded, the email is deleted from the server,
storing it only on the local device.
• Offline Access:
• POP enables users to access emails without a continuous
network connection, once messages are downloaded.
• Limited Synchronization:
• It lacks synchronization with the server, so any device access
doesn’t reflect changes on other devices
Internet Message
Access Protocol
(IMAP)
• Server Storage:
• IMAP allows email retrieval without deleting it from the server, enabling access
from multiple devices.
• Synchronization:
• It synchronizes emails between the server and multiple devices, reflecting
changes across all devices.
• Partial Downloading:
• IMAP allows users to download only the headers first, saving bandwidth until
full content is requested.
• User-Controlled Deletion:
• Emails remain on the server until the user chooses to delete them, enhancing
storage management.
Telnet
• Remote Access:
• Telnet enables remote access to another computer over the
internet or network for command-based interactions.
• Unencrypted Communication:
• Telnet transmits data in plain text, which poses security risks in
unprotected networks.
• Command-Line Interface:
• It provides a command-line interface, allowing users to execute
commands on the remote device.
• Port 23:
• Operates over port 23 by default, which is often blocked or
restricted in secure environments due to security concerns.
Secure
Shell (SSH)
• Secure Remote Access:
• SSH provides a secure way to access and manage a remote
computer over an unsecure network.
• Encrypted Communication:
• It encrypts data to ensure secure communication between the
client and server, mitigating security risks.
• Authentication Protocol:
• SSH uses strong authentication methods like public-key
authentication to verify user identity.
• Port 22:
• Operates over port 22 by default, commonly used for secure
system administration and file transfers.
Check Your Understanding
• Quiz Title: Understanding of network protocols:
• Quiz Link:
https://quizizz.com/admin/quiz/672d217d5215
0f2aea8159a7