Internet protocol

Internet protocol

13 Types of Internet Protocols with Various Functions

Internet protocol-A computer can only connect to the virtual world, thanks to the help of the internet network. The internet network itself has many types and various functions, and works to make it easier for users to access the internet. But many do not know that networks, especially protocols that are used to connect users to the internet, are of various types. These protocols are used to mark, set direction, destination, etc. in the network that we will build later.

In the world of networks and the internet, the protocol itself is interpreted as a rule or standard that regulates and permits communication and data transfer from one to two or more computers. This protocol can also be applied to hardware and software or a combination of both.

Without realizing it, this internet protocol has various types and of course different functions. The following are some of these types of protocols.

Protocol Function

Protocol functions in detail can be explained as follows:
  • Fragmentation and Reassembly - The function of fragmentation and reassembly is to share information sent into several data packages when the sending side sends the information and after it is received, the receiving side will combine again into a complete news package.
  • Encaptulation - The function of encaptulation is to complete the news sent by address, correction codes and others.
  • Connection Control - The function of the connection control is to build communication links from the transmitter and receiver, where in building this relationship, including in terms of sending data and ending the relationship.
  • Flow Control - The function of flow control is to regulate the travel of data from the transmitter to the receiver.
  • Error Control - In sending data can not be separated from errors, both in the process of sending and when the data is received. The function of error control is to control the occurrence of errors that occur when the data is sent.
  • Transmission Service - The function of transmission service is to provide data communication services, especially those relating to priority and security and data protection

Types of Internet Protocol

1. TCP IP –Is Transmission Control Protocol or Internet Protocol

TCP / IP is a data communication standard used by the internet community for the process of exchanging data from one computer to another on an internet network. This protocol cannot stand alone without the help of other components, because TCP / IP itself only functions as a protocol wrapper (protocol suite).

And in the internet network, TCP / IP is the most widely used protocol today, and this is usually in the form of software in an operating system. Software or software that handles TCP / IP problems is usually termed a TCP / IP stack application.

The protocol was first developed in the 1970-1980s and was named the standard protocol for connecting computers to form a wide network, especially WAN networks in Internet protocol.

2. Ethernet protocol

This protocol is still often used today to connect computers to the internet. Ethernet itself uses an access method called CSMA / CD (Carrier Sense Multiple Access / Collision Detection). CSMA / CD is a system which requires each computer to wait for network instructions before it can send data or information to another computer. In this case, if the network is not busy, then the computer will convey information or data. But if it turns out the network is busy, then the computer will automatically wait until the network allows or the term until the network is not busy.

The busy network that is meant here is the exchange of lots of data from one computer to two computers. And if if computer two also wants to send data, then this might cause data collisions so that the network will experience interference.

3. UDP (User Datagram Protocol)

UDP is one of the protocols located at the TCP / IP layer, and can support unrealiable communication. Not reliable what is meant here is without connection. So, the UDP protocol has the ability to connect computers even without a TCP / IP connection in Internet protocol

4. RTP (Real Time Protocol)

RTP or Real Time Protocol is a network protocol that provides functions to deliver data in real time. Such as audio, video, etc. data usually can be sent via multicast network services or unicast services.

5. FTP (File Transfer Protocol)

This type of protocol is usually used to upload and download files. The security itself is based on the username and password that is created by the computer, but sometimes not a few are also anonymous.

6. HTTP (Hypertext Transfer Protocol)

HTTP is a familiar protocol and is often used to transfer web pages. But before the existence of this HTTP technology, the webmasters of the past apparently used the Gopher protocol. But unfortunately, the Gopher protocol only supports text only, so it is considered ineffective for transferring and downloading website pages.

7. DHCP (Dynamic Host Configuration Protocol)

This protocol serves to provide an Internet Protocol (IP) address automatically when the computer is connected with a cable-connection originating from an ISP.

8. DNS (Domain Name System)

DNS is a network protocol and is commonly used in applications that are connected to the internet network, for example, such as internet browsers, e-mail, and other applications. This DNS can also help map the hostname of a computer to an IP address.

9. ICMP (Internet Control message Protocol)

Functionally, this protocol does have a function that is slightly different from TCP or UDP in terms of its use. Because this protocol cannot be used directly by the user's network application. Generally, ICMP is often used by the person computer operating stem to provide notification that the destination computer is not reachable

10. IMAP (Internet Message Access Protocol)

IMAP is a standard protocol used to access or retrieve e-mail from a server. IMAP allows users to select e-mail messages to be retrieved, search for specific e-mail messages, and even delete existing e-mail messages. The ability of IMAP is better than POP (Post Office Protocol), which allows users to retrieve and download all messages without exception in Internet protocol.


Actually HTTPS is the same protocol as HTTP, it's just different at the security level. Because, HTTPS is safer than HTTP. This communication protocol is part of the WWW (World Wide Web) and was discovered by Netscape Communications Corporation which provides encrypted authentication and communication for electrical commercial use. In its formation, HTTPS uses a variety of communication technologies such as plain text, and SSL (Security Socket Layer). Both of these technologies provide adequate protection from attacks of eavesdroppers and man in the middle attacks.

12. SSH (Sucure Shell)

SSH or Sucur Shell is a network protocol that allows users to safely exchange data between two or more computers. SSH is generally used to control information remotely, such as receiving and sending files. The use of this protocol must also use an encrypted Tunnel in Internet protocol.

The advantages of SSH compared to the Telnet, FTP, and RSH protocols are because SSH itself has its own authentication, authorization and encryption system. SSH is also believed to make communication security more secure.

13. SSL (Secure Socket Layer)

SSL is one of the most widely used protocols, especially to improve website security and this protocol is also predicted to have high-level encryption capabilities. Not only is it able to secure websites, SSL seems to be able to provide more security for applications that require end-to-end network encryption in Internet protocol.

Incoming Search Terms :

  • SFTP Port
  • SFTP Server
  • SFTP Client
  • SolarWinds
  • FTP Server
  • FTP Client
  • Putty Download Windows
  • SSH Keys
  • Core FTP
  • Solar winds software
  • Netflow solarwinds