Network Protocols are a set of guidelines governing the exchange of information in a simple, dependable and secure way. Network protocols are formal standards and policies comprised of rules, methodology, and configurations that define communication between two or more devices over a network. To effectively send and receive information, devices on the two sides of a communication exchange must follow protocols.
- Network Time Protocol:
Network Time Protocol (NTP) is a protocol that synchronizes the clocks of computer systems over data networks. NTP was designed by David L. Mills. NTP permits network devices to synchronize their time settings with the NTP server. NTP is one of the most established internet protocols in current use.
- Domain Name System:
DNS resolves a Uniform Resource Locator or website address to the IP address of the site. When users type a web address into the address bar they rely on DNS servers to resolve the actual IP address of that destination. DNS translates domain names to IP addresses.
- Routing Information Protocol:
It constrains the number of hops permitted in a path on a network from the source device to the destination. The maximum number of hops permitted for RIP is fifteen. It is a routing protocol used to exchange routing information. It figures the best route based on hop count. It actualizes the split horizon, route poisoning and, holddown mechanisms.
- Dynamic Host Control Protocol:
Dynamic Host Control Protocol (DHCP) uses a server to allocate an IP address and other configuration information to network devices. As a result, the device is getting a permission slip from the DHCP server to use the network. DHCP enables users to send a request to the DHCP server whenever they connect to a network. The server recognizes by providing an IP address to the user. DHCP is also known as RFC 2131.
GeeksforGeeks has prepared a complete interview preparation course with premium videos, theory, practice problems, TA support and many more features. Please refer Placement 100 for details
- Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
- Traceroute in Network Layer
- Types of Network Topology
- Computer Network | Leaky bucket algorithm
- Program to determine class, Network and Host ID of an IPv4 address
- Network configuration and trouble shooting commands in Linux
- Types of Network Address Translation (NAT)
- Protocols in Application Layer
- HMAC Algorithm in Computer Network
- Introduction of Firewall in Computer Network
- Basic Network Attacks in Computer Network
- Circuit Switching in Computer Network
- Packet Switching and Delays in Computer Network
- Routing v/s Routed Protocols in Computer Network
- Collision Domain and Broadcast Domain in Computer Network
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.