KEMBAR78
Protocols | PDF | File Transfer Protocol | Transport Layer Security
0% found this document useful (0 votes)
10 views4 pages

Protocols

The document provides an overview of several key internet protocols: HTTP, HTTPS, FTP, SMTP, and POP3. Each protocol is defined with its characteristics, advantages, and disadvantages, highlighting aspects such as security, data transfer methods, and usage scenarios. Key differences include HTTP's lack of security compared to HTTPS, and the file transfer capabilities of FTP versus the email sending functionality of SMTP and email retrieval of POP3.

Uploaded by

amit singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views4 pages

Protocols

The document provides an overview of several key internet protocols: HTTP, HTTPS, FTP, SMTP, and POP3. Each protocol is defined with its characteristics, advantages, and disadvantages, highlighting aspects such as security, data transfer methods, and usage scenarios. Key differences include HTTP's lack of security compared to HTTPS, and the file transfer capabilities of FTP versus the email sending functionality of SMTP and email retrieval of POP3.

Uploaded by

amit singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

HTTP (Hypertext Transfer Protocol)


Definition:

HTTP stands for Hypertext Transfer Protocol. It is an application layer protocol used for
transmitting hypertext (HTML) and other resources over the World Wide Web. HTTP is a
stateless, request-response protocol, operating over TCP (port 80). It governs how messages
are formatted and transmitted between clients (usually web browsers) and servers.

Characteristics:

1. Request-Response Model: Communication begins with a client request, and the server
returns a response.
2. Stateless: Each HTTP request is independent; the server doesn't retain user session data.
3. Text-Based Protocol: Both requests and responses are in human-readable ASCII text.
4. Client-Server Architecture: The client initiates the communication.
5. Methods (Verbs):
o GET: Retrieves data from the server.
o POST: Sends data to the server.
o PUT, DELETE, HEAD, OPTIONS, etc.
6. Status Codes:
o 1xx (Informational)
o 2xx (Success) – e.g., 200 OK
o 3xx (Redirection)
o 4xx (Client Error) – e.g., 404 Not Found
o 5xx (Server Error)
7. Uses TCP (Port 80) for data transmission.
8. No Encryption: HTTP transfers data in plain text.

Advantages:

 Easy to implement.
 Fast and lightweight.
 Platform independent.
 Universally supported by browsers.

Disadvantages:

 No security; data is transferred in plain text.


 Vulnerable to eavesdropping and man-in-the-middle attacks.
 No session management.

2. HTTPS (Hypertext Transfer Protocol Secure)


Definition:

HTTPS is the secure version of HTTP, used to ensure secure communication over the internet.
It uses SSL/TLS encryption to protect data in transit, preventing interception or tampering.

Characteristics:

1. Encryption: Uses SSL (Secure Socket Layer) or TLS (Transport Layer Security) for
encryption.
2. Authentication: Verifies the identity of the server via digital certificates.
3. Data Integrity: Ensures that data is not altered in transit.
4. Port Number: Works over port 443.
5. Protocol Stack: HTTPS = HTTP + SSL/TLS + TCP/IP.
6. URL Format: Begins with https://.

Advantages:

 Secure communication through encryption.


 Protects user privacy.
 Trusted by search engines and browsers.
 Essential for online banking, e-commerce, and login systems.

Disadvantages:

 Slower than HTTP due to encryption overhead.


 More complex to set up.
 Requires digital certificate (may involve cost).

Examples:

 Online banking websites.


 E-commerce platforms (Amazon, Flipkart).
 Gmail, Facebook login pages.

3. FTP (File Transfer Protocol)


Definition:

FTP is a standard network protocol used for transferring files between a client and a server
on a TCP/IP network. It was designed for efficient and reliable file transfer and uses TCP ports
20 and 21.

Characteristics:
1. Client-Server Model: FTP client initiates the connection.
2. Two Ports Used:
o Port 21: Control connection (commands)
o Port 20: Data connection (actual file transfer)
3. Modes of Operation:
o Active Mode
o Passive Mode
4. Authentication: Can be anonymous or require a username/password.
5. Commands Supported: GET, PUT, LIST, DELETE, MKDIR, etc.
6. ASCII and Binary Modes: Transfers can be done in text (ASCII) or binary mode.

Advantages:

 Efficient for large file transfers.


 Can resume interrupted downloads (in some clients).
 Supports batch transfer of files.

Disadvantages:

 Not secure (sends credentials and files in plain text).


 Complex firewall configurations due to dual port usage.
 Replaced in many cases by secure alternatives like SFTP and FTPS.

Variants:

 SFTP (SSH File Transfer Protocol)


 FTPS (FTP Secure)

4. SMTP (Simple Mail Transfer Protocol)


Definition:

SMTP is an application-layer protocol used for sending emails from a client to a mail server or
between mail servers. It uses TCP port 25 and works on a store-and-forward model.

Characteristics:

1. Push Protocol: SMTP actively sends email to the server.


2. Client-Server Architecture: Mail client sends emails to the server.
3. Command Set: Common commands include HELO, MAIL FROM, RCPT TO, DATA, QUIT.
4. Works with MIME: Enables sending multimedia content via email.
5. Used for Sending Only: Cannot retrieve emails (for that, POP3/IMAP is used).
6. Can Transfer Email Between Servers.
Advantages:

 Reliable and simple.


 Widely adopted and supported.
 Allows transfer of messages across servers globally.

Disadvantages:

 Not suitable for receiving emails.


 Lacks built-in encryption (can use SSL/TLS optionally).
 Subject to spam abuse.

5. POP3 (Post Office Protocol Version 3)


Definition:

POP3 is an application-layer protocol used by clients to retrieve emails from a remote server.
It is a pull protocol and works over TCP port 110 (995 for SSL/TLS).

Characteristics:

1. Download-and-Delete Model: Downloads emails to the local machine and deletes from
the server.
2. Stateless: Server does not maintain any session or state after download.
3. Simple Command Set: Includes USER, PASS, STAT, RETR, DELE, QUIT.
4. Offline Access: Allows reading emails without internet after download.

Advantages:

 Simple and easy to implement.


 Saves server storage (mails removed from server).
 Fast access due to local storage.

Disadvantages:

 No synchronization: Emails not accessible from multiple devices.


 No folders or complex structures supported.
 Risk of losing mails if local system fails.

You might also like