Network Protocols
Network protocols definem como os dados são formatados, transmitidos e interpretados através de redes, cobrindo camadas do physical à application e garantindo comunicação interoperável.
Network protocols especificam as regras de syntax, semantics, timing e error-handling que permitem que devices comuniquem sobre uma network. Eles definem data formats, control information e procedures para enviar, receber e processar messages. Protocols existem através de múltiplas layers de networking models; na prática, o TCP/IP model é a dominant implementation, enquanto o OSI model serve como uma pedagogical reference. IP fornece addressing e routing na Internet (network) layer; TCP e UDP fornecem transport services na transport layer; e protocols como HTTP, FTP, DNS e NTP operam na application layer. Nem todos os protocols residem em cada layer; alguns abrangem múltiplas layers ou mapeiam diferentemente entre models. Protocols podem ser connection-oriented (e.g., TCP) ou connectionless (e.g., UDP); reliability é frequentemente alcançada com mechanisms como sequencing, acknowledgments, checksums, retransmission e flow control. Routing, switching e encapsulation permitem que os dados atravessem diversas networks. Security e performance considerations—como encryption (TLS/SSL), integrity checks, caching e congestion control—moldam o protocol design. DNS traduz domain names para IP addresses; NTP sincroniza clocks; TLS fornece security para application-layer protocols. A disciplina é mantida por standards bodies (e.g., IETF), e real-world deployments tipicamente dependem do TCP/IP protocol suite em vez de OSI em practical networking. Compreender essas distinções ajuda engineers a projetar systems interoperáveis.
graph LR
Center["Network Protocols"]:::main
Center --> Child_osi_model["osi-model"]:::child
click Child_osi_model "/terms/osi-model"
Rel_dns["dns"]:::related -.-> Center
click Rel_dns "/terms/dns"
Rel_http["http"]:::related -.-> Center
click Rel_http "/terms/http"
Rel_cybersecurity["cybersecurity"]:::related -.-> Center
click Rel_cybersecurity "/terms/cybersecurity"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explique como se eu tivesse 5 anos
🗣️ The set of rules that lets computers share information without getting confused.
🤓 Expert Deep Dive
## The Hierarchy of Trust
Network protocols are organized into a stack. At the bottom, protocols handle the raw electricity or radio waves. In the middle, they handle 'where' the data goes (IP). At the top, they handle 'what' the data is (HTTP for web, SMTP for email). This Decoupling allows the internet to upgrade its hardware (e.g., from copper to fiber) without needing to rewrite every website.