Network Protocols — Class Notes High School

Protocols = rules that let devices communicate reliably and securely on a network.

✅ What is a Network Protocol?

A network protocol is a set of rules that allows devices to communicate with each other over a network.

Protocols define:

✅ Why Do We Need Network Protocols?

Without protocols:

Protocols make networking possible by ensuring communication is organized, reliable, and compatible.

✅ Real-World Analogy

Think of sending a letter:

🌐 Protocol Layers (Simplified Model)

Networks use layers so each protocol has a specific job. Layers make complex networking easier to build and troubleshoot.

1️⃣ Application Layer

User-facing protocols (what apps and browsers use).

  • HTTP / HTTPS
  • FTP / SFTP
  • SMTP
  • DNS

2️⃣ Transport Layer

Controls how data moves between devices.

TCP (Transmission Control Protocol)

  • Reliable (checks for errors)
  • Connection-based
  • Slower but accurate
  • Used for web browsing, email

UDP (User Datagram Protocol)

  • Faster
  • No guaranteed delivery
  • Used for streaming, gaming, voice/video calls

3️⃣ Internet Layer

Handles addressing and routing between networks.

IP (Internet Protocol)

  • Assigns addresses to devices
  • Routes data across networks
Example IP Address: 192.168.1.1

4️⃣ Network Access Layer

Handles physical transmission (wired/wireless).

  • Ethernet
  • Wi-Fi

🌐 Common Network Protocols

🌍 HTTP (HyperText Transfer Protocol)

http://example.com

🔒 HTTPS (Secure HTTP)

https://example.com

📧 SMTP (Simple Mail Transfer Protocol)

📥 POP3 / IMAP

🌐 DNS (Domain Name System)

google.com → 142.250.x.x

📂 FTP (File Transfer Protocol)

🔐 SSH (Secure Shell)

🌐 Ports (Important Concept)

Protocols use ports like “door numbers” so the right service receives the right data.

Protocol Common Port
HTTP80
HTTPS443
FTP21
SSH22
DNS53

🌐 Packet Basics

Data is broken into small pieces called packets. Packets travel across networks and get reassembled at the destination.

Each packet can include:

🌐 Security Considerations

Some protocols are secure by design, while others are not.

✅ More Secure

  • HTTPS
  • SSH
  • SFTP

⚠️ Less Secure

  • HTTP
  • FTP
  • Telnet
Cybersecurity professionals often replace insecure protocols with secure versions (example: FTP → SFTP, HTTP → HTTPS).

🌐 Example: What Happens When You Visit a Website?

  1. You type a website address (like google.com).
  2. DNS converts the name into an IP address.
  3. Your browser uses TCP to establish a connection.
  4. HTTPS encrypts the communication.
  5. The server sends webpage data back to your browser.

🌐 Key Vocabulary

✅ Summary

Network protocols are rules that allow devices to communicate across networks safely and reliably. Different protocols handle tasks like web browsing, email, file transfer, naming (DNS), and secure communication.