The current common protocols
Today, Hachinet will show you some popular protocols.
1. Internet Protocol Suite
Internet Protocol Suite is a set of protocols performing protocol stack which the Internet runs. Internet Protocol Suite sometimes is called TCP/IP. TCP and IP are important protocols in Internet Protocol Suite–Transmission Control Protocol (TCP) and Internet Protocol (IP). The Internet Protocol Suite is similar to the OSI module, with some differences. And not all the layers well correspond.
2. Protocol Stack Protocols
Protocol Stack is a set of protocol layers cooperating to provide network connectivity.
3. Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP) is an Internet Protocol Suite’s core protocol. Transmission Control Protocol is derived from implementing the network, complementing the Internet Protocol. Therefore, the Internet Protocol Suite is usually known as TCP/IP. TCP provides a reliable method of an octet stream distribution (a block of data of size 8 bits) over an IP network. The TCP’s primary feature is error checking and command. All major Internet applications like the World Wide Web, email and file transfers rely on TCP.
4. Internet Protocol (IP)
Internet Protocol is the primary protocol in the Internet protocol suite to transmit data via the network. Internet Protocol routing function basically is the Internet setup. This protocol was previously a datagram service that initially couldn’t connect in the Transmission Control Program (TCP). So, the Internet protocol suite also is known as TCP/IP.
5. Hypertext Transfer Protocol (HTTP)
HTTP is a basic data communication for the World Wide Web. Hypertext is a structured test that uses hyperlinks between nodes containing the text. HTTP is an app protocol for distributed and concurrent hypermedia information systems.
6. File Transfer Protocol (FTP)protocols
FTP is the most common protocol used for files transfer on the Internet and private networks.
7. Secured Shell (SSH)
SSH is the primary method for safe network device management at command levels. SSH is often used as an alternative to Telnet since this protocol doesn’t support a secure connection.
8. Telnet Protocol
SSH is the main method for safe network device management at command levels. Unlike SSH, Tenet doesn’t provide a secure connection, just a basic unsecured connection.
9. Simple Mail Transfer Protocol (SMTP)protocols
SMTP is used for two primary functions: sending email from the mail server source to mail server destination and sending email from the end-user to the mail system.
10. Domain Name System (DNS)
DNA is used for changing the domain to the IP address. The DNS hierarchical system includes host, TLD, and authorization server.
11. Post Office Protocol 3 (POP 3)
Post Office Protocol version 3 is one of two main protocols to retrieve mail from the Internet. POP 3 is simple since this protocol allows the client to get the complete content from the server’s mailbox and delete content from that server.
12. Internet Message Access Protocol (IMAP)
IMAP version 3 is an alternative primary protocol used to receive mail from the server. IMAP doesn’t delete content from the server’s mailbox.
13. Simple Network Management Protocol (SNMP)protocols
Simple Network Management Protocol is used for network management. SNMP can monitor, configure, and control network devices. SNMP trap can also be configured in the network devices to announce the server centre when a specific action occurs.
14. Hypertext Transfer Protocol over SSL/TLS (HTTPS)
HTTPS is used with HTTP to provide similar services and secure connection provided by SSL or TLS.
We, “Hachinet Software,” are Vietnam-based software services with dedicated, dynamic, enthusiastic teams who always have made efforts to please customers’ and partners’ satisfaction. We specialize in the followings:
- Web application (.NET, JAVA, PHP, etc.)
- Framework (ASP, MVC, AngularJS, Angular6, Node JS, Vue JS)
- Mobile application: IOS (Swift, Object C), Android (Kotlin, Android)
- System applications (Cobol, ERP, etc.),
- New Technology (Blockchain, etc.).
If you are interested in our service or looking for an IT outsourcing partner in Vietnam, do not hesitate to contact us at email@example.com.