Understanding Computer Network Protocols, Functions, and Types

Understanding Computer Network Protocols, Functions, and Types - Greetings all blog friends, did not expect to and finally active again blogging after a few days busy with many activities.

Understanding Computer Network Protocols, Functions, and Types

But because the admin just got a college assignment about computer networks, the admin moved to make a post about computer network protocols. here it is the admin explains the meaning of computer network protocols, functions, and types with what I know.

Definition of Protocol

A protocol is a rule or standard that regulates or allows the connection, communication, and transfer of data between two or more computer points, protocols can be applied to hardware, software, or a combination of both. At the lowest level, protocols define hardware connections.

Protocol functions

The function of the protocol is divided into 2 parts

1. General function

2. Special Function

General function

The function of the protocol in general is as a liaison in data or information communication. So that the data or information exchange process can run properly.

Special function

The special functions of the protocol are as follows:

Fragmentation and Re-assembly

Division of information sent into several data packets from the sender's side. if it has reached the recipient of the data packet it will be combined into a complete news packet.


Encapsulation is the process of sending data that is equipped with addresses, correction codes, and others.

Connectivity Control

Establishing a communication link in the form of sending data and terminating the link from sender to receiver.

Flow Control

The function of flow control is to regulate the flow of data from sender to receiver.

Error Control

The task is to control the occurrence of errors when data is sent.

Transmission Service

Its function is to provide data communication services related to data priority and security.

Types of protocols

Some types of protocols include the following:

Ethernet Protocol

PE is a protocol that is often used today, the access method used by Ethernet is called CSMA / CD (Carrier Sense Multiple Access / Collision Detection). It is a system where each computer waits for instructions through the cable before sending data or information through the network, if the network is not busy, then the computer will convey information or data.

But if another node has already sent a message over the cable, the computer will wait and try again after the route permits. Sometimes two computers send messages at the same time. If this happens, there will be a data collision.


TCP/IP is (short for Transmission Control Protocol/Internet Protocol) which is a data communication standard used by the internet community in the process of exchanging data from one computer to another in the internet network. TCP/IP is a two-layer program.

The higher layer is called the Transmission Control Protocol which is in charge of managing the assembly of messages or files into small packets that are transmitted over the Internet and received by the TCP layer which reassembles the packets into the original message.

The bottom layer is called the Internet Protocol which handles the address part of each packet so that it reaches the right destination. Each gateway computer on the network checks these addresses to see where to forward the message. Although some packets of the same message are routed differently than others, they will be reassembled at the destination.


UDP stands for User Datagram Protocol, is one of the TCP/IP transport layer protocols that can support unreliable, connectionless communication between hosts in a network using TCP/IP.

(connectionless) between hosts in a network that uses TCP/IP.

Domain Name System (DNS)

Domain Name System (DNS) is a distributed database system used for computer name lookup (name resolution) on networks that use TCP/IP (Transmission Control Protocol/Internet Protocol). DNS is commonly used in applications connected to the Internet such as web browsers or e-mail, where DNS helps map the hostname of a computer to an IP address.

Point-to-Point Protocol

Point-to-Point Protocol (often shortened to PPP) is a network packet encapsulation protocol that is widely used in wide area networks (WANs). It is an industry-standard that runs at the data-link layer and was developed in the early 1990s in response to problems with the Serial Line Internet Protocol (SLIP) protocol, which only supported static IP addressing to its clients.

Compared to its predecessor (SLIP), PPP is much improved, as it is faster, offers error correction, and dynamic session negotiation without user intervention. In addition, it also supports multiple network protocols simultaneously. PPP is defined in RFC 1661 and RFC 1662.

Serial Line Internet Protocol (SLIP)

Serial Line Internet Protocol is considered to be closely related to the following notions Abbreviated as SLIP. A protocol that allows the transfer of IP data over telephone lines. Another tool in SLIP is PPP which detects errors and configuration. This system requires a server computer to host it, and will gradually be replaced by the PPP standard which has a higher processing speed.


ICMP (Internet Control Message Protocol), the ICMP protocol has a different purpose from TCP and UDP in that ICMP is not used directly by the user's network application.


RTP stands for Real Time Protocol, RTP is designed to provide end-to-end network transport functions for applications that transmit data in real-time, such as audio and video data, via multicast network services or unicast services.


FTP stands for File Transfer Protocol, this type of protocol is often used to upload or download files, security is based on username and password, but sometimes anonymous login is also often allowed.


DHCP stands for Dynamic Host Configuration Protocol, if you get a cable connection using DHCP, it will get an IP from your ISP. So, this protocol serves to provide Internet Protocol (IP) automatically.


POP3 stands for Post Office Protocol version 3, which is a protocol used to retrieve emails from email servers. The POP3 protocol was created due to the design of the email system which requires an email server that holds email temporarily until it is retrieved by the rightful recipient.

The presence of this email server is due to the fact that only a small percentage of email recipient computers are constantly connected to the internet network.


IMAP (Message Access Protocol), is a standard protocol for accessing or retrieving e-mail from a server. IMAP allows the user to select e-mail messages to retrieve, create a folder on the server, search for specific e-mail messages, and delete existing e-mail messages.

SMTP (Simple Mail Transfer Protocol)

SMTP is a protocol commonly used for sending electronic mail or e-mail on the Internet. This protocol is used to send data from the electronic mail sender's computer to the recipient's electronic mail server.


HTTP stands for Hypertext Transfer Protocol, this protocol is often used to transfer web pages, previously many people used the Gopher protocol. However, Gopher only supports text, so the HTTP protocol has developed over time and is used by many people.


HTTPS is a secure version of HTTP, the communication protocol of the World Wide Web. It was invented by Netscape Communications Corporation to provide authentication and encrypted communication and use in electric commerce.

In addition to using plain text communication, HTTPS encodes session data using either SSL (Secure Socket Layer) protocol or TLS (Transport Layer Security) protocol. Both protocols provide adequate protection from eavesdroppers and man-in-the-middle attacks. In general, the HTTPS port is 443.


SSH stands for "Secure Shell", which is a network protocol that allows secure data exchange between 2 computers. This protocol can be used to control computers remotely, send files, create encrypted tunnels, and so on.

This protocol has several advantages when compared to similar protocols such as FTP, Telnet, and Danrsh because SSH has its own authentication, authorization, and encryption systems. That way the security of a communication session through the help of SSH can be more guaranteed.


SSL which stands for Secure Socket Layer, is a data security protocol used to maintain the transmission of web server data and also users of the website. The most secure type of SSL can be seen from the SSL security level, which lies in the strength of the encryption it supports (such as 256 bits). The greater the encryption level, the more difficult it will be to break into.

That's the article about Understanding Computer Network Protocols, Functions and Types. Hopefully, this article can be useful for everyone.

Halim Media

Halim Media merupakan sebuah situs yang menyajikan informasi-informasi bermanfaat lewat media digital.

Post a Comment

Previous Post Next Post

Contact Form