4 Communication Protocol

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Communication Protocol

What is communication Protocol?

2
Communication Protocol

 In the digital world, communication protocols create many rules.


 On the Internet, the formation of these protocols can be done by groups such
as the association of WWW (World Wide Web) or W3C & the IETF (Internet
Engineering Task) assists in providing worldwide operations and limits different
types of liability as well as vulnerabilities within these technologies.
 Communication protocol plays a key role when HTTP turns into HTTPS
otherwise an extensive use of SSL (Secure Sockets Layer) certificate becomes
the standard.

3
Communication Protocol

 Different web browsers have different way of retrieving information, but one
thing they have in common is web communication protocols.
 Web communication protocols are technology used to transfer information
across the internet.
 For example, a web browser uses these protocols to request information from a
web server, which is then displayed on the browser screen in the form of text
and images.
 The degree to which users can interact with that information depends on the
protocol.
 Communication between a web server and web client is an example of an
interaction between several protocols.

4
Types of Communication Protocol

Below are some of web communication protocols used:


1. HyperText Transfer Protocol (HTTP)
2. Hypertext Transfer Protocol Secure (HTTPS)
3. Telnet
4. File Transfer Protocol (FTP)
5. IP Security (IPSec)

5
1 HTTP

 HyperText Transfer Protocol (HTTP) is the most widely used web communications
protocol.
 It is the standard protocol for transferring web pages (and their content) across the
Internet.
 HTTP is a classic "client-server" protocol.
 HTTP is an unsecure communications protocol because the data it sends back and forth
between a browser and a server is unencrypted and can be intercepted by third parties.
 When you browse a web page, the URL might be preceded by http://.
 Most browsers will default to HTTP if don't specify it.

6
2 HTTPS

 HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer.
 Think of it as a secure version of HTTP.
 HTTPS is similar to HTTP, but different in that it combines with a security protocol
called SSL(Secure Sockets Layer) /TLS(Transport Layer Security) to provide secure client-
server communications over unsecure networks such as the internet.
 HTTPS is used primarily on web pages that ask you to provide personal or sensitive
information (such as a password or your credit card details).
 For example, HTTPS protocols on ecommerce websites that ask for personal financial
information like credit card numbers.
 Know a website is using HTTPS protocols when see the "https://" in the web address
displayed in browser's Address field.

7
3 Telnet

 TELNET stands for TELecommunication NETwork.


 Telnet is one of the oldest communication protocols.
 Like HTTP, a Telnet client is used to access remote servers.
 Unlike HTTP, where you only request specific files, Telnet is used to actually log on to the
remote server and perform functions as if you were sitting in front of the server terminal.
 Telnet is rarely used now since it is an unsecure protocol that does not encrypt data sent
between remote computers.

8
4 FTP

File Transfer Protocol (FTP) is primarily used to transfer files such as documents, images,
music, etc., between remote computers.
Users have to log on to an FTP server either through a command line interface or through
one of the many FTP graphical client programs available.
Once logged on, users can navigate through the remote server's file structure, moving,
renaming, deleting, and copying files as if it were their own computer.

9
5 IP Security(IPSec)

 IP Security (IPSec) protocols encrypt packets of data and send them between two
computers that share the same cryptographic keys.
 In other words, the IPSec protocol is like a hallway with no doors linking two rooms.
 The only place the data can go is between those two rooms.
 IPSec protocols are used in Virtual Private Networks, which allow employees of a
company to log on to their company's secure network through a public network (e.g. from
home or a coffee shop.)

10
Security

 Internet communications that are based on the TCP/IP, such as the Hypertext Transfer Protocol
(HTTP), Telnet, and File Transfer Protocol (FTP), are not secure because all communication
occurs in plaintext.
 Confidential or sensitive information that is transmitted with these protocols can easily be
intercepted and read unless the information is protected by encryption technology.
 Any web client can send HTTP requests to a web server and exploit weaknesses in the HTTP
protocol or its implementation, web servers that use only standard HTTP to communicate with web
clients are easy targets for denial-of-service attacks and other types of attacks.
 Moreover, web clients that communicate by using standard HTTP are easy targets for unauthorized
web servers, which can impersonate legitimate websites and which might contain either virus-laden
software for download by users or malicious scripts and programs.

11
Security

 Secure web communication protocols provide a way to authenticate clients and servers on the
web and to protect the confidentiality of communication between clients and servers.
 A variety of secure communication standards that use public key technology have been
developed, including Hypertext Transfer Protocol (HTTPs), IP Security (IPSec).
 The leading general-purpose, secure web communication protocols are SSL 3.0 and the open TLS
protocol that is based on SSL.
 The SSL and TLS protocols are widely used to provide secure channels for confidential TCP/IP
communication on the web.

12
13
Searching and Reading Time

Search about “secure website” and let’s make discussion.

14

You might also like