logo

Classification of Network Protocols

6 Pages2727 Words25 Views
   

Added on  2023-01-31

About This Document

This article provides an overview of the classification of network protocols. It covers application layer protocols like DHCP, DNS, FTP, HTTP, IMAP, POP, SMTP, and Telnet, as well as presentation layer protocols, session layer protocols, transport layer protocols, network layer protocols, and data link layer protocols. The advantages and disadvantages of each protocol are discussed.

Classification of Network Protocols

   Added on 2023-01-31

ShareRelated Documents
Classification of network protocols
Now that you know how the OSI model works, you can dive straight into the classification of protocols.
The following are some of the most prominent protocols used in network communication.
Application layer network protocols
1. DHCP: Dynamic Host Configuration Protocol
DHCP is a communication protocol that enables network administrators to automate the assignment of IP
addresses in a network. In an IP network, every device connecting to the internet requires a unique IP.
DHCP lets network admins distribute IP addresses from a central point and automatically send a new IP
address when a device is plugged in from a different place in the network. DHCP works on a client-server
model.
Advantages of using DHCP
Centralized management of IP addresses.
Seamless addition of new clients into a network.
Reuse of IP addresses, reducing the total number of IP addresses required.
Disadvantages of using DHCP
Tracking internet activity becomes tedious, as the same device can have multiple IP addresses
over a period of time.
Computers with DHCP cannot be used as servers, as their IPs change over time.
2. DNS: Domain Name System protocol
The DNS protocol helps in translating or mapping host names to IP addresses. DNS works on a client-
server model, and uses a distributed database over a hierarchy of name servers.
Hosts are identified based on their IP addresses, but memorizing an IP address is difficult due to its
complexity. IPs are also dynamic, making it all the more necessary to map domain names to IP addresses.
DNS helps resolve this issue by converting the domain names of websites into numerical IP addresses.
Advantages
DNS facilitates internet access.
Eliminates the need to memorize IP addresses.
Disadvantages
DNS queries don't carry information pertaining to the client who initiated it. This is because the
DNS server only sees the IP from where the query came from, making the server susceptible to
manipulation from hackers.
DNS root servers, if compromised, could enable hackers to redirect to other pages for phishing
data.
3. FTP: File Transfer Protocol
File Transfer Protocol enables file sharing between hosts, both local and remote, and runs on top of TCP.
For file transfer, FTP creates two TCP connections: control and data connection. The control connection is
used to transfer control information like passwords, commands to retrieve and store files, etc., and the data
Classification of Network Protocols_1
connection is used to transfer the actual file. Both of these connections run in parallel during the entire file
transfer process.
Advantages
Enables sharing large files and multiple directories at the same time.
Lets you resume file sharing if it was interrupted.
Lets you recover lost data, and schedule a file transfer.
Disadvantages
FTP lacks security. Data, usernames, and passwords are transferred in plain text, making them
vulnerable to malicious actors.
FTP lacks encryption capabilities, making it non-compliant with industry standards.
4. HTTP: Hyper Text Transfer Protocol
HTTP is an application layer protocol used for distributed, collaborative, and hypermedia information
systems. It works on a client-server model, where the web browser acts as the client. Data such as text,
images, and other multimedia files are shared over the World Wide Web using HTTP. As a request and
response type protocol, the client sends a request to the server, which is then processed by the server before
sending a response back to the client.
HTTP is a stateless protocol, meaning the client and server are only aware of each other while the
connection between them is intact. After that, both the client and server forget about each other's existence.
Due to this phenomenon, the client and server can't both retain information between requests.
Advantages
Memory usage and CPU usage are low because of lesser concurrent connections.
Errors can be reported without closing connections.
Owing to lesser TCP connections, network congestion is reduced.
Disadvantages
HTTP lacks encryption capabilities, making it less secure.
HTTP requires more power to establish communication and transfer data.
5. IMAP and IMAP4: Internet Message Access Protocol (version 4)
IMAP is an email protocol that lets end users access and manipulate messages stored on a mail server from
their email client as if they were present locally on their remote device. IMAP follows a client-server
model, and lets multiple clients access messages on a common mail server concurrently. IMAP includes
operations for creating, deleting, and renaming mailboxes; checking for new messages; permanently
removing messages; setting and removing flags; and much more. The current version of IMAP is version 4
revision 1.
Advantages
As the emails are stored on the mail server, local storage utilization is minimal.
In case of accidental deletion of emails or data, it is always possible to retrieve them as they are
stored on the mail server.
Disadvantages
Emails won't work without an active internet connection.
High utilization of emails by end users requires more mailbox storage, thereby augmenting costs.
6. POP and POP3: Post Office Protocol (version 3)
The Post Office Protocol is also an email protocol. Using this protocol, the end user can download emails
from the mail server to their own email client. Once the emails are downloaded locally, they can be read
Classification of Network Protocols_2
without an internet connection. Also, once the emails are moved locally, they get deleted from the mail
server, freeing up space. POP3 is not designed to perform extensive manipulations with the messages on
the mail server, unlike IMAP4. POP3 is the latest version of the Post Office Protocol.
Advantages
Read emails on local devices without internet connection.
The mail server need not have high storage capacity, as the emails get deleted when they're moved
locally.
Disadvantages
If the local device on which the emails were downloaded crashes or gets stolen, the emails are
lost.
7. SMTP: Simple Mail Transfer Protocol
SMTP is a protocol designed to transfer electronic mail reliably and efficiently. SMTP is a push protocol
and is used to send the email, whereas POP and IMAP are used to retrieve emails on the end user's side.
SMTP transfers emails between systems, and notifies on incoming emails. Using SMTP, a client can
transfer an email to another client on the same network or another network through a relay or gateway
access available to both networks.
Advantages
Ease of installation.
Connects to any system without any restriction.
It doesn't need any development from your side.
Disadvantages
Back and forth conversations between servers can delay sending a message, and also increases the
chance of the message not being delivered.
Certain firewalls can block the ports used with SMTP.
8. Telnet: Terminal emulation protocol
Telnet is an application layer protocol that enables a user to communicate with a remote device. A Telnet
client is installed on the user's machine, which accesses the command line interface of another remote
machine that runs a Telnet server program.
Telnet is mostly used by network administrators to access and manage remote devices. To access a remote
device, a network admin needs to enter the IP or host name of the remote device, after which they will be
presented with a virtual terminal that can interact with the host.
Advantages
Compatible with multiple operating systems.
Saves a lot of time due to its swift connectivity with remote devices.
Disadvantages
Telnet lacks encryption capabilities and sends across critical information in clear text, making it
easier for malicious actors.
Expensive due to slow typing speeds.
9. SNMP: Simple Network Management Protocol
SNMP is an application layer protocol used to manage nodes, like servers, workstations, routers, switches,
etc., on an IP network. SNMP enables network admins to monitor network performance, identify network
glitches, and troubleshoot them. SNMP protocol is comprised of three components: a managed device, an
SNMP agent, and an SNMP manager.
Classification of Network Protocols_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Management Assignment | Local Area Network (LAN)
|21
|2615
|254

Networking Technologies Assignment
|9
|2023
|44

Network Security: Protocols, Firewalls and Hardware Security
|13
|812
|292

Network security and Protocols Assignment
|26
|4317
|64

Transmission Control Protocol/Internet Protocol PDF
|88
|24971
|186

Internet Protocols: A Set of Rules Governing Communication Across the Internet
|6
|1234
|416