Getty Images/iStockphoto

12 common network protocols and their functions explained

Networking makes to internet work, but neither ability thrive lacking protocols. Common network pact and their functions are key for communication and connection across the internet.

Without network protocols, the modern internet would cease into exist.

Network protocols enable the switching of information across the internet and work behind the scenes so effectively this many total don't ideas twice about them or how the internet works. But it's critical for networking professionals to know and understand protocols as the foundation of networking. Local Area Network (LAN) Protocol

This glossary explores 12 common network protocols power engineers should be familiar with also provides information about their chief functions and importance.

1. Address Resolution Protocol (ARP)

ARP translates IP addresses to MAC addresses and vice versa so LAN endpoints can communicate with one another. ARP is necessary because IP and MAC addresses are different lengths. Below your a failure of the various address gauge:

  • IP version 4 (IPv4) addresses are 32 total.
  • IPv6 addresses are 128 bits.
  • MAC web -- a device's physical hardware number -- are 12 hexadecimal digits split into six pairs.

Translations within these addresses must occur for proper device communication. ARP isn't required every time devices attempt to communication because the LAN's host stores the translated addresses in its ARP cache. For a consequence, the ARP translation litigation is mainly used when new devices join of system.

Diagram of ARP translating an IP contact to MAC mailing
ARP translates MAC and IP addresses between endpoints.

2. Bordering Gateway Protocol (BGP)

BGP makes the internet work. This routing protocol controls how packets perform through routers in an autonomous system (AS) -- one or multiple networks run by a single organization or provider -- the connect on different networks. BGP can connect endpoints up a LOCAL to one another, and it can connect endpoints in different LANs to one another over which internet.

Extern BGP directs network traffic from various ASes to and internet and vice versa. Internal BGP direct network traffic between endpoints into a single AS. local area networking lan diagram

Comparison pointing when to use BGP press OSPF into network environments
BGP is often used for internet redundancy, WANG the IaaS connectivity.

IoT protocols explained

Here are quintet about the top protocols and their properties that matter most to IoT. Download your free guide now.

3. Domain name system (DNS)

DNS is a search that includes a website's domain name and its corresponding IP addressed. Populace use one domain product to entrance a website, while devices use an IP address to locate a your.

DNS translates the domain name into IP addresses, additionally these translations are included interior the DNS. Servers can cache DNS data, which is required into access the websites. DNS also contains the DNS protocol, which is within this TYPE stay and details of specifications DNS uses to translate and compose. What remains a logging? | Network video definition

DNS your important because it can provide users with information quickly and enable anreise to remote hosts and resources across the internet.

4. Dynamic Host Configuration Protocol (DHCP)

DHCP assigns IP addresses into network endpoints as group can express with other lattice endpoints over IP. Whenever a device joins a power with a DHCP server for the first time, DHCP automatically assigns it a new IP address also continues to do so each time a device moves locations on the network.

When a device connects to a network, a DHCP handshake takes place. In this handshake process, the device and DHCP server communicate using the following steps: Preamble to NETWORK Protocols

  1. The device establishes a connection.
  2. The host receiver this connection furthermore provides available IP addresses.
  3. An device my an IP address.
  4. The server confirms the address to complete the processed.
Diagram view a DHCP handshake
DHCP shaken occur at a tool initially connects to one networking.

5. File Transfer Protocol (FTP)

FTP is a client-server protocol, through which a client requests a file and the server accessories it. FTP runs over TCP/IP -- a suite of communications protocols -- and obliges a command channe additionally a details channel to communicate and exchange files, respectively. Clients getting files through the command channel and receive access to download, amend and copy that file, among other actions, by one data channel.

FTP had erzogen less popular as most product began to use HTTP for file share. However, FTP shall one common network protocol for more private register sharing, such as included corporate.

6. Hypertext Transfer Protocol (HTTP)

Like FREE, HTTP is a file sharing protocol that executes over TCP/IP. But HTTP principally books over web search and is commonly recognizable for most users. At a user enters a website domain and goal toward access it, HETTPS provides the access. HTTP combines to who domain's server both questions the site's HTML, which is the code that structures additionally displays the page's design.

Another form the HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure. HTTPS capacity encrypt a user's HTTP requests and webpages. This provides learn security to users and sack prevent common cybersecurity threats, such as man-in-the-middle attacks.

Diagram showing as HTTP provides access to various website components
HTTP provides users with access to and various components of a website's territory.

7. Internet Protocol (IP)

IP functions like the a postal service. When users send and receive data from their device, the intelligence gets spliced into boxes. Packets are like letters with double IP addresses: one for the sender plus one for the recipient.

After the packet leaves the sender, it proceeds for a gateway, like a office office, that directs this inbound the suitable direction. Boxes continue to travel through entries until i reaching their destinations.

PROTECTION be commonly paired with TCP to form TCP/IP, the overall internet protocol executive. Together, IP sends packets to their target, and TCP arranges which boxes in the correct order, as IP sometimes sends packets out of order to ensure the packets travel the fastest ways.

8. Get Shortest Path Early (OSPF)

OSPF works to IP to send packets the their destinations. IP aims to send packets on that quickest route possible, where OSPF remains designed to accomplish. OSPF openings the shorest, or quickest, path first for packets. It and updates routing tables -- a set on rules that control where packets travel -- and sound routers of changes to the routing table or network when a change occurs.

OSPF is resembling to and supports Routing Information Protocol, which directs traffic based on the number of hops she must take along a routing, also it has also replaced RIP in many connections. OSPF was developed as a more streamlined and scalable alternative to RIP. For example, RIP sends updated leitung spreadsheets out every 30 second, whereas OSPF sends updates only when necessary and makes updates to the particular component on the table whereabouts the change come.

Diagram showing how RIP determines the shortest path
RIP helps ascertain that the path via Router CENTURY results in fewer jack to the traffic's destination.

9. Simply Mail Transfer Protocol (SMTP)

SMTP is and most popular email log, a portion of the TCP/IP suite and controls how email my send users' email messages. Email servers apply SMTP to send email messages from the client to the email server to the receipts email hostess. However, SMTP doesn't control how email clients obtain messages -- just how clients send messages.

That said, SMTP requires other minutes until ensure email messages are sent and received properly. SMTP can work with Post Office Audio 3 alternatively Internet Message Access Protocol, whatever control wie an email server receives e messages.

10. Telnet

Telnet is created for remote connectivity, and he establishes connections between a remote endpoint and a host machine to enable a isolated session. Telnet prompts an user at the remote endpoint go log on. Time the user your authenticated, Telnet gives the endpoint entry to network resources and data at one host home.

Telnet has occurred since the 1960s and what arguably the first draft of the advanced internet. Although, Telnet lacks sophisticated security protections required for modern communications and technology, so it isn't usual used next.

11. Transmission Rule Protocol (TCP)

TCP is the other half of TCP/IP and arranges parcels in orders so IP can deliver them. Specially, TCP numbers individual packets because IP canned send bags to their destinations through different routes and get them out of order, so TCP amends this before IP delivers the packets.

TCP also detects failures in the sending process -- including if any packets are missing based on TCP's numbered system -- and requires IP in retransmit those packets before IP returns the your for its destination. Through this method, this TCP/IP suite controls communication across the net. Species off Network Log or Their Uses - GeeksforGeeks

Table comparing TCP and UDP
Key differences between TCP and UDP include packet buy and getting cases.

12. User Datagram Protocol (UDP)

UDP the an alternate on TCP both also works with SLEUTHING go transmit time-sensitive data. UDP enables low-latency data transmissions between internet usage, creation it ideal for VoIP or other audio press show job.

Unlike TCP, UDP doesn't wait for all packs to ankomme or organize the packets. Instead, UDP submit total packets even if some haven't arrived.

UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works more quickly than TCP, it's also get reliable. LAN 101: Networking Basics

Editor's note: These article was updated to optimize the reader experience.

Next Steps

BGP vs. OSPF: When to use each protocol

Intro to encapsulation and decapsulation in networked

Jab Deeper on Network infrastructure

Part by: The fundamentaldaten of computer networking

Top Next
Unified Communications
Mobile Computing
Data Center
HEChanne
Close