0% found this document useful (0 votes)
73 views

DCC Microproject

Explain in brief protocol and types of protocol.

Uploaded by

siddhi shinde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

DCC Microproject

Explain in brief protocol and types of protocol.

Uploaded by

siddhi shinde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

INDEX

Sr. No. Content Page No.

ANNEXURE-I

1.0 Aims/Benefits of the Micro-Project 5

2.0 Course Outcomes Addressed 5

3.0 Proposed Methodology 5

4.0 Action Plan 6

5.0 Resources Required 6

ANNEXURE-II

1.0 Rationale 7-9

2.0 Aims/Benefits of the Micro-Project 10

3.0 Course Outcomes Achieved 10

4.0 Actual Methodology Followed/Program Code 11-13

5.0 Outputs of the Micro-Projects 14

6.0 Actual Resources Used 15

7.0 Skill Developed / Learning outcomes of this Micro-Project 15

8.0 Applications of this Micro-Project 16

1
ANNEXURE-I

1.0 Aims/Benefits of the micro project


Explain in brief protocol and types of protocol.
Benefit Taken from this micro-project is understanding the concept of protocol in brief.

2.0 Course outcome addressed.

 Manipulate visual and geometric information of images.


 Implement standard algorithms to draw various graphics objects using the C
program.
 Develop programs for 2D and 3D transformation.
 Use projections to visualize objects on the view plane .
 Implement various clipping algorithms.
 Develop programs to create curves using algorithms

3.0 Proposed methodology

1. Focused on the selection of an appropriate topic for the micro-project.


2. Select the topic i.e. Explain in brief protocol and types of protocol.
3. Brief study on our topic.
4. Gather all information based on the topic of the micro project.
5. Analysis and study of our topic in detail.
6. Following all the above methodologies we successfully completed our microproject.

2
4.0 Action Plan

Sr. Plan start Plan finish Name of responsible


Detail of activity
No. date date team members

1 Searching the topic for micro-project 28-09-2023 30-09-2023 Kadyal Rajeshwari

Collect information from the internet


2 03-10-2023 06-10-2023 Shinde Srushti
and textbook

Collect information from the DCC Data


3 communication and computer network 07-10-2023 12-10-2023 Shinde Siddhi
22414

4 Arrange all information in MS word 13-10-2023 20-10-2023 Kadyal Rajeshwari

5 Prepare a report on it using MS word 21-10-2023 23-10-2023 Dongare vaishnavi

6 Print micro project 28-10-2023 30-10-2023 Shinde Siddhi

5.0 Resources used

Sr. Name of resource


Specifications Quantity
no. material

1 Computer System 16 GB RAM, Windows 10 OS 1

1
DCC Data communication and computer
2 textbook/manual
network 22414

3
ANNEXURE-II

1.0 Brief Introduction/Rationale

 Protocol
Protocol, in computer science, a set of rules or procedures for transmitting data between
electronic devices, such as computers. In order for computers to exchange information, there
must be a preexisting agreement as to how the information will be structured and how each
side will send and receive it. Without a protocol, a transmitting computer, for example, could
be sending its data in 8-bit packets while the receiving computer might expect the data in 16-
bit packets. protocols are established by international or industrywide organizations. Perhaps
the most important computer protocol is OSI a set of guidelines for implementing
the networking communications between computers. Among the most important sets
of internet protocols are TCP/IP (Transmission Control Protocol/Internet Protocol), HTTPS
(Secure HyperText Transmission Protocol), SMTP (Simple Mail Transfer Protocol),
and DNS (Domain Name System).

 Overview of Protocol

In Order to make communication successful between devices, some rules and procedures
should be agreed upon at the sending and receiving ends of the system. Such rules and
procedures are called as Protocols. Different types of protocols are used for different types of
communication.

4
In above diagrams Protocols are shown as set of rules. Such that Communication between
Sender and Receiver is not possible without Protocol. Therefore protocol is must important in
data communication in computer network.

 Key Elements of Protocol

Key Elements of Protocol


Syntax: Syntax basically represents the format of the data means in which order data is
presented. It also indicates how to read the data. It simply means the way to represent data.
For Example, let us suppose a data packet has 16 bits, in which the first 4 bits are the sender’s
address, the last 4 bits are the receiver’s address and the rest is the message. So, this is a
syntax to represent data bits.

5
Semantics: Semantics basically refers to the meaning of each section mentioned in syntax. It
includes control information for coordination and error handling. It also specifies which file
defines which action.

Timing: Timing simply means when the data is to be sent and how fast the data can be sent.
For Example, if the Sender sends the data at 100 MBPS and the receiver receives it at 1
MBPS, then the data gets overflowed at the receiver end.

 Functions of Protocol

Establishment of Connection: There are two ways of data transfer, Connectionless or


Connection-Oriented. Basically, services acquired by protocols are Connection-Oriented
Services. It also helps during the transfer of large volumes of data.

Encapsulation: A protocol describes how the data is encapsulated in packets. It is basically


the process of distribution of one protocol to other.

Data Transfer Management: It is simply the management of the flow of data to provide
sequencing and matching.

Segmentation and Reassembly: Segmentation is the process of breaking data into smaller
blocks and adding some extra information for peer use and Reassembly means when the
upper-level protocol combines to get actual data when we remove control information sent by
the sender.

Error Control: Error Control is simply the loss of data or sometimes damage in data upon
transmission in data. It is implemented in two ways
Error Detection
Retransmission of Data

6
Flow Control: The process of controlling the flow of data to limit the rate of data sent by
transmitting frame. Techniques used for this method are stop and wait, etc. It is used to
basically control the problems like data loss, data overloading, etc.

Multiplexing / Demultiplexing: Multiplexing is a technique generally used in the context of


Addressing. It is basically of two types:
Upward Multiplexing
Downward Multiplexing

Addressing: Addressing is used during communication by defining addresses. The concept of


Addressing is complex and includes addressing levels and addressing scope.

Advantages of Internet Protocol


Connectivity – Internet Protocol enables devices to communicate with each other across the
world. This means that people from different parts of the world can share information and
work together seamlessly.

Scalability – Internet Protocol is designed to handle a large number of devices and networks.
This means that as the number of devices and networks on the Internet grows, Internet
Protocol can easily accommodate them.

Flexibility – Internet Protocol is a flexible protocol that allows for the creation of customized
networks. This means that organizations can create their own private networks and control
who has access to them.

Reliability – Internet Protocol is a reliable protocol that ensures that data is transmitted
accurately and efficiently. It also includes features that allow for the detection and correction
of errors in data transmission.

Security – Internet Protocol includes features that enable secure transmission of data across
networks. These features include encryption, which ensures that data cannot be read by
unauthorized parties.
Disadvantages of Internet Protocol
Security risks – Internet Protocol is vulnerable to attacks such as hacking, phishing, and
denial of service, which can result in data breaches, loss of personal information, and
financial losses.

7
Dependence on connectivity – Internet Protocol relies heavily on network connectivity, and
any disruptions in the network can result in communication and connectivity issues,
rendering it unusable.

Limited scalability – Internet Protocol has limitations in the number of devices it can connect,
and as the number of devices increases, the IP addresses may run out, resulting in
connectivity issues.
Lack of privacy – Internet Protocol does not provide complete privacy and anonymity. Your
data is transmitted in packets that can be intercepted, traced, and monitored by unauthorized
entities, which can compromise your privacy.

Technical complexity – Internet Protocol requires specialized knowledge and expertise to set
up and maintain, making it challenging for people with limited technical knowledge to use
and understand.

Types of Network Protocols


Some of the types of Network protocols:
Transmission Control Protocol (TCP)

TCP is a foundational protocol that operates at the transport layer of the OSI model. It
guarantees the reliable and ordered delivery of data packets between devices. TCP is widely
used for applications that require accurate and error-free data transfer, such as web browsing,
email, file transfer, and remote access. TCP is one of the basic standards that define the rules
of the internet and is included within the standards defined by the Internet Engineering Task
Force (IETF). It is one of the most commonly used protocols within digital network
communications and ensures end-to-end data delivery. TCP organizes data so that it can be
transmitted between a server and a client. It guarantees the integrity of the data being
communicated over a network. Before it transmits data, TCP establishes a connection
between a source and its destination, which it ensures remains live until communication
begins. It then breaks large amounts of data into smaller packets, while ensuring data
integrity is in place throughout the process.
Working of Transmission Control Protocol (TCP)/IP
The TCP/IP model is the default method of data communication on the Internet. It was
developed by the United States Department of Defense to enable the accurate and correct
transmission of data between devices. It breaks messages into packets to avoid having to
resend the entire message in case it encounters a problem during transmission. Packets are
automatically reassembled once they reach their destination. Every packet can take a different

8
route between the source and the destination computer, depending on whether the original
route used becomes congested or unavailable.
TCP/IP divides communication tasks into layers that keep the process standardized, without
hardware and software providers doing the management themselves. The data packets must
pass through four layers before they are received by the destination device, then TCP/IP goes
through the layers in reverse order to put the message back into its original format.
As a connection based protocol, the TCP establishes and maintains a connection between
applications or devices until they finish exchanging data. It determines how the original
message should be broken into packets, numbers and reassembles the packets, and sends
them on to other devices on the network, such as routers, security gateways, and switches,
then on to their destination. TCP also sends and receives packets from the network layer,
handles the transmission of any dropped packets, manages flow control, and ensures all
packets reach their destination.
A good example of how this works in practice is when an email is sent using SMTP from an
email server. To start the process, the TCP layer in the server divides the message into
packets, numbers them, and forwards them to the IP layer, which then transports each packet
to the destination email server. When packets arrive, they are handed back to the TCP layer to
be reassembled into the original message format and handed back to the email server, which
delivers the message to a user’s email inbox.
TCP/IP uses a three-way handshake to establish a connection between a device and a server,
which ensures multiple TCP socket connections can be transferred in both directions
concurrently. Both the device and server must synchronize and acknowledge packets before
communication begins, then they can negotiate, separate, and transfer TCP socket
connections.
Following are the five layers of the TCP/IP model:

The advantages of TCP/IP protocol

9
It is an industry–standard model that can be effectively deployed in practical networking
problems.
It is interoperable, i.e., it allows cross-platform communications among heterogeneous
networks.
It is an open protocol suite. It is not owned by any particular institute and so can be used by
any individual or organization.
It is a scalable, client-server architecture. This allows networks to be added without
disrupting the current services.
It assigns an IP address to each computer on the network, thus making each device to be
identifiable over the network. It assigns each site a domain name. It provides name and
address resolution services.
The disadvantages of TCP/IP protocol
It is not generic in nature. So, it fails to represent any protocol stack other than the TCP/IP
suite. For example, it cannot describe the Bluetooth connection.
It does not clearly separate the concepts of services, interfaces, and protocols. So, it is not
suitable to describe new technologies in new networks.
It does not distinguish between the data link and the physical layers, which has very different
functionalities. The data link layer should concern with the transmission of frames. On the
other hand, the physical layer should lay down the physical characteristics of transmission. A
proper model should segregate the two layers.
It was originally designed and implemented for wide area networks. It is not optimized for
small networks like LAN (local area network) and PAN (personal area network).

2. Hypertext Transfer Protocol (HTTP)

HTTP is a protocol used for transferring web pages and other resources on the World Wide
Web. It operates at the application layer and defines how browsers and web servers
communicate. HTTPS, a secure version of HTTP, incorporates encryption to protect data
integrity and user privacy.
HTTP is a protocol for fetching resources such as HTML documents. It is the foundation of
any data exchange on the Web and it is a client-server protocol, which means requests are
initiated by the recipient, usually the Web browser. A complete document is reconstructed
from the different sub-documents fetched, for instance, text, layout description, images,
videos, scripts, and more.

10
Clients and servers communicate by exchanging individual messages (as opposed to a stream
of data). The messages sent by the client, usually a Web browser, are called requests and the
messages sent by the server as an answer are called responses.
Designed in the early 1990s, HTTP is an extensible protocol which has evolved over time. It
is an application layer protocol that is sent over TCP, or over a TLS -encrypted TCP
connection, though any reliable transport protocol could theoretically be used. Due to its
extensibility, it is used to not only fetch hypertext documents, but also images and videos or
to post content to servers, like with HTML form results. HTTP can also be used to fetch parts
of documents to update Web pages on demand.

Working of HTTP
HTTP works entirely through HTTP messages. There are two types of HTTP messages:
Request: These are messages sent by the client to the server to trigger an action
Response: These are messages sent by the server to the client in response to the request
message
We can see that exchanging these messages in a request/response cycle enables data exchange
between a client and server.

11
Figure 2 below illustrates the outline of a typical HTTP message. It's divided into three fields:
start line, headers, and body. However, keep in mind that the request and response messages
have a few key differences in the content that go into each of these fields that will be
discussed in their respective sections.

Figure 2: A typical HTTP message


HTTP request messages
Figure 3 depicts the structure of a typical HTTP request message and the data it contains in its
fields.
Figure 3: An HTTP request message
Start line
As shown in Figure 3, the start line for the request messages contains the following:
HTTP method

12
The HTTP method is a command that tells the server what type of request the client is
making.
There are multiple methods, namely the following:
GET
POST
PUT
PATCH
DELETE
Request target
The request target, which is most often a URL, contains the location of the resource
corresponding to the request message. For example, the request-target in a GET message
would include the URL for a file the client wants from the server.
HTTP response messages don't contain a request-target as they already contain the client's
requested resource.
Advantages of HTTP

1. Addressing
HTTP uses advanced scheme of addressing. It assigns IP address with recognizable names so
that it can be identified easily in the World Wide Web. Compared to the standard procedure of
IP address with a series of numbers, using this the public can easily engage with the internet.
2. Flexibility
Whenever there are additional capabilities needed by an application, HTTP has the capability
to download extensions or plugins and display the relevant data. These can include Flash
players and Acrobat reader.
3. Security
In HTTP each files is downloaded from an independent connection and then gets closed. Due
to this no more than one single element of a webpage gets transferred. Therefore, the chance
of interception during transmission is minimized here.
4. Latency
Only when the connection is established, the handshaking process will take place in HTTP.
Hence, there will be no handshaking procedure following a request. This significantly
reduces latency in the connection.
5. Accessibility

13
When the page is loaded for the first time, all of the HTTP pages gets stored inside the
internet caches known as the page cache. Therefore, once the page is visited again, the
content is loaded quickly.

Disadvantages of HTTP

1. Data Integrity
Since there are no any encryption methods used in HTTP, there are chances of someone
altering the content. That is the reason why HTTP is considered to be an insecure method
prone to data integrity.
2. Data Privacy
Privacy is another problem faced in a HTTP connection. If any hacker manages to intercept
the request they can view all the content present in the web page. Besides that they can also
gather confidential informations such as the username and the password.
3. Server Availability
Even if HTTP receives all the data that it needs, clients does not take measures to close the
connection. Therefore, during this time period, server will not be present.
4. Administrative Overhead
For transmitting a web page, a HTTP needs to create multiple connections. This causes
administrative overhead in the connection.
5. IOT Device Support
HTTP uses more number of system resources which leads to more power consumption. Since
IoT device today contain wireless sensor networks, it is not suitable to use HTTP.
4. File Transfer Protocol (FTP)
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer
of computer files from a server to a client on a computer network. FTP is built on a client–
server model architecture using separate control and data connections between the client and
the server. FTP users may authenticate themselves with a plain-text sign-in protocol,
normally in the form of a username and password, but can connect anonymously if the server
is configured to allow it. For secure transmission that protects the username and password,
and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH
File Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating
systems had graphical user interfaces, and are still shipped with most Windows, Unix,
and Linux operating systems. Many dedicated FTP clients and automation utilities have since
been developed for desktops, servers, mobile devices, and hardware, and FTP has been
incorporated into productivity applications such as HTML editors and file managers.

14
An FTP client used to be commonly integrated in web browsers, where file servers are
browsed with the URI prefix "ftp: //". In 2021, FTP support was dropped by Google Chrome
and Firefox.

Working of FTP protocol


FTP may run in active or passive mode, which determines how the data connection is
established. (This sense of "mode" is different from that of the MODE command in the FTP
protocol.)
In active mode, the client starts listening for incoming data connections from the server on
port M. It sends the FTP command PORT M to inform the server on which port it is listening.
The server then initiates a data channel to the client from its port 20, the FTP server data port.
In situations where the client is behind a firewall and unable to accept incoming TCP
connections, passive mode may be used. In this mode, the client uses the control connection
to send a PASV command to the server and then receives a server IP address and server port
number from the server which the client then uses to open a data connection from an arbitrary
client port to the server IP address and server port number received.

Both modes were updated in September 1998 to support IPv6. Further changes were
introduced to the passive mode at that time, updating it to extended passive mode.
The server responds over the control connection with three-digit status codes in ASCII with
an optional text message. For example, "200" (or "200 OK") means that the last command
was successful. The numbers represent the code for the response and the optional text
represents a human-readable explanation or request (e.g. <Need account for storing file>).An
ongoing transfer of file data over the data connection can be aborted using an interrupt
message sent over the control connection.

15
FTP needs two ports (one for sending and one for receiving) because it was originally
designed to operate on top of Network Control Protocol (NCP), which was a simplex
protocol that utilized two port addresses, establishing two connections, for two-way
communications. An odd and an even port were reserved for each application
layer application or protocol. The standardization of TCP and UDP reduced the need for the
use of two simplex ports for each application down to one duplex port, but the FTP protocol
was never altered to only use one port, and continued using two for backwards compatibility.
Advantages of FTP protocol
1. FTP is Capable of Large File Transfers
For many companies, your file transfer needs go beyond sending a single Microsoft Word
document at a time. You might need to send hundreds of gigabytes of data all at once. FTP
easily facilitates those large transfers, and you benefit from an increased rate of file transfers,
as well.
2. Your Workflow is improved
Using FTP allows you to transfer multiple directories at one time. If you regularly transfer
files, you know how advantageous this feature can be. Instead of sending single files or even
single directories at a time, you can send numerous directories all at once. You’re able to
continue working while transfers are completed, and you can conduct these transfers faster.
3. Transfers can be resumed
If your file transfer is interrupted, you don’t have to worry about losing progress. With FTP,
you can resume an interrupted file transfer if your connection is lost. Pick up where you left
off without restarting the transfer from the beginning.
4. Transfers can be scheduled
Are you tired of interrupting your workday to transfer a large amount of data? Maybe you
don’t have time to sit and wait as these transfers take place. With top FTP solutions, you can
schedule transfers for times with minimal impact to your workflow, like overnight or on the
weekend. Your productivity isn’t impacted, and these transfers are automated for your
convenience.
5. Recover lost data
Top FTP providers make sure that data is never lost, even when unexpected events happen.
With disaster recovery, your files are regularly and automatically backed up, so if there’s a
flood, fire, or power outage, you don’t have to worry about losing data.
Disadvantages of FTP protocol
1. FTP Lacks Security
FTP is inherently a non-secure way to transfer data. When a file is sent using this protocol,
the data, username, and password are all shared in plain text, which means a hacker can
access this information with little to no effort. For data to be secure, you need to use
an upgraded version of FTP like FTPS or SFTP.

16
2. Not All Vendors Are Created Equal
To solve the problem of security vulnerabilities, businesses turn to hosted FTP
solutions managed by vendors. Unfortunately, not all vendors stand up to the test of needed
security, making it a challenge to choose the right one. Each competitor offers their own set
of features, and many lack the features you actually need like access controls, security,
usability, pricing options, etc.
3. Encryption isn’t a given
While you can find a vendor that offers data encryption, there are many who fall short. FTP
alone doesn’t provide any encryption, which is why transferred data is so easy to intercept.
And, when you’re looking for a FTP provider, you’ll notice that encryption isn’t always
offered or enforced. For businesses using sensitive data like card payment data or ePHI
(electronic protected health information), encryption isn’t just nice to have for your FTP
solution – it’s essential.
4. Compliance is an Issue
You should also be concerned with compliance when using FTP to send files. FTP on its own
or using a FTP vendor with inadequate security could leave your business at risk of
noncompliance fines. If compliance regulations like HIPAA, ITAR, PCI-DSS, SOX, or
GLBA apply to your company, you might struggle to find an FTP solution that helps you stay
compliant. A lack of encryption plays a big role in noncompliance and its imperative you find
a solution that meets your compliance needs.
5. It’s Difficult to Monitor Activity
Before you partner with an FTP vendor, you need to think about reporting requirements for
your company. With many FTP solutions, you’ll face an inability to track or inconsistency in
tracking what has been uploaded on the remote system. So, if files are mishandled or a data
breach occurs, you may struggle to track the source of the problem. Numerous FTP options
lack the access controls needed to ensure your employees align with file sharing best
practices.
4. Simple Mail Transfer Protocol (SMTP)

SMTP is a protocol for sending and receiving email. It enables the transfer of email messages
from a client to a server or between servers. SMTP is essential for email communication,
ensuring that messages are delivered reliably and in the correct format.

17
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving
email. SMTP is used most commonly by email clients, including Gmail, Outlook, Apple Mail
and Yahoo Mail.
SMTP can send and receive email, but email clients typically use a program with SMTP for
sending email. Because SMTP is limited in its ability to queue messages at the receiving end,
it's usually used with either Post Office Protocol 3 (POP3) or Internet Message Access
Protocol (IMAP), which lets the user save messages in a server mailbox and download them
periodically from a server. SMTP is typically limited to and relied on to send messages from
a sender to a recipient.
Working of SMTP
An SMTP session begins when the client opens a Transmission Control Protocol connection
(TCP connection, sometimes called TCP/IP) to the SMTP server. The server responds with an
opening message, expressed with code 250. This process is often called an SMTP handshake.
The client then sends a HELO command (EHLO for ESMTP) and identifies itself. It often
follows up the command with the domain name or IP address. In non-technical words, the
client says, “Hello, my name is John the Client, I’m sending an email from gmail.com, and
my IP is 192.0.2.0”. The server will respond with code 250 again.

After that, the email transfer stage will begin. Email contents will be transferred step-by-step
with MAIL FROM (john@gmail.com), RCPT TO (oliver@gmail.com), and DATA (‘Hey,

18
how have you been?’) commands. If the server accepts the transaction, the client will transfer
email headers. It’s necessary to use an end-of-line indicator (period ‘.’) once everything has
been transmitted.
Types of SMTP

Originating SMTP:
Is the first system that interacts with the internet as it introduces mail.

Delivery SMTP:
Is the system that receives emails from the internet and delivers them to the recipients.
Relay SMTP:
Relays emails between SMTP servers or MTAs (more on transfer agent meaning below)
without modifying the message in any way.
Gateway SMTP:
Or SMTP gateway also transfers emails between different servers but, unlike SMTP relay, it’s
allowed to transform the message if needed. SMTP gateways are usually firewalls that
rewrite addresses or intermediary SMTP servers.

19
The server will respond with code 250 if the transaction is successful. The client will initiate
the termination of the SMTP connection with the QUIT command, and the server will close
the transmission channel with code 221.
This is, of course, a simplified example without an SMTP relay, forwarding, gateways, or
error codes. For more information on these, please refer to RFC 5321.

Advantages of SMTP
It is not necessary to have an online connection:
Because the whole process is carried out from the email interface available on the computer.
However, at the moment of sending said emails, it is essential to have Internet access. In
general, what it avoids is to work with the messaging editor of the email marketing software.
It is possible to have statistics:
Statistics are essential to assess how good a job is being done when carrying out email
marketing campaigns, and with SMTP email there are none. However, when linked to the
Mailrelay software, you will be able to obtain interesting data to advance in this important
marketing task. You will be able to observe values such as click-through rate and open rate.

20
Synchronization with the CRM used is allowed:
This is a great advantage for very large companies that need to have an email system
connected to the CRM. Managing the configuration of the email system on each computer
can be very tedious, but with the link to the Mailrelay SMTP system it can be done on all
computers at once and be active at all the access points you want.
Disadvantages of SMTP
Professional editing:
Specialized email marketing software, such as Mailrelay, has a very powerful email editor
that can be used by dragging and dropping to obtain a professional design. If you do not work
from your online account, you will not be able to enjoy this benefit.
It is not secure:
Although it works with a multistep protocol to activate, the SMTP is easy to hack and make
fraudulent mailings that do not correspond to the values and objectives pursued by our
business. The worst thing is that they will have access to the complete list of our business
subscribers because the system was previously enabled.
Limitations:
The number of emails that can be sent by hosting are generally more limited than the large
number offered by a good email marketing software, as is the case of Mailrelay. Only in its
free account, it supports up to 80 thousand emails available to send per month, which is more
than enough for any business.

4. Simple Mail Transfer Protocol (SMTP)


SMTP is a protocol for sending and receiving email. It enables the transfer of email messages
from a client to a server or between servers. SMTP is essential for email communication,
ensuring that messages are delivered reliably and in the correct format.
5. Post Office Protocol (POP) and Internet Message Access Protocol (IMAP)
POP and IMAP are protocols used by email clients to retrieve messages from a server. POP
allows downloading messages to a local device, while IMAP maintains messages on the
server, enabling access from multiple devices. These protocols facilitate efficient email
management.
6. File Transfer Protocol (FTP)
FTP is a protocol designed for transferring files between computers. It allows users to upload,
download, and manipulate files on remote servers. FTP is often used for website maintenance
and content updates.
7. Simple Network Management Protocol (SNMP)
SNMP is a protocol used for managing and monitoring network devices, such as routers,
switches, and servers. It enables administrators to gather information about device
performance, status, and potential issues.

21
8. Domain Name System (DNS)
DNS is a protocol that translates human-readable domain names into IP addresses. It plays a
vital role in web browsing by helping user’s access websites using intuitive domain names
rather than numerical IP addresses.
9. Dynamic Host Configuration Protocol (DHCP)
DHCP is a protocol that automates the process of assigning IP addresses to devices on a
network. It ensures efficient IP address management and simplifies network configuration.
10. Secure Shell (SSH)
SSH is a protocol that provides secure, encrypted communication between devices over an
insecure network. It’s commonly used for remote login and executing commands on remote
servers.
11. Border Gateway Protocol (BGP)
BGP is a protocol used to exchange routing information between autonomous systems on the
Internet. It plays a crucial role in ensuring efficient and optimal data routing across complex
networks.
12. VoIP Protocols (SIP, RTP, RTCP)
VoIP (Voice over Internet Protocol) protocols, such as SIP (Session Initiation Protocol), RTP
(Real-Time Transport Protocol), and RTCP (Real-Time Control Protocol), enable voice and
video communication over IP networks. These protocols are the backbone of modern voice
and video conferencing applications.
13. Wireless Protocols (Wi-Fi, Bluetooth, Zig bee)
Wireless protocols like Wi-Fi, Bluetooth, and Zig bee enable wireless communication
between devices. Wi-Fi is used for high-speed Internet connectivity, Bluetooth for short-
range device connections, and Zig bee for home automation and sensor networks.

22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy