![]() Overview Color key: International standard Internet Standard Proposed Standard Internet Draft Protocolįile Delivery over Unidirectional Transport Similarly, the encryption scheme indicated in the "Encryption" column applies to transmitted data only, and not to the authentication system. Some protocols-including FTP, FTP Secure, FASP, and Tsunami-listen on a "control port" or "command port", at which they receive commands from the client. In the case of FTP, this port differs from the listening port. The " Server port" column indicates the port from which the server transmits data. Some protocols designed to transmit data over UDP also use a TCP port for oversight. In the tables below, the "Transport" column indicates which protocol(s) the transfer protocol uses at the transport layer. They use one of two transport layer protocols: the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). The Internet is a packet-switched network, and most of the protocols in this list are designed for its protocol stack, the IP protocol suite. A packet comprises a header (which describes the packet) and a payload (the data). Protocols for packet-switched networks Ī packet-switched network transmits data that is divided into units called packets. ![]() ![]() Protocols for shared file systems-such as 9P and the Network File System-are beyond the scope of this article, as are file synchronization protocols. This article lists communication protocols that are designed for file transfer over a telecommunications network. ![]() For file synchronization software, see Comparison of file synchronization software. For file sharing software, see Comparison of file-sharing applications. ![]()
0 Comments
Leave a Reply. |