What is the reason for having the use of open protocols on the Internet?

Without network protocols, the modern internet would cease to exist.

Common network protocols, including Transmission Control Protocol (TCP) and Internet Protocol (IP), enable the exchange of information across the internet and work behind the scenes so effectively that many users don't think twice about them or how the internet works. For networking professionals, network protocols are critical to know and understand. But that doesn't make understanding these protocols easy.

To get started, this glossary explores 12 common network protocols all network engineers should be familiar with. This includes the protocols' main functions, as well as why these common network protocols are important.

12 common network protocols explained

Address Resolution Protocol. ARP translates IP addresses to Media Access Control (MAC) addresses and vice versa so LAN endpoints can communicate with one another. ARP is necessary because IP and MAC addresses are different lengths: IP version 4 (IPv4) addresses are 32 bits long, IPv6 addresses are 128 bits and MAC addresses -- a device's physical hardware number -- are 12 hexadecimal digits split into six pairs. Translations must occur for proper device communication.

ARP isn't required every time devices attempt to communicate because the LAN's host stores the translated addresses in its ARP cache, so this process is mainly used when new devices join the network.

Learn how ARP works.

Border Gateway Protocol. BGP makes the internet work. This routing protocol controls how packets pass through routers in an autonomous system (AS) -- one or multiple networks run by a single organization or provider -- and connect to different networks. BGP can connect endpoints on a LAN to one another, and it can connect endpoints in different LANs to one another over the internet.

External BGP directs network traffic from various ASes to the internet and vice versa. Additionally, internal BGP directs network traffic between endpoints within a single AS.

In this diagram, the blue routers indicate those that run BGP, enabling traffic to travel through a provider's network to the customer, or vice versa.

Domain name system. DNS is a database that includes a website's domain name, which people use to access the website, and its corresponding IP addresses, which devices use to locate the website. DNS translates the domain name into IP addresses, and these translations are included within the DNS. Servers can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which is within the IP suite and details the specifications DNS uses to translate and communicate.

DNS is important because it can quickly provide users with information, as well as access to remote hosts and resources across the internet.

Dynamic Host Configuration Protocol. DHCP assigns IP addresses to network endpoints so they can communicate with other network endpoints over IP. Whenever a device joins a network with a DHCP server for the first time, DHCP automatically assigns it a new IP address and continues to do so each time a device moves locations on the network.

When a device connects to a network, a DHCP handshake takes place, where the device and DHCP server communicate. The device establishes a connection; the server receives it and provides available IP addresses; the device requests an IP address; and the server confirms it to complete the process.

DHCP handshakes occur when a device initially connects to a network.

File Transfer Protocol. FTP is a client-server protocol, with which a client requests a file and the server supplies it. FTP runs over TCP/IP -- a suite of communications protocols -- and requires a command channel and a data channel to communicate and exchange files, respectively. Clients request files through the command channel and receive access to download, edit and copy the file, among other actions, through the data channel.

FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a common network protocol for more private file sharing, such as in banking.

Hypertext Transfer Protocol. Like FTP, HTTP is a file sharing protocol that runs over TCP/IP, although HTTP primarily works over web browsers and is commonly recognizable for most users. When a user enters a website domain and aims to access it, HTTP provides the access. HTTP connects to the domain's server and requests the site's HTML, which is the code that structures and displays the page's design.

Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure. HTTPS can encrypt a user's HTTP requests and webpages. This provides more security to users and can prevent common cybersecurity threats, such as man-in-the-middle attacks.

This diagram shows how HTTP provides users with access to the various components of a website's domain.

Internet Protocol. IP functions similarly to a postal service. When users send and receive data from their device, the data gets spliced into packets, which are like letters with two IP addresses: one for the sender and one for the recipient. After the packet leaves the sender, it goes to a gateway, like a post office, that directs it in the proper direction. Packets continue to travel through gateways until they reach their destinations.

IP is commonly paired with TCP to form TCP/IP, the overall internet protocol suite. Together, IP sends packets to their destinations, and TCP arranges the packets in the correct order, as IP sometimes sends packets out of order to ensure the packets travel the fastest ways.

Open Shortest Path First. OSPF works with IP in sending packets to their destinations. IP aims to send packets on the quickest route possible, which OSPF is designed to accomplish. OSPF opens the shortest, or quickest, path first for packets. It also updates routing tables -- a set of rules that control where packets travel -- and alerts routers of changes to the routing table or network when a change occurs.

OSPF is similar to and supports Routing Information Protocol -- which directs traffic based on the number of hops it must take along a route -- and it has also replaced RIP in many networks. OSPF was developed as a more streamlined and scalable alternative to RIP. For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends updates only when necessary and makes updates to the particular part of the table where the change occurred.

RIP helps determine that the path via Router C results in fewer hops to the traffic's destination. RIP and OSPF function similarly to one another.

Simple Mail Transfer Protocol. SMTP is the most popular email protocol, is part of the TCP/IP suite and controls how email clients send users' email messages. Email servers use SMTP to send email messages from the client to the email server to the receiving email server. However, SMTP doesn't control how email clients receive messages -- just how clients send messages.

That said, SMTP requires other protocols to ensure email messages are sent and received properly. SMTP can work with Post Office Protocol 3 or Internet Message Access Protocol, which control how an email server receives email messages.

Telnet. Telnet is designed for remote connectivity, and it establishes connections between a remote endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to log on and, once authenticated, gives the endpoint access to network resources and data at the host computer.

Telnet has existed since the 1960s and was arguably the first draft of the modern internet. However, Telnet lacks sophisticated security protections required for modern communications and technology, so it isn't commonly used anymore.

Transmission Control Protocol. TCP is the other half of TCP/IP and arranges packets in order so IP can deliver them. Specifically, TCP numbers individual packets because IP can send packets to their destinations through different routes and get them out of order, so TCP amends this before IP delivers the packets.

TCP also detects errors in the sending process -- including if any packets are missing based on TCP's numbered system -- and requires IP to retransmit those packets before IP delivers the data to its destination. Through this process, the TCP/IP suite controls communication across the internet.

Discover key differences between common network protocols TCP and UDP.

User Datagram Protocol. UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency data transmissions between internet applications, so this protocol is ideal for voice over IP or other audio and video requirements. Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead, UDP transmits all packets even if some haven't arrived.

UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works more quickly than TCP, it's also less reliable.

A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.

To successfully send and receive information, devices on both sides of a communication exchange must accept and follow protocol conventions. In networking, support for protocols can be built into software, hardware or both.

Without computing protocols, computers and other devices would not know how to engage with each other. As a result, except for specialty networks built around a specific architecture, few networks would be able to function, and the internet as we know it wouldn't exist. Virtually all network end users rely on network protocols for connectivity.

How network protocols work

Network protocols break larger processes into discrete, narrowly defined functions and tasks across every level of the network. In the standard model, known as the Open Systems Interconnection (OSI) model, one or more network protocols govern activities at each layer in the telecommunication exchange. Lower layers deal with data transport, while the upper layers in the OSI model deal with software and applications.

A set of cooperating network protocols is called a protocol suite. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite, which is typically used in client-server models, includes numerous protocols across layers -- such as the data, network, transport and application layers -- working together to enable internet connectivity. These include the following:

  • TCP, which uses a set of rules to exchange messages with other internet points at the information packet level;
  • User Datagram Protocol, or UDP, which acts as an alternative communication protocol to TCP and is used to establish low-latency and loss-tolerating connections between applications and the internet;
  • IP, which uses a set of rules to send and receive messages at the level of IP addresses; and
  • additional network protocols, including Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each of which has defined sets of rules to exchange and display information.

Every packet transmitted and received over a network contains binary data. Most computing protocols will add a header at the beginning of each packet in order to store information about the sender and the message's intended destination. Some protocols may also include a footer at the end with additional information. Network protocols process these headers and footers as part of the data moving among devices in order to identify messages of their own kind.

Network protocols are often set forth in an industry standard -- developed, defined and published by groups such as the following:

  • International Telecommunication Union, or ITU;
  • Institute of Electrical and Electronics Engineers, or IEEE;
  • Internet Engineering Task Force, or IETF;
  • International Organization for Standardization, or ISO; and
  • World Wide Web Consortium, or W3C.

Major types of network protocols

Generally speaking, there are three types of protocols in networking -- communication, such as Ethernet; management, such as Simple Mail Transfer Protocol (SMTP); and security, such as Secure Shell, or SSH.

Falling into these three broad categories are thousands of network protocols that uniformly handle an extensive variety of defined tasks, including authentication, automation, correction, compression, error handling, file retrieval, file transfer, link aggregation, routing, semantics, synchronization and syntax.

How to implement network protocols

In order for network protocols to work, they must be coded within software -- either as part of the computer's operating system (OS) or as an application -- or implemented within the computer's hardware. Most modern OSes possess built-in software services that are prepared to implement some network protocols. Other applications, such as web browsers, are designed with software libraries that support the protocols necessary for the application to function. In addition, TCP/IP and routing protocol support is implemented in direct hardware for enhanced performance.

Whenever a new protocol is implemented, it is added to the protocol suite. The organization of protocol suites is considered to be monolithic since all protocols are stored in the same address and build on top of one another.

What are the vulnerabilities of network protocols?

Network protocols are not designed for security. Their lack of protection can sometimes enable malicious attacks, such as eavesdropping and cache poisoning, to affect the system. The most common attack on network protocols is the advertisement of false routes, causing traffic to go through compromised hosts instead of the appropriate ones.

Network protocol analyzers are tools that protect systems against malicious activity by supplementing firewalls, antivirus programs and antispyware software.

How are network protocols used?

Network protocols are what make the modern internet possible since they enable computers to communicate across networks without users having to see or know what background operations are occurring. Some specific examples of network protocols and their uses include the following:

  • Post Office Protocol 3, or POP3, is the most recent version of a standard protocol that is used for receiving incoming emails.
  • SMTP is used to send and distribute outgoing emails.
  • FTP is used to transfer files from one machine to another.
  • Telnet is a collection of rules used to connect one system to another via a remote login. The local computer sends the request for connection, and the remote computer accepts the connection.

Other network protocol examples include the following:

  • address resolution protocol, or ARP;
  • Blocks Extensible Exchange Protocol, or BEEP;
  • Border Gateway Protocol, or BGP;
  • Binary Synchronous Communications, or BSC;
  • Canonical Text Services, or CTS;
  • Domain Name System, or DNS;
  • Dynamic Host Configuration Protocol, or DHCP;
  • Enhanced Interior Gateway Routing Protocol, or EIGRP;
  • HTTP Secure, or HTTPS;
  • human interface device, or HID;
  • Internet Control Message Protocol, or ICMP;
  • Internet Message Access Protocol, or IMAP;
  • Gopher;
  • Media Access Control, or MAC;
  • Network News Transfer Protocol, or NNTP;
  • Open Shortest Path First, or OSPF;
  • Secure Sockets Layer (SSL);
  • Simple Network Management Protocol, or SNMP;
  • Thread;
  • Transport Layer Security (TLS);
  • Universal Description, Discovery and Integration, or UDDI;
  • voice over IP, or VoIP; and
  • X10.

Learn how to choose between an SSL/TLS virtual private network and an IP Security VPN.