Common Network Protocols – Complete Overview
1. What Are Network Protocols?
A network protocol is a standardised set of rules that defines how data is formatted, transmitted, received, and processed between devices on a network. Without protocols, different devices and operating systems from different vendors would be unable to communicate — a Cisco router, a Windows PC, and an iPhone all interoperate because they implement the same open protocol standards.
Protocols are organised in a layered stack (the OSI or TCP/IP model). Higher-layer protocols rely on lower-layer protocols to carry their data:
Application (L7): HTTP FTP SMTP DNS DHCP SSH SNMP
| |
Transport (L4): TCP UDP
| |
Network (L3): IP
|
Data Link (L2): Ethernet / Wi-Fi
|
Physical (L1): Cables / Radio waves
Related pages: OSI Model | TCP/IP Model | Common Port Numbers | FTP | SSH | SNMP Overview | SNMP Versions | NTP Overview | OSPF Overview | EIGRP Overview | RIP Concepts | How DNS Works | How DHCP Works
2. Master Protocol Reference Table
| Protocol | Full Name | OSI Layer | Transport | Port(s) | Primary Purpose |
|---|---|---|---|---|---|
| TCP | Transmission Control Protocol | 4 – Transport | — | Varies | Reliable, ordered, connection-oriented delivery |
| UDP | User Datagram Protocol | 4 – Transport | — | Varies | Fast, connectionless, best-effort delivery |
| IP | Internet Protocol (v4/v6) | 3 – Network | — | — | Logical addressing and routing between networks |
| ICMP | Internet Control Message Protocol | 3 – Network | — | — | Diagnostics (ping) and error reporting (TTL exceeded) |
| ARP | Address Resolution Protocol | 2/3 – Data Link/Network | — | — | Resolves IP addresses to MAC addresses on a LAN |
| DNS | Domain Name System | 7 – Application | UDP (mainly) / TCP | 53 | Resolves hostnames to IP addresses |
| DHCP | Dynamic Host Configuration Protocol | 7 – Application | UDP | 67 (server) / 68 (client) | Automatically assigns IP addresses and network config |
| HTTP | Hypertext Transfer Protocol | 7 – Application | TCP | 80 | Unencrypted web page delivery |
| HTTPS | HTTP Secure (HTTP over TLS) | 7 – Application | TCP | 443 | Encrypted web page delivery |
| FTP | File Transfer Protocol | 7 – Application | TCP | 20 (data) / 21 (control) | File transfer between client and server |
| TFTP | Trivial File Transfer Protocol | 7 – Application | UDP | 69 | Simple, lightweight file transfer (Cisco IOS upgrades) |
| SMTP | Simple Mail Transfer Protocol | 7 – Application | TCP | 25 / 587 (TLS) | Sending email from client to server or server to server |
| IMAP | Internet Message Access Protocol | 7 – Application | TCP | 143 / 993 (TLS) | Retrieving email — messages stay on server |
| POP3 | Post Office Protocol v3 | 7 – Application | TCP | 110 / 995 (TLS) | Retrieving email — messages downloaded and deleted from server |
| SSH | Secure Shell | 7 – Application | TCP | 22 | Encrypted remote login, command execution, file transfer |
| Telnet | Teletype Network | 7 – Application | TCP | 23 | Unencrypted remote login — legacy, insecure |
| SNMP | Simple Network Management Protocol | 7 – Application | UDP | 161 (queries) / 162 (traps) | Monitoring and managing network devices |
| NTP | Network Time Protocol | 7 – Application | UDP | 123 | Synchronising clocks across network devices |
| TLS/SSL | Transport Layer Security / Secure Sockets Layer | 6 – Presentation | TCP | Varies (443, 993, 995…) | Encryption for HTTPS, SMTPS, FTPS, IMAPS |
| OSPF | Open Shortest Path First | 3 – Network | IP (protocol 89) | — | Link-state IGP routing protocol |
| EIGRP | Enhanced Interior Gateway Routing Protocol | 3 – Network | IP (protocol 88) | — | Cisco hybrid IGP routing protocol |
| BGP | Border Gateway Protocol | 3 – Network | TCP | 179 | Exterior routing — connects ISPs and autonomous systems |
| RIP | Routing Information Protocol | 3 – Network | UDP | 520 | Simple distance-vector IGP for small networks |
3. Transmission Control Protocol (TCP)
TCP is the reliable workhorse of the internet. It provides ordered, error-checked delivery of a stream of bytes between applications, guaranteeing that data arrives completely and in the correct sequence — even over unreliable networks.
TCP Three-Way Handshake
Client Server
| |
|---- SYN (seq=100) ---------------->| Step 1: Client initiates connection
| |
|<--- SYN-ACK (seq=200, ack=101) ----| Step 2: Server acknowledges + sends its seq
| |
|---- ACK (ack=201) ---------------->| Step 3: Client acknowledges — connection open
| |
|==== Data exchange begins ==========|
| Feature | Detail |
|---|---|
| Connection | Connection-oriented — 3-way handshake required before data transfer |
| Reliability | Sequence numbers + ACKs ensure every byte arrives; retransmits lost segments |
| Ordering | Receiver reassembles segments in correct order using sequence numbers |
| Flow control | Sliding window — receiver advertises how much buffer space it has |
| Congestion control | Slow start / congestion avoidance — backs off when network is congested |
| Port numbers | Source (ephemeral, 49152–65535) + Destination (well-known, e.g. 80, 443) |
| Overhead | Higher than UDP — connection setup, ACKs, and retransmissions add latency |
Use cases: Web browsing (HTTP/HTTPS), email (SMTP/IMAP/POP3), FTP, SSH, database connections — any application where data completeness is critical.
4. User Datagram Protocol (UDP)
UDP provides a minimal, connectionless delivery service. It sends datagrams with no handshake, no acknowledgement, and no retransmission. What it sacrifices in reliability it gains in speed and low overhead — making it ideal for real-time applications.
| Feature | Detail |
|---|---|
| Connection | Connectionless — no handshake; data sent immediately |
| Reliability | No guarantees — packets may be lost, duplicated, or arrive out of order |
| Speed | Very fast — minimal header (8 bytes vs TCP's 20+ bytes), no handshake delay |
| Overhead | Very low — no ACKs, no connection state to maintain |
| Error handling | Basic checksum only — if a packet is lost, the application must decide what to do |
Use cases: VoIP calls, video streaming (YouTube, Netflix), online gaming, DNS queries, DHCP, SNMP, TFTP — applications where a dropped packet is better skipped than waited for.
TCP vs UDP — Head-to-Head Comparison
| Feature | TCP | UDP |
|---|---|---|
| Connection type | Connection-oriented (3-way handshake) | Connectionless |
| Reliability | Guaranteed delivery with retransmission | Best-effort — no retransmission |
| Ordering | Segments reassembled in order | No ordering — arrives as sent |
| Speed | Slower — overhead from handshake and ACKs | Faster — minimal overhead |
| Header size | 20–60 bytes | 8 bytes (fixed) |
| Flow control | Yes (sliding window) | No |
| Use case | Web, email, file transfer, SSH | VoIP, streaming, DNS, gaming, DHCP |
5. Internet Protocol (IP) and ARP
Internet Protocol (IP)
IP is the addressing and routing protocol of the internet — Layer 3. Every device on a network is assigned a unique IP address, and routers use these addresses to forward packets to the correct destination network.
| Feature | IPv4 | IPv6 |
|---|---|---|
| Address length | 32 bits (e.g., 192.168.1.10) | 128 bits (e.g., 2001:db8::1) |
| Address space | ~4.3 billion addresses (exhausted) | ~340 undecillion addresses |
| Header size | 20 bytes (minimum) | 40 bytes (fixed) |
| Fragmentation | Performed by routers | Only by source host (MTU discovery) |
| Broadcast | Yes (limited and directed) | No broadcast — uses multicast/anycast |
| Configuration | Manual or DHCP | Manual, DHCPv6, or SLAAC (auto) |
IP is connectionless and best-effort — it makes no delivery guarantees. Reliability is the job of TCP above it.
Address Resolution Protocol (ARP)
ARP bridges the gap between Layer 3 (IP) and Layer 2 (MAC) addressing. Before a host can send an Ethernet frame to another device on the same LAN, it must know the destination's MAC address. ARP resolves this by broadcasting "Who has IP 192.168.1.20? Tell 192.168.1.10."
Host A (192.168.1.10) Host B (192.168.1.20)
| |
|-- ARP Request (broadcast) --->| "Who has 192.168.1.20?"
| |
|<-- ARP Reply (unicast) --------| "I have it! My MAC is AA:BB:CC:11:22:33"
| |
| (A caches B's MAC in ARP table, sends frame directly)
View the ARP cache: arp -a (Windows/Linux) | show ip arp (Cisco IOS)
6. Domain Name System (DNS)
DNS is the internet's phone book — it translates human-readable hostnames (like netstuts.com) into the IP addresses that routers need to deliver packets. Without DNS, users would need to memorise numeric IP addresses for every website.
| Attribute | Detail |
|---|---|
| Port | UDP 53 (queries under 512 bytes) / TCP 53 (large responses, zone transfers) |
| OSI layer | 7 — Application |
| Query types | Recursive (resolver does all the work) / Iterative (each server replies with a referral) |
Common DNS Record Types
| Record Type | Purpose | Example |
|---|---|---|
| A | Maps hostname to IPv4 address | netstuts.com → 93.184.216.34 |
| AAAA | Maps hostname to IPv6 address | netstuts.com → 2606:2800::1 |
| CNAME | Alias — maps one hostname to another | www.netstuts.com → netstuts.com |
| MX | Mail server for a domain | netstuts.com → mail.netstuts.com |
| PTR | Reverse lookup — IP to hostname | 34.216.184.93.in-addr.arpa → netstuts.com |
| NS | Authoritative name server for a zone | netstuts.com → ns1.example-dns.com |
| TXT | Arbitrary text — used for SPF, DKIM, domain verification | "v=spf1 include:_spf.google.com ~all" |
See also: How DNS Works | DNS Record Types | nslookup | dig
7. Dynamic Host Configuration Protocol (DHCP)
DHCP automatically assigns IP addresses and network configuration to devices when they join a network — eliminating the need to manually configure every device. The process follows the DORA sequence:
Client DHCP Server
| |
|-- DISCOVER (broadcast) ----------->| "Is there a DHCP server? I need an IP!"
| |
|<-- OFFER (broadcast/unicast) ------| "I offer you 192.168.1.50 for 24 hours"
| |
|-- REQUEST (broadcast) ------------>| "I accept 192.168.1.50 from you"
| |
|<-- ACK (broadcast/unicast) --------| "Confirmed! 192.168.1.50 is yours"
| Attribute | Detail |
|---|---|
| Ports | UDP 67 (server receives client messages) / UDP 68 (client receives server messages) |
| What DHCP assigns | IP address, subnet mask, default gateway, DNS server(s), lease duration |
| Lease | IP address is temporary — client renews at 50% of lease time, rebinds at 87.5% |
| DHCP relay | ip helper-address on a router forwards DHCP broadcasts across subnets to a centralised server |
See also: How DHCP Works | DHCP Configuration | DHCP Relay
8. HTTP and HTTPS
HTTP (Hypertext Transfer Protocol) is the foundation of data communication on the web. It defines how browsers request resources (web pages, images, APIs) and how servers respond. HTTPS wraps HTTP inside a TLS (Transport Layer Security) session — encrypting all data exchanged, including credentials.
| Feature | HTTP | HTTPS |
|---|---|---|
| Port | 80 (TCP) | 443 (TCP) |
| Encryption | None — plaintext | TLS/SSL encryption — all data protected |
| Authentication | None from server | Server certificate validates server identity |
| Data integrity | No — data can be tampered in transit | Yes — TLS MACs detect tampering |
| Use | Legacy or internal non-sensitive traffic | All modern web traffic, especially anything with login or payments |
Common HTTP methods: GET (retrieve), POST (submit data), PUT (update), DELETE (remove). HTTP status codes: 200 OK, 301 Redirect, 404 Not Found, 500 Server Error.
See also: HTTP vs HTTPS
9. Email Protocols — SMTP, IMAP, POP3
Three different protocols handle different stages of email delivery:
| Protocol | Role | Port (Plain / TLS) | Key behaviour |
|---|---|---|---|
| SMTP | Sending — client to server AND server to server | 25 (server-to-server) / 587 (client submission) | Pushes email outbound. Always used for sending regardless of retrieval protocol. |
| IMAP | Receiving — client retrieves from server | 143 / 993 (TLS) | Messages remain on the server. Multiple devices stay synchronised. Folders managed on server. |
| POP3 | Receiving — client downloads from server | 110 / 995 (TLS) | Messages typically downloaded and deleted from server. No server-side sync between devices. |
See also: SMTP
10. File Transfer Protocol (FTP) and TFTP
FTP uses two TCP connections: a control connection (port 21) for commands and responses, and a data connection (port 20 in active mode, or a negotiated high port in passive mode) for actual file data. FTP sends credentials in plaintext — use SFTP (SSH File Transfer Protocol, port 22) or FTPS (FTP over TLS, port 990) in production.
| Protocol | Port(s) | Transport | Security | Use Case |
|---|---|---|---|---|
| FTP | 21 (control), 20 (data active) | TCP | None — plaintext | Legacy file transfers, web hosting workflows |
| SFTP | 22 | TCP (over SSH) | Full SSH encryption | Secure file transfer — preferred in production |
| FTPS | 990 (implicit TLS) | TCP | TLS encryption | FTP with TLS — used where SFTP is not available |
| TFTP | 69 | UDP | None | Cisco IOS firmware upgrades, PXE boot, simple transfers on trusted networks |
See also: FTP – Active vs Passive, Ports, Commands
11. Internet Control Message Protocol (ICMP)
ICMP is a Layer 3 diagnostic and error-reporting protocol built into IP. It carries no user data — only control messages. The two most important tools in networking (ping and traceroute) are built entirely on ICMP.
| ICMP Type | Message | Used By |
|---|---|---|
| Type 0 | Echo Reply | ping (response from destination) |
| Type 3 | Destination Unreachable | Router/host cannot deliver packet (various codes for host/port/network unreachable) |
| Type 5 | Redirect | Router tells host to use a better next-hop for a destination |
| Type 8 | Echo Request | ping (sent by source) |
| Type 11 | Time Exceeded | traceroute (TTL = 0 at a router — router reports back) |
| Type 12 | Parameter Problem | IP header error detected by router |
ICMP does not use TCP or UDP — it rides directly on top of IP (IP protocol number 1). Firewalls commonly filter ICMP, which is why ping or traceroute sometimes shows asterisks even when a path is working.
See also: Ping | Traceroute
12. SSH and Telnet
Both protocols provide remote CLI access to network devices, but they differ critically in security:
| Feature | SSH (Secure Shell) | Telnet |
|---|---|---|
| Port | TCP 22 | TCP 23 |
| Encryption | Full encryption — all data, credentials, commands | None — everything in plaintext |
| Authentication | Password, public key, or certificate | Password only (plaintext) |
| Security | Required for all production use | Never use on production networks |
| Use | Managing routers, switches, servers, Linux hosts | Legacy testing only; isolated labs |
On Cisco IOS, enforce SSH-only access on VTY lines: transport input ssh and ip ssh version 2.
See also: SSH – Full Guide | Telnet | Step-by-Step: SSH Configuration
13. SNMP and NTP
SNMP — Simple Network Management Protocol
SNMP allows network managers to monitor and manage routers, switches, servers, and printers from a centralised NMS (Network Management System). It operates over UDP — port 161 for queries, port 162 for traps (unsolicited alerts from devices).
| Version | Authentication | Encryption | Recommended? |
|---|---|---|---|
| SNMPv1 | Community string (plaintext) | None | No — legacy only |
| SNMPv2c | Community string (plaintext) | None | Only for non-critical internal use |
| SNMPv3 | Username + HMAC-SHA/MD5 | AES or DES | Yes — use in all production environments |
See also: SNMP Overview | SNMP Versions | SNMP Community Strings | SNMP Traps
NTP — Network Time Protocol
NTP synchronises clocks across all devices in a network to within milliseconds of a reference time source. Accurate time is critical for log correlation, certificate validity, Kerberos authentication, and network forensics.
| Attribute | Detail |
|---|---|
| Port | UDP 123 |
| Stratum | Stratum 0 = atomic clock / GPS. Stratum 1 = directly connected to stratum 0. Each hop adds 1. Stratum 16 = unsynchronised. |
| Cisco config | ntp server 216.239.35.0 — sync to a public NTP server |
| Verify | show ntp status / show ntp associations |
See also: NTP Overview | NTP Synchronisation | Step-by-Step: NTP Configuration
14. Routing Protocols
Routing protocols allow routers to dynamically learn about network topology and share routing information with each other — automatically building and maintaining routing tables without manual static route configuration.
Interior Gateway Protocols (IGP) — Within an Autonomous System
| Protocol | Type | Metric | Admin Distance | Convergence | Best For |
|---|---|---|---|---|---|
| RIP v2 | Distance-vector | Hop count (max 15) | 120 | Slow | Small, simple networks; lab environments |
| OSPF | Link-state | Cost (bandwidth-based) | 110 | Fast | Enterprise networks of any size; open standard |
| EIGRP | Advanced distance-vector (hybrid) | Composite (bandwidth + delay) | 90 (internal) | Very fast | Cisco-only networks; large enterprise |
Exterior Gateway Protocol (EGP) — Between Autonomous Systems
| Protocol | Type | Port | Use Case |
|---|---|---|---|
| BGP | Path-vector | TCP 179 | Internet routing between ISPs; connects enterprise to multiple ISPs (multihoming) |
See also: OSPF Configuration | EIGRP Configuration | RIP Configuration | Administrative Distance
15. TLS/SSL — The Encryption Layer
TLS (Transport Layer Security) is the cryptographic protocol that secures the majority of internet communications. When you see the padlock in your browser, TLS is running. TLS operates at OSI Layer 6 (Presentation) and negotiates encryption algorithms, authenticates the server via its certificate, and creates a symmetric session key for fast bulk encryption.
TLS wraps many plaintext protocols to create their secure variants:
| Plaintext Protocol | Secured Version | Port Change |
|---|---|---|
| HTTP (80) | HTTPS | 443 |
| SMTP (25) | SMTPS / SMTP+STARTTLS | 465 / 587 |
| IMAP (143) | IMAPS | 993 |
| POP3 (110) | POP3S | 995 |
| FTP (21) | FTPS | 990 (implicit) |
| LDAP (389) | LDAPS | 636 |