Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Networking protocols are the rules that make every digital interaction possible, from loading a webpage to sending an email to securely logging into a remote server. In Information Systems, you're tested on more than just protocol names; you need to understand how data moves across networks, what security mechanisms protect that data, and why certain protocols exist for specific tasks. These concepts connect directly to system architecture, cybersecurity, and the infrastructure decisions that organizations make every day.
The protocols covered here demonstrate core principles like layered communication, encryption and authentication, address resolution, and client-server interactions. When you encounter exam questions about network troubleshooting, security vulnerabilities, or system design, you'll need to know which protocol handles what and why. Don't just memorize acronyms; understand what problem each protocol solves and how they work together in the networking stack.
These foundational protocols form the backbone of all internet communication. Every other protocol depends on these working correctly.
TCP/IP is the fundamental protocol suite that defines how all data travels across the internet. It's actually two protocols working together at different layers.
Think of IP as writing the address on an envelope and TCP as the tracking system that confirms delivery and resends lost packages.
DNS translates human-readable domain names into the numeric IP addresses that computers actually use. When you type "google.com," a DNS server resolves it to something like 142.250.80.46. Without DNS, you'd need to memorize numerical addresses for every website.
DNS lookups happen in milliseconds, but the process involves a chain of queries: your device checks its local cache first, then asks a recursive resolver, which may query root servers, TLD servers, and authoritative nameservers to find the answer.
DHCP automatically assigns network configuration to devices when they join a network. Instead of manually typing in an IP address, subnet mask, default gateway, and DNS server, a device simply broadcasts a request and the DHCP server handles everything.
Compare: DNS vs. DHCP both involve IP addresses, but they solve different problems. DNS resolves names to existing addresses while DHCP assigns new addresses to devices. If a question asks about "joining a network," think DHCP. If it asks about "finding a website," think DNS.
These protocols govern how browsers and servers exchange information. Understanding the difference between secure and insecure transmission is heavily tested.
HTTP defines the request-response cycle between web browsers and servers. Your browser sends a request (like GET to retrieve a page, or POST to submit a form), and the server responds with HTML, images, and other resources.
TLS is the encryption protocol that makes HTTPS secure. SSL was the original version, but it's been deprecated due to known vulnerabilities. Despite this, people still say "SSL" out of habit, and "SSL/TLS" appears frequently in documentation.
Here's how a TLS handshake works at a high level:
TLS isn't limited to web browsing. It secures email, VPN connections, and any application that needs encrypted transmission.
Compare: HTTP vs. HTTPS have identical functionality for transferring web content, but HTTPS wraps everything in TLS encryption. Any question about protecting data in transit or preventing man-in-the-middle attacks points to HTTPS/TLS.
Email relies on multiple protocols working together: one for sending, others for receiving. Know which direction each protocol handles.
SMTP handles outgoing mail only. When you hit "send," SMTP routes your message from your mail client to the recipient's mail server. Messages often pass through multiple SMTP servers (called relays) before reaching the destination.
Modern SMTP implementations require authentication to prevent spam. Without it, anyone could forge a sender address and relay messages through open servers.
POP3 downloads emails to a single device and typically removes them from the server afterward. This frees up server storage, but it means your email only exists on that one device.
IMAP keeps emails stored on the server and lets you view and manage them remotely. Read an email on your phone, and it shows as read on your laptop. Delete it anywhere, and it's gone everywhere.
IMAP also supports server-side searching, folder organization, and selective downloading (you can download just the headers and pull attachments only when needed). This is why nearly every modern email service defaults to IMAP.
Compare: POP3 vs. IMAP both retrieve email, but POP3 downloads and deletes while IMAP syncs and stores server-side. If a question mentions "accessing email from multiple devices," IMAP is the answer.
These protocols handle moving files and managing systems remotely. Security distinctions are critical here.
FTP transfers files between a client and a server, supporting both uploads and downloads. It's been widely used for website maintenance and bulk file transfers.
The big drawback: FTP transmits everything unencrypted by default, including usernames and passwords. This makes it a security risk on any untrusted network. For sensitive transfers, organizations use SFTP (SSH File Transfer Protocol) or FTPS (FTP over TLS) instead.
SSH provides encrypted remote access to servers and network devices. Administrators use it to run commands, configure systems, and troubleshoot problems over untrusted networks, all within an encrypted tunnel.
SSH also serves as a foundation for SFTP, which tunnels file transfers through an encrypted SSH session. This means SSH solves two problems at once: remote management and secure file transfer.
Compare: FTP vs. SSH/SFTP both transfer files, but FTP sends everything in plaintext while SFTP encrypts the entire session. Any exam question about secure file transfer or protecting credentials during transfer should point you toward SFTP.
| Concept | Best Examples |
|---|---|
| Data transmission foundation | TCP/IP |
| Name-to-address resolution | DNS |
| Automatic network configuration | DHCP |
| Web page delivery | HTTP, HTTPS |
| Encryption in transit | TLS/SSL, HTTPS, SSH |
| Sending email | SMTP |
| Receiving email | POP3, IMAP |
| File transfer | FTP, SFTP |
| Remote server management | SSH |
Which two protocols both involve IP addresses but serve completely different functions: one for naming and one for assignment?
A user complains that emails they delete on their phone still appear on their laptop. Which protocol is likely configured, and what should replace it?
Compare and contrast HTTP and HTTPS: what do they share functionally, and what critical security feature separates them?
If an FRQ asks you to design a system where administrators securely manage servers remotely and transfer configuration files, which protocol addresses both needs?
Why would an organization choose IMAP over POP3 for employees who work from multiple devices, and what tradeoff might they face with server storage?