upgrade
upgrade

Key Network Protocols

Study smarter with Fiveable

Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.

Get Started

Why This Matters

Network protocols are the invisible rules that make the internet work—they determine how devices find each other, how data travels reliably across the globe, and how your information stays secure. On the AP exam, you're being tested on your understanding of layered architecture, reliability vs. speed tradeoffs, and how abstraction enables complex systems to function. These protocols demonstrate core computer science principles like error handling, addressing, and the client-server model.

Don't just memorize what each protocol does—know why it exists and what problem it solves. When you understand that TCP sacrifices speed for reliability while UDP does the opposite, you're thinking like a computer scientist. That comparative reasoning is exactly what FRQs reward, so focus on the underlying mechanisms and tradeoffs, not just definitions.


Foundational Transport & Addressing Protocols

These protocols form the backbone of all internet communication. They handle the fundamental challenges of getting data from point A to point B—addressing, routing, and ensuring data arrives correctly.

TCP (Transmission Control Protocol)

  • Connection-oriented protocol—establishes a reliable channel through a three-way handshake before any data is sent
  • Guarantees delivery and order through error-checking, acknowledgments, and retransmission of lost packets
  • Segments large messages into smaller packets for transmission, then reassembles them at the destination

UDP (User Datagram Protocol)

  • Connectionless protocol—sends data immediately without establishing a connection first, enabling low-latency transmission
  • No delivery guarantees for order, arrival, or error correction, making it faster but less reliable than TCP
  • Ideal for real-time applications like video streaming, VoIP, and online gaming where speed matters more than perfect accuracy

IP (Internet Protocol)

  • Handles addressing and routing—assigns unique IP addresses so devices can identify and locate each other across networks
  • Operates at the network layer, determining the path packets take through interconnected networks
  • Supports IPv4 and IPv6 addressing schemes, with IPv6's 128-bit addresses solving IPv4's address exhaustion problem

Compare: TCP vs. UDP—both are transport-layer protocols that work on top of IP, but TCP prioritizes reliability (guaranteed delivery, ordering) while UDP prioritizes speed (no handshake, no error correction). If an FRQ asks when you'd choose one over the other, think: "Does this application need every packet, or does it need them fast?"


Web Communication Protocols

These protocols power your everyday browsing experience. They define how web browsers request content from servers and how that content gets delivered—with or without encryption.

HTTP (Hypertext Transfer Protocol)

  • Request-response model—clients (browsers) send requests, servers return resources like HTML, images, or data
  • Stateless protocol meaning each request is independent; the server doesn't remember previous interactions
  • Foundation of the World Wide Web, enabling hypertext document transfer and the links that connect pages

HTTPS (HTTP Secure)

  • HTTP with encryption—uses SSL/TLS to encrypt data during transmission, preventing eavesdropping
  • Protects data integrity and confidentiality, essential for passwords, payment info, and sensitive data
  • Verified by certificates that authenticate the server's identity, indicated by the padlock icon in browsers

Compare: HTTP vs. HTTPS—identical request-response functionality, but HTTPS wraps everything in encryption. The "S" stands for secure, and it's now the default standard. Know that HTTPS doesn't change what HTTP does—it adds a security layer on top.


Name Resolution & Addressing

Before any communication happens, devices need to find each other. DNS solves the problem of humans preferring words while computers need numbers.

DNS (Domain Name System)

  • Translates domain names to IP addresses—converts human-readable names like www.example.com into numerical addresses computers use
  • Distributed database architecture allows scalable, efficient lookups across hierarchical servers worldwide
  • Multiple record types including A records (IPv4 addresses), AAAA records (IPv6), MX records (mail servers), and CNAME records (aliases)

Compare: DNS functions like a phone book for the internet—you look up a name, you get a number. This is a perfect example of abstraction: users never need to know IP addresses because DNS handles the translation automatically.


Email Protocols

Email requires multiple protocols working together—one for sending, others for receiving. The key distinction is between pushing mail out (SMTP) and pulling mail in (POP3/IMAP).

SMTP (Simple Mail Transfer Protocol)

  • Sending and relaying protocol—handles outbound email from your client to the server and between mail servers
  • Uses TCP port 25 (or 587 for submission) to ensure reliable message delivery
  • Supports authentication to verify sender identity and prevent spam or unauthorized use

POP3 (Post Office Protocol version 3)

  • Downloads emails to local device—retrieves messages from the server and typically deletes them afterward
  • Designed for offline access on a single device; once downloaded, emails live on your computer
  • Simple but limited—lacks folder synchronization and multi-device support

IMAP (Internet Message Access Protocol)

  • Keeps emails on the server—allows access from multiple devices while maintaining synchronization
  • Supports folder management and server-side searching, enabling organized mailbox structures
  • Better for modern use where users check email from phones, laptops, and tablets

Compare: POP3 vs. IMAP—both retrieve email, but POP3 downloads and deletes (single device, offline focus) while IMAP syncs and stores (multiple devices, always connected). FRQ tip: if asked about accessing email from multiple devices, IMAP is your answer.


File Transfer Protocols

When you need to move files between systems, specialized protocols handle the job. FTP predates the web and remains useful for bulk file transfers.

FTP (File Transfer Protocol)

  • Dedicated file transfer—designed specifically for uploading and downloading files between client and server
  • Supports authentication for secure access, though also allows anonymous connections for public files
  • Two connection modes—active mode (server initiates data connection) and passive mode (client initiates both connections, better for firewalls)

Compare: FTP vs. HTTP—both can transfer files, but FTP is optimized for it with features like resume-interrupted-downloads and directory browsing. HTTP is better for web content delivery; FTP is better for bulk file management.


Quick Reference Table

ConceptBest Examples
Reliable data deliveryTCP (guarantees order and arrival)
Fast, low-latency transmissionUDP (no handshake, no guarantees)
Device addressing and routingIP (IPv4, IPv6 addresses)
Web content transferHTTP, HTTPS
Encryption and securityHTTPS (SSL/TLS), SMTP authentication
Name-to-address translationDNS
Sending emailSMTP
Receiving email (single device)POP3
Receiving email (multi-device sync)IMAP
Bulk file transferFTP

Self-Check Questions

  1. Which two protocols operate at the transport layer, and what tradeoff distinguishes them from each other?

  2. A video call application needs to prioritize minimal delay over perfect accuracy. Which protocol should it use, and why would TCP be a poor choice?

  3. Compare and contrast POP3 and IMAP: what problem does each solve, and which would you recommend for someone who uses both a phone and laptop for email?

  4. Explain how DNS demonstrates the principle of abstraction. What would internet use look like without it?

  5. An FRQ asks you to describe how a secure online purchase works. Which protocols are involved when you type a URL, connect to a store, and submit payment information? Trace the path from domain name to encrypted transaction.