Internet Protocol
(Internet
Protocol) is the primary network protocol used on the Internet,
developed in the 1970s. On the Internet and many other networks, IP is
often used together with the Transport Control Protocol (TCP) and
referred to interchangeably as TCP/IP.
IP
supports unique addressing for computers on a network. Most networks
use the Internet Protocol version 4 (IPv4) standard that features IP
addresses four bytes (32 bits) in length. The newer Internet Protocol
version 6 (IPv6) standard features addresses 16 bytes (128 bits) in
length.
Data
on an Internet Protocol network is organized into packets. Each IP
packet includes both a header (that specifies source, destination, and
other information about the data) and the message data itself.
IP
functions at layer 3 of the OSI model. It can therefore run on top of
different data link interfaces including Ethernet and Wi-Fi.
FTP
Short
for File Transfer Protocol, the protocol for exchanging files over the
Internet. FTP works in the same way as HTTP for transferring Web pages
from a server to a user's browser and SMTP for transferring electronic
mail across the Internet in that, like these technologies, FTP uses the
Internet's TCP/IP protocols to enable data transfer.
FTP
is most commonly used to download a file from a server using the
Internet or to upload a file to a server (e.g., uploading a Web page
file to a server).
HTTP
What is HTTP?
HTTP,
the Hypertext Transfer Protocol, is the application-level protocol that
is used to transfer data on the Web. HTTP comprises the rules by which
Web browsers and servers exchange information. Although most people
think of HTTP only in the context of the World-Wide Web, it can be, and
is, used for other purposes, such as distributed object management
systems.
How Does HTTP Work?
HTTP
Is a request-response protocol. For example, a Web browser initiates a
request to a server, typically by opening a TCP/IP connection. The
request itself comprises
- a request line,
- a set of request headers, and
- an entity.
The server sends a response that comprises
- a status line,
- a set of response headers, and
- an entity.
The
entity in the request or response can be thought of simply as the
payload, which may be binary data. The other items are readable ASCII
characters. When the response has been completed, either the browser or
the server may terminate the TCP/IP connection, or the browser can send
another request.
HTTPS (Secure HTTP)
Hypertext
Transfer Protocol Secure (HTTPS) is a widely used communications
protocol for secure communication over a computer network, with
especially wide deployment on the Internet. Technically, it is not a
protocol in itself; rather, it is the result of simply layering the
Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus
adding the security capabilities of SSL/TLS to standard HTTP
communications.
HTTPS
is especially important over unencrypted networks such as WiFi as
anyone on the same local network can do packet sniffing and discover
sensitive information. Additionally, many free to use and even paid for
WLAN networks do packet injection for serving their own ads on webpages
or just for pranks, however this can be exploited maliciously e.g. by
injecting malware and spying on users. Another example where HTTPS is
important is connections over Tor (anonymity network), as malicious Tor
nodes can damage or alter the contents passing through them in an
insecure fashion and inject malware into the connection. This is one
reason why EFF and Torproject started the development of HTTPS
Everywhere, which is included in the Tor Browser Bundle.which use
encryption, can be used to create a secure connection between two
machines. The browser uses SSL or TLS when connecting to a secure part
of a website indicated by an HTTPS URL, that is, a URL with the prefix
https://. The browser then uses HTTP to send and receive requests over
this secure connection.
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination. Each gateway computer on the network checks this address to see where to forward the message. Even though some packets from the same message are routed differently than others, they'll be reassembled at the destination.
TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer. TCP/IP and the higher-level applications that use it are collectively said to be "stateless" because each client request is considered a new request unrelated to any previous one (unlike ordinary phone conversations that require a dedicated connection for the call duration). Being stateless frees network paths so that everyone can use them continuously. (Note that the TCP layer itself is not stateless as far as any one message is concerned. Its connection remains in place until all packets in a message have been received.)
Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite."
Personal computer users with an analog phone modem connection to the Internet usually get to the Internet through the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP). These protocols encapsulate the IP packets so that they can be sent over the dial-up phone connection to an access provider's modem.
Protocols related to TCP/IP include the User Datagram Protocol (UDP), which is used instead of TCP for special purposes. Other protocols are used by network host computers for exchanging router information. These include the Internet Control Message Protocol (ICMP), the Interior Gateway Protocol (IGP), the Exterior Gateway Protocol (EGP), and the Border Gateway Protocol (BGP).
No comments:
Post a Comment