Skip to content

Commit 80e98b4

Browse files
committed
added curiosity report
1 parent d9f5d54 commit 80e98b4

File tree

2 files changed

+85
-1
lines changed

2 files changed

+85
-1
lines changed

.env.production

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
VITE_PIZZA_SERVICE_URL=https://pizza-service.justachillguy.click
2-
VITE_PIZZA_FACTORY_URL=https://pizza-factory.cs329.click
2+
VITE_PIZZA_FACTORY_URL=https://pizza-factory.cs329.click

curiosityReport.md

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
# Network Related Protocols
2+
3+
Network protocols are sets of rules that determine how data gets transmitted between different devices. They operate across multiple layers of communication to ensure networks function properly. There is no fixed number of protocols, since new ones are created to meet evolving needs. However, many established protocols are widely used today — such as **TCP, HTTP, TLS, SSH**, and more. These protocols are typically designed and standardized by organizations like the **Institute of Electrical and Electronics Engineers (IEEE)** and the **Internet Engineering Task Force (IETF)**.
4+
5+
Each protocol has a specific function within its layer of operation, but most can be categorized into three main functionality groups:
6+
7+
- **Communication**
8+
- **Network Management**
9+
- **Security**
10+
11+
---
12+
13+
## Communication Protocols
14+
15+
Communication protocols enable the basic transfer of data between devices. For instance, the **Transmission Control Protocol (TCP)** and the **Internet Protocol (IP)** are foundational to internet communication.
16+
17+
TCP operates in the Transport Layer (OSI Model) and supports reliable connections through the well-known **three-way handshake**:
18+
19+
1. The client sends a **SYN** (synchronize) packet.
20+
2. The server responds with **SYN-ACK** (synchronize-acknowledge).
21+
3. The client replies with a final **ACK** (acknowledge) to establish the connection.
22+
23+
TCP splits transmitted data into **segments** to provide:
24+
25+
- Error detection and recovery
26+
- Ordered delivery
27+
- Flow control
28+
29+
Closing a TCP connection includes a similar process using the **FIN** flag in a **four-way handshake**.
30+
31+
While TCP ensures reliable delivery, **IP** handles network routing. It adds **source and destination IP addresses** so data can traverse multiple networks to reach the correct device. Other protocols such as the **User Datagram Protocol (UDP)** prioritize speed over reliability when loss-tolerance is acceptable (e.g., gaming, streaming).
32+
33+
---
34+
35+
## Network Management Protocols
36+
37+
Network Management protocols focus on monitoring and maintaining network infrastructure.
38+
39+
Examples include:
40+
41+
- **Simple Network Management Protocol (SNMP)**
42+
- **Internet Control Message Protocol (ICMP)**
43+
- **NETCONF** (modern configuration and management)
44+
45+
According to GeeksforGeeks, SNMP:
46+
47+
> “…is a widely used protocol for network management that provides a standardized framework for monitoring and managing network devices such as routers, switches, servers, printers, firewalls, and load balancers.”
48+
49+
SNMP operates at the **Application Layer** and involves:
50+
51+
- A **Network Management Station (NMS)** that requests data
52+
- A **software agent** on each device that collects performance information in a **Management Information Base (MIB)**
53+
54+
SNMP primarily uses a **polling model** (manager requests → device responds).
55+
56+
Modern telemetry systems shift to a **push model**, where devices automatically stream metrics to a **collector** (e.g., Grafana) without constant polling. This improves scalability and real-time insight into performance.
57+
58+
---
59+
60+
## Security Protocols
61+
62+
Security protocols ensure data remains:
63+
64+
- **Confidential** (protected from unauthorized access)
65+
- **Authentic** (sender and receiver identities verified)
66+
- **Untampered** (integrity preserved)
67+
68+
Historically, **Secure Sockets Layer (SSL)** provided encryption over the web, but it relied on outdated algorithms like **SHA-1**, which is no longer secure.
69+
70+
Its modern successor, **Transport Layer Security (TLS)**, uses stronger methods such as:
71+
72+
- **SHA-256 hashing** for authentication and integrity
73+
- Digital certificates for trust validation
74+
75+
TLS protects both **data in motion** (internet communication) and **data at rest** (stored information).
76+
77+
---
78+
79+
## References
80+
81+
- https://www.geeksforgeeks.org/
82+
- https://www.cloudflare.com/
83+
84+
> Note: Each of these sites contains numerous resources on the specific protocols described here. Though not directly quoted, the main ideas and concepts were taken from a careful reading of the resources.

0 commit comments

Comments
 (0)