Getty Images/iStockphoto
14 common network protocols and their functions explained
Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are key for communication and connection across the internet.
Without network protocols, the modern internet would cease to exist.
Network protocols enable the exchange of information across the internet and work behind the scenes so effectively that many users don't think twice about them or how the internet works. But it's critical for networking professionals to know and understand protocols as the foundation of networking.
This glossary explores 14 common network protocols network administrators should be familiar with and provides information about their main functions and importance in computer networks. It includes different types of network protocols, such as the following:
- Communication protocols. These include Address Resolution Protocol (ARP), Hypertext Transfer Protocol (HTTP), Internet Protocol (IP), Simple Mail Transfer Protocol (SMTP), Transport Control Protocol (TCP) and User Datagram Protocol (UDP).
- Routing protocols. These include Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF).
- Network management protocols. These include Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), File Transfer Protocol (FTP), Internet Control Message Protocol (ICMP), Simple Network Management Protocol (SNMP) and Telnet.
The network protocols below are listed in alphabetical order.
1. Address Resolution Protocol (ARP)
ARP translates IP addresses to MAC addresses and vice versa so LAN endpoints can communicate with one another. ARP is necessary because IP and MAC addresses are different lengths and operate on different layers of the OSI model. Below is a breakdown of the various address lengths:
- IP version 4 (IPv4) addresses are 32 bits.
- IPv6 addresses are 128 bits.
- MAC addresses -- a device's physical hardware number -- are 12 hexadecimal digits split into six pairs.
These addresses must be translated for proper communication and data transfer among connected devices. ARP isn't required every time devices attempt to communicate because the LAN's host system maps and stores the translated addresses in its ARP cache. As a result, the ARP translation process is mainly used when new devices join the network.
2. Border Gateway Protocol (BGP)
BGP makes the internet work. This routing protocol controls how packets pass through routers in an autonomous system (AS) -- one or multiple networks run by a single organization or provider -- and connect to different networks. BGP can connect endpoints on a LAN to one another, and it can connect endpoints in different LANs to one another over the internet.
External BGP directs network traffic from various ASes to the internet and vice versa. Internal BGP directs network traffic between endpoints within a single AS.
3. Domain name system (DNS)
DNS is an application layer protocol and acts as database that includes a website's domain name and its corresponding IP addresses. People use a domain name to access a website, while devices use an IP address to locate a website.
DNS translates the domain name into IP addresses, and these translations are included within DNS servers. Servers can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which is within the IP suite and details the specifications DNS uses to translate and communicate.
DNS is important because it can provide users with information quickly and enable access to remote hosts and resources across the internet.
IoT protocols explained
Here are five of the top protocols and their features that matter most to IoT. Download your free guide now.
4. Dynamic Host Configuration Protocol (DHCP)
DHCP assigns IP addresses to network endpoints so they can communicate with other network devices over IP. Whenever a device joins a network with a DHCP server for the first time, DHCP automatically assigns it a new IP address and continues to do so each time a device moves locations on the network. Without DHCP, network administrators manually assign IP addresses to each new device.
When a device connects to a network, a DHCP handshake takes place. In this handshake process, the device and DHCP server communicate using the following steps:
- The device establishes a connection.
- The server receives the connection and provides available IP addresses.
- The device requests an IP address.
- The server confirms the address to complete the process.
5. File Transfer Protocol (FTP)
FTP is a client-server protocol, with which a client requests a file and the server supplies it. FTP runs over TCP/IP -- a suite of communications protocols -- and requires a command channel and a data channel to communicate and exchange files, respectively. Clients request files through the command channel and receive access to download, edit and copy the file, among other actions, through the data channel.
FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a common network protocol for more private file sharing, such as in banking.
6. Hypertext Transfer Protocol (HTTP)
Like FTP, HTTP is a file sharing protocol that runs over TCP/IP. But HTTP primarily works over web browsers and is commonly recognizable for most users. When a user enters a website domain and aims to access it, HTTP provides the access. HTTP connects to the domain's server and requests the site's HTML, which is the code that structures and displays the page's design.
Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure. HTTPS can encrypt a user's HTTP requests and webpages. This provides more security to users and can prevent common cybersecurity threats, such as man-in-the-middle attacks.
7. Internet Control Message Protocol (ICMP)
ICMP is a network layer protocol used for error handling, diagnostics and control messages between network devices. It helps identify network connectivity issues and manage the flow of data packets. It does not transfer data.
Ping and traceroute both use ICMP to test connectivity and trace packet routes. Common ICMP messages include the following:
- Echo Request and Echo Reply.
- Destination Unreachable.
- Time Exceeded.
- Redirect Message.
8. Internet Protocol (IP)
IP functions similarly to a postal service. When users send and receive data from their device, the data gets spliced into packets. Packets are like letters with two IP addresses: one for the sender and one for the recipient.
After the packet leaves the sender, it goes to a gateway, like a post office, that directs it in the proper direction. Packets continue to travel through gateways until they reach their destinations.
IP is commonly paired with TCP to form TCP/IP, the overall internet protocol suite. Together, IP sends packets to their destinations, and TCP arranges the packets in the correct order, as IP sometimes sends packets out of order to ensure the packets travel the fastest ways.
Want to learn more about common network protocols?
Check out these video definitions from TechTarget's YouTube channel, Eye on Tech, to get more insight into common network protocols.
9. Open Shortest Path First (OSPF)
OSPF works with IP to send packets to their destinations. IP aims to send packets on the quickest route possible, which OSPF is designed to accomplish. OSPF opens the shortest, or quickest, path first for packets. It also updates routing tables -- a set of rules that control where packets travel -- and alerts routers of changes to the routing table or network when a change occurs.
OSPF is similar to and supports Routing Information Protocol, which directs traffic based on the number of hops it must take along a route, and it has also replaced RIP in many networks. OSPF was developed as a more streamlined and scalable alternative to RIP. For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends updates only when necessary and makes updates to the particular part of the table where the change occurred.
10. Simple Mail Transfer Protocol (SMTP)
SMTP is the most popular email protocol, is part of the TCP/IP suite and controls how email clients send users' email messages. Email servers use SMTP to send email messages from the client to the email server to the receiving email server. However, SMTP doesn't control how email clients receive messages -- just how clients send messages.
That said, SMTP requires other protocols to ensure email messages are sent and received properly. SMTP can work with Post Office Protocol 3 or Internet Message Access Protocol, which control how an email server receives email messages.
11. Simple Network Management Protocol (SNMP)
SNMP is a network management protocol that helps network admins manage and monitor network devices. It gathers device information to monitor network performance and health. Network administrators often use SNMP to detect and troubleshoot network issues.
SNMP uses a manager-agent model and uses the following components:
- SNMP manager, which communicates with the agents and requests or updates information.
- SNMP agent, which is installed on devices and sends information to the manager.
- Management information base, which acts as a database and contains device information.
12. Telnet
Telnet is designed for remote connectivity, and it establishes connections between a remote endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to log on. Once the user is authenticated, Telnet gives the endpoint access to network resources and data at the host computer.
Telnet has existed since the 1960s and was arguably the first draft of the modern internet. However, Telnet lacks sophisticated security protections required for modern communications and technology, so it isn't commonly used anymore.
13. Transmission Control Protocol (TCP)
TCP is a transport layer and acts as the other half of TCP/IP. It arranges packets in order so IP can deliver them. Specifically, TCP numbers individual packets because IP can send packets to their destinations through different routes and get them out of order, so TCP amends this before IP delivers the packets.
TCP also detects errors in the sending process -- including if any packets are missing based on TCP's numbered system -- and requires IP to retransmit those packets before IP delivers the data to its destination. Through this process, the TCP/IP suite controls communication across the internet.
14. User Datagram Protocol (UDP)
UDP is an alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency data transmissions between internet applications, making it ideal for VoIP or other audio and video requirements.
Unlike TCP, UDP doesn't wait for all packets to arrive or organize the packets. Instead, UDP transmits all packets even if some haven't arrived.
UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works more quickly than TCP, it's also less reliable.
Editor's note: This article was originally written by Michaela Goss and updated by TechTarget editors to expand coverage and improve the reader experience.
Michaela Goss is senior site editor for TechTarget's Customer Experience and Content Management sites. She joined TechTarget as a writer and editor in 2018.