UGANDA MARTRYS UNIVERSITY-NKOZI
INTRODUCTION TO COMPUTER SCIENCE
ASSIGNMENT 2
NAME: SSEMWOGERERE ASHIRAF
[Link]: 2024-B201-11819
QUESTIONS;
1. Identify at least 10 network protocols explaining what each of
them does.
2. Identify at least 5 relevancies of networks.
SOLUTION TO NO.1
Network protocols are a set of rules that are responsible for the
communication of data between various devices in a network. It
determines what is being communicated, how it is being
communicated, and when it is being communicated. It permits
connected devices to communicate with each other, irrespective of
internal and structural differences.
The network protocols can be categorized into three main
categories;
Network communication protocols,
Network management protocols,
Network security protocols.
NETWORK COMMUNICATION PROTOCOLS;
Communication protocols are important for the functioning of a
network. These protocols formally set out the rules and formats
through which data is transferred. These protocols handle syntax,
semantics, error detection, synchronization, and authentication.
Network communication protocols include the following;
a) Hypertext Transfer Protocol (HTTP);
This is a network protocol that is primarily used to provide
access to web browsers. It is designed to for transferring a
hypertext between two or more systems. HTTP works on a client-
server model. Most of the data sharing over the web is done
through using HTTP.
b) Transmission Control Protocol (TCP);
TCP layouts a reliable stream delivery by using sequenced
acknowledgement. It is a connectionoriented0 protocol, that is, it
establishes a connection between applications before sending any
data. It is used for communicating over a network. It has many
applications such as emails, File Transfer Protocols, streaming
media, and so many others.
c) User Datagram Protocol(UDP);
This protocol provides a faster, connectionless alternative to
TPC for applications that don’t need guaranteed delivery. It is
commonly used in real-time applications such as video streaming
and online gaming. Unlike TCP, UDP doesn’t guarantee data
delivery or provide error checking, making it faster but less
reliable.
d) Internet Ray Chat(IRC);
IRC is a protocol for real-time communication through text
messaging. It allows different users to participate in in group or
private chats in online communities or chat rooms.
e) Address Resolution Protocol(ARP);
This is used for mapping logical addresses to the physical
addresses acknowledged in a local network. For mapping and
maintaining a correlation between these logical and physical
addresses, a table known as ARP cache is used.
NETWORK MANAGEMENT PROTOCOLS
These describe procedures and policies that are used in
monitoring, maintaining, and managing the computer network.
They include;
f) Internet Control Message protocol(ICMP)
It is a protocol that is used by network devices to forward
operational information and error messages. It is used for
reporting congestions, network errors, diagnostic purposes and
timeouts.
g) Simple Network Management Protocol(SNMP);
It is used for managing nodes on an IP network.
h) File Transfer Protocol(FTP);
This is a client/server protocol that is used for moving files
to or from a host computer, it allows users to download files,
programs, web pages, and other things that are available on other
services.
i) Post Office Protocol Layer 3(POP3);
This is a protocol that a local mail client uses to get e-mail
messages from a remote email server over a TCP/IP connection.
Email servers hosted by ISPs also use the POP3 protocol to hold
and receive emails intended for their users.
NERTWORK SECURITY PROTOCOLS
These protocols secure the data in passage over a network.
They also determine how the network secures data from any
unauthorized attempts to extract or review data. They include;
j) Secure Socket Layer(SSL);
This is mainly used for protecting sensitive data and securing
internet connections. It allows both server-to-server and client-to-
server communication.
k) Hypertext Transfer Protocol(HTTPS);
This is a secured version of HTTP that ensures secure
communication between two computers where one sends the
request through the browser and the other fetches the data from
the web server.
l) Transport Layer Security(TLS);
This is a security protocol designed for data security, and privacy
over the internet. It is generally used for encrypted information
between servers and web apps, like a web browser loading apps. It can
also be used for encryption of messages, emails and VoIP (Voice over
Internet Protocol).
m) Secure File Transfer Protocol(SFTP);
This provides a secure file transfer capabilities over a network. It also
uses encryption to protect data during transmission. This protocol
ensures that only authorized users can access and transfer files.
Conclusively, network protocols are categorized into three groups
namely; communications protocols, network management protocols
and network security protocols as explained above.
SOLUTION NO.2
How relevant are network protocols to your course?
Network protocols are highly relevant in different courses
offered by learners. Below is the view on how network protocols
are relevant in education;
1. Communication:
Network protocols enable learners to communicate with one
another reliably and efficiently. They (protocols) standardize how data
is formatted, transmitted, and received over a network. In this aspect,
learners can send, receive, and communicate with each other over a
network. Protocols such as TCP/IP, DNS, and HTTP provide
communication services through internet globally.
2. Internet functionality:
In order for the internet to function, it has to rely on protocols.
For example, TCP/IP provides the route for internet communication,
allowing devices to identify and communicate with each other across
different networks. Then HTTP/HTTPS enables browsers to access
websites securely. This therefore provides learners higher access and
proper usage of the internet while learning, communicating, or sending
files from one another. This is due to the fact that the internet is
functionally stable.
3. Data Transmission:
Protocols play a greater role in enabling students as well as
lecturers send messages and transferring files among themselves across
the internet. Protocols like SMTP, FTP, and UDP dictate how data
moves between servers and clients making sure that it arrives correctly
and in the right format.
4. Cloud computing and IoT:
Network protocols play a significant role in enabling cloud
computing and Internet of Things (IoT). This enables learners to store
their information safely using cloud services. Cloud infrastructure
depends on protocols for data transfer between remote servers and
users. For example, students’ emails are stored on cloud.
5. Cyber security:
Network protocols play a vital role in ensuring data security. For
instance, SSL/TLS protocols encrypt data during transmission,
protecting it from being tampered or accessed by unauthorized
personnel. Secure protocols like HTTPS help in safeguarding online
communications, transactions, and sensitive information. For instance,
protocols control online/zoom lectures and they also help learners to
create passkeys on their files and emails.
Therefore, network protocols are crucial for the functionality, security,
and efficiency of nearly all modern digital communication and data
transfer systems. We can also say that protocols are the back-bone of
the internet.
References:
1. Behrouz A. forouzan, ‘Data Communications and Networking’,
5th Edition.
2. Andrew S. Tanenbaum, ‘Computer Networks’, 4th Edition.
3. James F. Kurose, Kenneth W. Ross, ‘Computer Networking a Top
Down Approach’, 6th Edition.
4. Andrew S. Tanenbaum, ‘Computer Networks’, 4th Edition.