0% found this document useful (0 votes)
41 views1 page

Transmission Control Protocol

Uploaded by

Lynn Htet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views1 page

Transmission Control Protocol

Uploaded by

Lynn Htet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Type of protocols

1. Transmission Control Protocol (TCP)


2. Internet Protocol (IP)
3. User Datagram Protocol (UDP)
4. Post office Protocol (POP)
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Hyper Text Transfer Protocol Secure (HTTPS)
9. Telnet

Transmission Control protocol (TCP)


TCP arranges packet in order so IP can deliver them. TCP also detects error
in the something process and requires IP to retransmit those packets before
IP delivers the data to it’s destination.

Internet Protocol (IP)


IP is designed explicitly as addressing protocol. IP addresses in packets help in
routing them through different nodes in a network until it reaches the destination
system.

File Transfer Protocol (FTP)


FTP allows users to transfer files from one machine to another. Types of files
may include program files, multimedia files, text files, and documents, etc.

Hyper Text Transfer Protocol (HTTP) / (HTTPS)


HTTP primarily works over web browsers. When a user enters a website to make domain and
aims to access it, HTTP provides the access. HTTP connects to the domain’s server and request
the site’s HTML, which is the code that structures and displays the page’s design. Another form
of HTTP is HTTPS, which stand for HTTP over secure socket layer or HTTP secure. HTTPS can
encrypt a user’s HTTP requests and web pages.

Telnet
Telnet is designed for remote connectivity and it establish connections between a remote
endpoint and a host machine to enable a remote session.

You might also like