Protocols & Layers
Learn the application protocols that power the internet - HTTP, HTTPS, FTP, SMTP, IMAP and POP3 - and understand the TCP/IP four-layer model that explains how they all work together.
What is a Protocol?
In 2019, two satellites built by different agencies in different countries successfully docked and transferred data in orbit. Neither engineering team had met the other. Yet the communication worked perfectly. Why? Because both followed the same protocols - agreed sets of rules for how data would be formatted, transmitted and acknowledged.
A protocol is a set of rules that govern how data is formatted, transmitted and received over a network. Protocols ensure that devices from different manufacturers, running different operating systems, can communicate reliably. Without agreed protocols, the internet would not exist.
Protocols are organised into layers. Each layer handles a specific aspect of communication and relies on the layer below it. This layered design means that a change to one layer (for example, upgrading from Wi-Fi to Ethernet) does not affect the layers above it - your email protocols don't care whether the physical connection is wired or wireless.
Application Layer Protocols
Application protocols define how specific types of data are communicated between applications. You need to know six protocols for GCSE - their purpose, how they differ from each other, and which port numbers they use.
HTTP: 80 | HTTPS: 443 | FTP: 20/21 | SMTP: 25/587 | IMAP: 143/993 | POP3: 110/995
Port numbers identify which service a packet is for. A router forwards a packet to the right application based on its destination port number. Port 443 = HTTPS traffic; Port 80 = HTTP traffic.
Protocol Sorter
For each scenario below, identify which protocol is most appropriate. This mirrors the style of scenario-based exam questions for this topic.
The TCP/IP Four-Layer Model
The TCP/IP model organises all networking protocols into four layers. Each layer has a specific responsibility. Data passes down the layers on the sender's device and back up the layers on the receiver's device. Click each layer to see full detail.
A layered model offers three key advantages: (1) Modular design - each layer can be modified independently without affecting other layers. Upgrading from Wi-Fi 5 to Wi-Fi 6 only affects the network access layer. (2) Interoperability - different manufacturers can build products for specific layers, all working together as long as they follow the same standards. (3) Troubleshooting - problems can be isolated to a specific layer, making network issues easier to diagnose.
Classify the Protocols
Encapsulation Visualiser
Type a message and watch it travel down the TCP/IP layers, gaining a header (and footer) at each stage. Click Send to animate, then Receive to see de-encapsulation strip the headers away.
Port Number Rapid-Fire Quiz
A protocol name flashes up. Type the correct port number as fast as you can. 10 rounds, 10 seconds each. Port numbers come up in nearly every networks paper.
Ready to test your port knowledge?
10 protocols, 10 seconds each. Type the port number and press Enter or click Submit. Partial credit is not given.
Quiz & Extended Thinking
1. A user checks their email on both their phone and their laptop. Explain why IMAP is more appropriate than POP3 in this situation.
Synchronisation across devices: Any action (reading, deleting, moving to a folder) is reflected immediately on all devices. Reading an email on the phone marks it as read on the laptop too.
Why POP3 would fail here: POP3 downloads emails to one device and typically removes them from the server. If the user's phone downloads all emails via POP3, the laptop would show an empty inbox. The user would miss emails on one device.
Conclusion: IMAP is appropriate because the user needs a consistent, synchronised view of their inbox on multiple devices. POP3 is only suitable when a user has a single device and wants offline access to downloaded mail.
2. Describe the role of the Transport layer in the TCP/IP model, explaining why this layer is essential for reliable data communication.
Specific functions:
1. Segmentation: TCP breaks large data streams from the application layer into smaller segments (packets) of manageable size.
2. Sequence numbering: Each segment is numbered so the receiving device can reassemble them in the correct order, even if they arrive out of sequence.
3. Error checking: TCP includes checksums so the receiver can verify each segment arrived without corruption.
4. Acknowledgement and retransmission: The receiver sends acknowledgements (ACKs) for each segment. If no ACK is received, TCP automatically retransmits the missing segment.
5. Port numbers: TCP identifies which application on the destination device should receive the data using port numbers (e.g. port 443 for HTTPS, port 25 for SMTP).
Why it is essential: The internet layer (IP) provides best-effort delivery - it makes no guarantees. Without the transport layer, packets could be lost, arrive corrupted, or arrive out of order with no mechanism for correction. TCP compensates for the unreliability of IP, providing reliable transmission on top of an unreliable network.
Practice what you've learned
Three levels covering protocols and the TCP/IP model.