A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.
To successfully send and receive information, devices on both sides of a communication exchange must accept and follow protocol conventions. Innetworking, support for protocols can be built into the software, hardware or both.
Withoutnetwork protocols, computers and other devices would not know how to engage with each other. As a result, except for specialty networks built around a specific architecture, few networks would be able to function, and the internet as we know it wouldn't exist. Virtually allnetwork end users rely on network protocols for connectivity.
Network protocols break larger processes into discrete, narrowly defined functions and tasks across every level of the network. In the standard model, known as the Open Systems Interconnection (OSI) model, one or more network protocols govern activities at each layer in the telecommunication exchange. Lower layers deal with data transport, while the upper layers in the OSI model deal with software and applications.
To understand how network protocols function, it's crucial to understand the workings of the seven layers of the OSI model:
Every packet transmitted and received over a network containsbinary data. Most computing protocols add a header at the beginning of eachnetwork packet to store information about the sender and the message's intended destination. Some protocols may also include a footer at the end with additional information. Network protocols process these headers and footers as part of the data moving among devices in order to identify messages of their own kind.
Network protocols are often outlined in an industry standard -- developed, defined and published by groups such as the following:
A set of cooperating network protocols is called aprotocol suite. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite, which is typically used inclient-server models, includes numerous protocols across layers, such as the data, network, transport and application layers, working together to enable internet connectivity.
These include the following:
Additional network protocols, including Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), have defined sets of rules to exchange and display information. Unlike the OSI model, the TCP/IP suite consists of four layers, each with its protocols. The four layers of the TCP/IP model are the following:
Generally speaking, there are three types of protocols in networking: communication, such asEthernet; management, such as SMTP; and security, such as Secure Shell, orSSH.
Falling into these three broad categories are thousands of network protocols that uniformly handle an extensive variety of defined tasks, including authentication, automation, correction, compression, error handling, file retrieval, file transfer, link aggregation, routing, semantics, synchronization and syntax.
The following are the three types of protocols used in network communications:
For network protocols to work, they must be coded within software -- either as part of the computer's operating system (OS) or as an application -- or executed within the computer's hardware. Most modern OSes possess built-in software services that are prepared to implement some network protocols. Other applications, such as web browsers, are designed with software libraries that support the protocols necessary for the application to function. In addition, TCP/IP and routing protocol support is implemented in direct hardware for enhanced performance.
Whenever a new protocol is implemented, it is added to the protocol suite. The organization of protocol suites is considered to be monolithic since all protocols are stored in the same address and built on top of one another.
Network protocols are not designed for security. Their lack of protection can sometimes enable malicious attacks, such as eavesdropping andcache poisoning, to affect the system. The most common attack on network protocols is the advertisement of false routes, causing traffic to go through compromised hosts instead of the appropriate ones.
Cybercriminals frequently use network protocols indistributed denial-of-service assaults, which is another typical method of exploiting them. For example, in aSYN flood attack, an attacker takes advantage of the way TCP works. They send SYN packets to repeatedly initiate a TCP handshake with a server until the server is unable to provide service to legitimate users because its resources are tied up by all the fake TCP connections.
Network protocol analyzers are tools that protect systems against malicious activity by supplementingfirewalls, antivirus programs andantispyware software.
Network protocols are what make the modern internet possible since they enable computers to communicate across networks without users having to see or know what background operations are occurring. Some specific examples of network protocols and their uses are the following:
Other network protocol examples include the following:
Network protocols are the backbone of the internet, without which it wouldn't exist. Learn about the12 most used network protocols, as well as their purposes and use cases.
Learn why cost structures, vendor timelines and pricing models are forcing enterprise IT decisions earlier -- often before ...
As enterprise systems become more integrated, ownership shifts downstream, exposing gaps among accountability, coordination and ...
Compare the latest architecture developments, as well as advanced communications and collaboration UC platform features, offered ...
An MDM policy helps organizations secure corporate, BYOD and hybrid workforce devices by defining acceptable use, data protection...
Apple Pay is widely used by iPhone customers. Businesses considering contactless payments should understand its impact on ...
BYOD can reduce hardware costs and improve workforce flexibility -- but it also expands governance, identity and security ...
Many organizations want to simplify or scale down their data centers -- but they won't disappear. Admins can examine as-a-service...
Follow this step-by-step guide on decommissioning a data center, covering planning, inventory management, data security, and ...
Smart data centers reduce costs and enhance grid stability, enabling operators to evolve from passive consumers to active ...
Presidio has acquired transACT Technology Solutions, a digital transformation specialist based in the United Kingdom, while ...
Accenture, Cognizant and Deloitte are among the partners with offerings on AWS' AI Agents and Tools marketplace, which is ...
Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology ...
