0% found this document useful (0 votes)
3 views4 pages

Networking Protocols

The document outlines various networking protocols, detailing their purposes, ports, and security levels. Key protocols include FTP for file transfer, SSH for secure remote login, SMTP for email sending, and HTTP/HTTPS for web access. It also highlights the differences between TCP and UDP for data transport, as well as other protocols like DNS and ARP for network functionality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

Networking Protocols

The document outlines various networking protocols, detailing their purposes, ports, and security levels. Key protocols include FTP for file transfer, SSH for secure remote login, SMTP for email sending, and HTTP/HTTPS for web access. It also highlights the differences between TCP and UDP for data transport, as well as other protocols like DNS and ARP for network functionality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

🌐 Networking Protocols –

1. FTP (File Transfer Protocol) – Port 21

Used to transfer files between computers.


🔑 Problem: Data sent in plain text (not secure).

---

2. SSH (Secure Shell) – Port 22

Used to securely log in to another computer and manage it remotely.


✔ Encrypted → safe to use.
💡 Example: System admins use SSH to manage servers.

---

3. Telnet – Port 23

Old way of logging into another computer.


❌ Not secure (sends passwords in plain text).
✔ Replaced by SSH.

---

4. SMTP (Simple Mail Transfer Protocol) – Port 25

Used to send emails from one server to another.


✔ Example: Gmail server sends mail to Yahoo server using SMTP.

---

5. DNS (Domain Name System) – Port 53

Works like the phonebook of the internet.


It converts website names (google .com) into IP addresses (142. 250. 190. 78).

---
6. HTTP (HyperText Transfer Protocol) – Port 80

Used to access websites.


❌ Not secure → anyone can see the data.

---

7. HTTPS (HTTP Secure) – Port 443

Secure version of HTTP.


✔ Encrypts your data → safe for banking, shopping, etc.

---

8. POP3 (Post Office Protocol v3) – Port 110

Used to download emails to your computer.


💡 Example: Outlook downloads your emails from the server.

---

9. TCP (Transmission Control Protocol)

Like a delivery with tracking → makes sure all packets arrive in order.
✔ Reliable, but slower.

---

10. UDP (User Datagram Protocol)

Like a fast delivery without tracking → no guarantee, but quick.


💡 Example: Online games, video calls, live streams.

---

11. ARP (Address Resolution Protocol)


Finds the MAC address of a device from its IP address inside a local network.
💡 Example: "Who has IP 192. 168. 1. 10?"

---

12. RARP (Reverse ARP)

Old protocol → find IP from MAC address.


❌ Not used now (replaced by DHCP).

---

13. PPP (Point-to-Point Protocol)

Used to connect the internet through phone lines, DSL, or VPNs.


💡 Example: Old dial-up internet.

---

14. MTP (Media Transfer Protocol)

Used when connecting phones/cameras to computers to transfer media files.

---

15. QOTD (Quote of the Day) – Port 17

Just shows a random quote when you connect.


💡 Mostly used for testing, not common today.

---

✓Finally
- For Websites → HTTP, HTTPS
- For Emails → SMTP (send), POP3 (download)
- For File Transfer → FTP (old, insecure), SSH/SFTP (secure)
- For Remote Login → SSH (secure), Telnet (insecure)
- For Names → DNS
- For Transport → TCP (reliable), UDP (fast)
- For Local Network → ARP

You might also like