What Is a Protocol?
Imagine you are visiting a country where nobody speaks your language. You cannot ask for directions, order food, or understand signs. Communication breaks down completely because there is no shared set of rules for exchanging information. This is exactly the problem that computers face when they try to talk to each other — and protocols are the solution.
A network protocol is an agreed set of rules that governs how devices communicate over a network. Protocols define how data is formatted, transmitted, received, and acknowledged. They ensure that a message sent by one device can be correctly understood by another, even if the two devices are made by different manufacturers, run different operating systems, or are located on opposite sides of the world.
Why Are Protocols Needed?
Without protocols, network communication would be impossible. Consider the challenges:
- Different manufacturers: Your laptop might be made by Dell, your phone by Samsung, and the web server you are connecting to might be built by HP. Each manufacturer designs their hardware differently. Protocols provide a common standard so that all these different devices can communicate regardless of who made them.
- Different operating systems: Your laptop might run Windows, your phone runs Android, and the server runs Linux. Protocols ensure that a request sent from Windows is understood by Linux, and the response from Linux is understood by Windows. Without protocols, each OS would speak its own incompatible language.
- Need for a common language: Just as humans need a shared language to communicate, computers need shared protocols. Protocols are the “common language” of networking. They specify exactly how data should be structured, what each part of a message means, and how devices should respond to each other.
- Different types of data: Networks carry many different types of data — web pages, emails, files, video streams, voice calls. Each type of data has different requirements. Protocols allow different applications to share the same network while each follows the rules appropriate for its type of data.
In this topic you will learn:
- The key network protocols: HTTP, HTTPS, FTP, SMTP, POP3, IMAP, and DNS
- What each protocol does, the port numbers it uses, and real-world examples
- How DNS translates domain names into IP addresses, step by step
- How to compare the email protocols (SMTP, POP3, IMAP)
- Key vocabulary, exam tips, and interactive exercises to test your knowledge
The Key Network Protocols
There are many network protocols, but for GCSE Computer Science you need to know seven in detail. Each protocol has a specific purpose, uses specific port numbers, and is designed for a particular type of network communication.
HTTP — HyperText Transfer Protocol
HTTP is the protocol used to transfer web pages from a web server to your browser. Every time you type a web address into your browser or click a link, HTTP is working behind the scenes to request and deliver the page.
How HTTP Works
HTTP operates on a request-response model:
- You type a URL (such as
http://www.example.com/page.html) into your browser. - Your browser sends an HTTP request to the web server at that address, asking for the specified page.
- The web server receives the request, finds the page, and sends it back as an HTTP response containing the HTML, CSS, images, and other content.
- Your browser receives the response and renders (displays) the web page on your screen.
Key Facts about HTTP
- Port: 80
- Purpose: Requesting and delivering web pages and web content
- Data: Not encrypted — data is sent in plain text, so anyone intercepting the traffic can read it
- Used by: Web browsers (Chrome, Firefox, Edge, Safari) when accessing websites
HTTPS — HyperText Transfer Protocol Secure
HTTPS is the secure, encrypted version of HTTP. It works in exactly the same way as HTTP (request-response for web pages), but all data is encrypted using SSL (Secure Sockets Layer) or its successor TLS (Transport Layer Security) before being transmitted. This means that even if someone intercepts the data, they cannot read it because it is scrambled.
How HTTPS Provides Security
- Encryption: All data exchanged between the browser and the server is encrypted using SSL/TLS. This protects sensitive information such as passwords, credit card numbers, and personal data from being intercepted and read.
- Authentication: The web server presents a digital certificate to prove its identity. This ensures you are communicating with the real website (e.g., your actual bank) and not an imposter. The browser verifies this certificate before establishing the connection.
- Data integrity: HTTPS ensures that data has not been tampered with during transmission. If anyone modifies the data in transit, the encryption detects the change and rejects the data.
Key Facts about HTTPS
- Port: 443
- Purpose: Secure, encrypted transfer of web pages and web content
- Visual indicator: A padlock icon appears in the browser’s address bar when HTTPS is in use
- Used for: Online banking, online shopping, logging into accounts, any site handling sensitive data
- Modern standard: Most websites now use HTTPS by default, not just banking and shopping sites
FTP — File Transfer Protocol
FTP is a protocol specifically designed for uploading and downloading files to and from a server. While HTTP can also transfer files (when you download a file from a website), FTP is purpose-built for managing files on a remote server and is much more efficient for large file transfers.
How FTP Works
FTP uses a client-server model:
- The user connects to an FTP server using an FTP client application (such as FileZilla) and authenticates with a username and password.
- Once connected, the user can browse the server’s file system, just like browsing folders on their own computer.
- The user can upload files from their computer to the server, download files from the server to their computer, or delete, rename, and move files on the server.
Key Facts about FTP
- Ports: 20 (data transfer) and 21 (control/commands)
- Purpose: Uploading and downloading files to/from a remote server
- Used by: Web developers uploading website files to a web server, businesses transferring large files, backing up data to a remote server
- Security: Standard FTP sends data (including usernames and passwords) in plain text. SFTP (Secure FTP) and FTPS (FTP Secure) are encrypted versions that protect data in transit.
SMTP — Simple Mail Transfer Protocol
SMTP is the protocol used for sending emails. When you compose an email and click “Send,” SMTP is the protocol that pushes your email from your device to the mail server and then forwards it between mail servers until it reaches the recipient’s mail server.
How SMTP Works
- You compose an email in your email client (Outlook, Gmail, Thunderbird, etc.) and click Send.
- Your email client uses SMTP to send the email to your outgoing mail server (also called the SMTP server).
- Your SMTP server looks up the recipient’s domain (e.g.,
gmail.com) using DNS to find the recipient’s mail server. - Your SMTP server forwards the email to the recipient’s mail server using SMTP.
- The email is stored on the recipient’s mail server, waiting for the recipient to collect it (using POP3 or IMAP).
Key Facts about SMTP
- Port: 25 (original, server-to-server) or 587 (modern, client-to-server with authentication)
- Purpose: Sending emails from a client to a server, and forwarding emails between mail servers
- Direction: SMTP only sends (pushes) emails — it does not retrieve (pull) them. A separate protocol (POP3 or IMAP) is needed to receive emails.
- Used by: All email clients and all email servers for outgoing email
POP3 — Post Office Protocol version 3
POP3 is a protocol used to download emails from a mail server to a single device. When you check your email, POP3 retrieves the emails from the server and saves them on your local device.
How POP3 Works
- Your email client connects to the mail server using POP3.
- POP3 downloads all new emails from the server to your device (laptop, phone, etc.).
- By default, POP3 then deletes the emails from the server after downloading them. The emails now exist only on your local device.
- You can read, organise, and manage your emails offline on that device.
Key Facts about POP3
- Port: 110
- Purpose: Downloading emails from the server to a local device
- Behaviour: Downloads emails and deletes them from the server (by default)
- Best for: Users who access email from a single device only
- Advantage: Emails are stored locally, so you can read them offline without an internet connection. Also uses less server storage because emails are removed from the server.
- Disadvantage: If you check email on your laptop, those emails will not appear on your phone because they were downloaded to the laptop and deleted from the server. This makes POP3 poor for users with multiple devices.
IMAP — Internet Message Access Protocol
IMAP is a protocol used to synchronise emails across multiple devices. Unlike POP3, IMAP keeps emails stored on the server and synchronises them with every device that connects. This is the protocol used by most modern email services.
How IMAP Works
- Your email client connects to the mail server using IMAP.
- IMAP synchronises your email — it shows you the emails stored on the server without downloading and deleting them.
- Emails remain on the server. Any changes you make (reading, deleting, moving to folders) are reflected on the server and therefore on all your other devices.
- If you read an email on your phone, it will also appear as read on your laptop, tablet, and any other device.
Key Facts about IMAP
- Port: 143
- Purpose: Synchronising emails across multiple devices, keeping emails on the server
- Behaviour: Keeps emails on the server and syncs across all devices
- Best for: Users who access email from multiple devices (phone, laptop, tablet, work computer)
- Advantage: Emails are synchronised — read an email on your phone and it appears as read on your laptop. Delete on one device and it is deleted everywhere. This is ideal for modern use where people check email on multiple devices.
- Disadvantage: Requires a constant internet connection to access emails (since they are stored on the server, not locally). Also uses more server storage because emails are not deleted from the server.
DNS — Domain Name System
DNS is the system that translates human-readable domain names into IP addresses. Computers identify each other using numerical IP addresses (like 142.250.187.206), but humans find it much easier to remember names (like www.google.com). DNS acts as the “phone book” of the internet, converting names into numbers so your computer can find the right server.
Why DNS Is Needed
Every device on the internet has a unique IP address — a numerical identifier like 142.250.187.206 (IPv4) or 2a00:1450:4009:820::200e (IPv6). These numbers are how computers locate each other on the internet. However, humans cannot easily remember long strings of numbers for every website they visit. DNS solves this by allowing you to type www.google.com instead of 142.250.187.206. The DNS system automatically looks up the corresponding IP address.
How a DNS Lookup Works (Step by Step)
When you type a domain name into your browser, the following process occurs:
- Browser cache check: Your browser first checks its own cache (local memory) to see if it has looked up this domain recently. If it has the IP address stored from a previous visit, it uses that immediately and skips the remaining steps.
- Operating system cache check: If the browser cache does not have it, the request goes to the operating system, which checks its own DNS cache.
- DNS resolver (recursive resolver): If neither cache has the answer, your computer sends the request to a DNS resolver. This is usually a server operated by your Internet Service Provider (ISP). The resolver’s job is to track down the correct IP address by querying other DNS servers.
- Root server: The resolver contacts a root DNS server. There are 13 sets of root servers worldwide. The root server does not know the IP address of
www.google.com, but it knows which server handles.comdomains and directs the resolver there. - TLD (Top-Level Domain) server: The resolver contacts the TLD server for
.com. This server does not know the exact IP address either, but it knows which authoritative name server is responsible forgoogle.comand directs the resolver there. - Authoritative name server: The resolver contacts the authoritative name server for
google.com. This server has the definitive record and returns the IP address (e.g.,142.250.187.206) to the resolver. - IP address returned: The resolver sends the IP address back to your computer. Both the resolver and your computer cache (store) this result for future use, so the next lookup will be much faster.
- Browser connects: Your browser now uses the IP address to connect directly to Google’s web server using HTTP or HTTPS, and the web page is loaded.
You type: www.google.com
[Your Browser]
|
v
[DNS Resolver (ISP)]
|
v
[Root Server] ----> "I don't know, but try the .com TLD server"
|
v
[.com TLD Server] ----> "I don't know, but try Google's name server"
|
v
[Authoritative Name Server for google.com]
|
v
Returns IP: 142.250.187.206
|
v
[Your Browser connects to 142.250.187.206 via HTTP/HTTPS]
|
v
Web page loads!
Key Facts about DNS
- Port: 53
- Purpose: Translating domain names (e.g.,
www.bbc.co.uk) into IP addresses (e.g.,151.101.0.81) - Analogy: DNS is the “phone book” of the internet — you look up a name and get a number
- Caching: Results are cached at multiple levels (browser, OS, resolver) to speed up future lookups
- Without DNS: You would have to memorise the IP address of every website you want to visit
Comparing Protocols
Email Protocols Comparison
Email communication relies on three protocols working together. SMTP handles sending, while POP3 and IMAP handle receiving. The table below compares all three:
| Feature | SMTP | POP3 | IMAP |
|---|---|---|---|
| Full name | Simple Mail Transfer Protocol | Post Office Protocol v3 | Internet Message Access Protocol |
| Purpose | Sending emails | Downloading emails | Synchronising emails |
| Direction | Pushes email from client to server and between servers | Pulls (downloads) emails from server to client | Syncs emails between server and multiple clients |
| Port | 25 / 587 | 110 | 143 |
| Emails on server? | Stored temporarily until forwarded | Deleted after download (by default) | Kept on server permanently |
| Multiple devices | N/A (sending only) | Poor — emails only on the device that downloaded them | Excellent — emails synced across all devices |
| Offline access | N/A | Good — emails stored locally | Limited — requires internet to access emails on server |
| Server storage | N/A | Low — emails removed from server | High — all emails remain on server |
| Modern usage | Universal — used by all email systems for sending | Less common — outdated for multi-device use | Standard — used by Gmail, Outlook, and most modern services |
Summary of All Protocols
This table provides a complete reference for all the protocols you need to know for GCSE Computer Science:
| Protocol | Full Name | Purpose | Port(s) | Example Use |
|---|---|---|---|---|
| HTTP | HyperText Transfer Protocol | Requesting and delivering web pages (unencrypted) | 80 | Browsing a basic website |
| HTTPS | HyperText Transfer Protocol Secure | Secure, encrypted transfer of web pages | 443 | Online banking, shopping, logging in |
| FTP | File Transfer Protocol | Uploading/downloading files to/from a server | 20 / 21 | Web developer uploading site files |
| SMTP | Simple Mail Transfer Protocol | Sending emails (client to server and server to server) | 25 / 587 | Clicking “Send” on an email |
| POP3 | Post Office Protocol version 3 | Downloading emails to a single device | 110 | Checking email on one laptop |
| IMAP | Internet Message Access Protocol | Synchronising emails across multiple devices | 143 | Accessing Gmail on phone and laptop |
| DNS | Domain Name System | Translating domain names to IP addresses | 53 | Typing www.bbc.co.uk into a browser |
Test Your Knowledge
Try these interactive exercises to check your understanding of network protocols. Read each question carefully before answering.
Exercise 1: Protocol Matcher
Read the scenario below and select the correct protocol that would be used.
Exercise 2: Port Number Challenge
You are shown a protocol name. Type the correct port number in the box and click Check. For protocols with two ports (e.g., FTP), enter either one.
Exercise 3: DNS Lookup Sequence
The steps of a DNS lookup are shown below in a random order. Click them in the correct order (1st to last) to rebuild the DNS lookup process.
Practice Questions
Click on each question to reveal the answer. Try to answer in your head or on paper first before checking!
Answer: A network protocol is an agreed set of rules that defines how data is formatted, transmitted, and received between devices on a network. Protocols are needed because devices on a network may be made by different manufacturers and run different operating systems. Without a common set of rules (protocols), these devices would not be able to understand each other’s data. Protocols act as a common language, ensuring that a message sent by one device is correctly interpreted by another, regardless of hardware or software differences.
Answer: HTTP (port 80) transfers web pages in plain text with no encryption. This means that anyone who intercepts the data can read it. HTTPS (port 443) is the secure version — it encrypts all data using SSL/TLS before transmission, so intercepted data cannot be read. HTTPS also uses digital certificates to authenticate the server, proving that the website is genuine. Online banking must use HTTPS because it handles extremely sensitive data — login credentials, account numbers, and financial transactions. If HTTP were used, a hacker on the same network could intercept and read this data. HTTPS encryption ensures that even if data is intercepted, it is unreadable without the encryption key.
Answer: FTP (File Transfer Protocol) is used by web developers to upload website files (HTML, CSS, JavaScript, images) from their local computer to the web hosting server. The developer uses an FTP client (such as FileZilla) to connect to the server by entering the server address, username, and password. Once connected, they can browse the server’s file system, upload new files, download files, and delete or rename existing files. FTP uses port 20 for data transfer (the actual file content) and port 21 for control commands (login, directory listing, file management instructions).
Answer: POP3 (port 110) downloads emails from the mail server to the local device and then deletes them from the server (by default). This means emails are only available on the device that downloaded them. IMAP (port 143) synchronises emails across all devices, keeping them stored on the server. Changes made on one device (reading, deleting, moving emails) are reflected on all other devices. IMAP is more suitable for a user with both a phone and a laptop because: (1) emails are accessible on both devices rather than being stuck on one, (2) if the user reads an email on their phone, it will appear as read on the laptop too, and (3) the mailbox is always consistent across all devices. With POP3, emails downloaded on the phone would not appear on the laptop, creating confusion.
Answer: (1) The browser first checks its local cache to see if it already has the IP address for www.bbc.co.uk from a recent visit. (2) If not found, the request is sent to a DNS resolver, usually operated by the user’s ISP. (3) The resolver contacts a root DNS server, which does not know the IP address but directs the resolver to the TLD server responsible for .uk domains. (4) The resolver contacts the .uk TLD server, which directs it to the authoritative name server for bbc.co.uk. (5) The resolver contacts the authoritative name server, which holds the definitive record and returns the IP address (e.g., 151.101.0.81). (6) The IP address is returned to the browser. (7) The browser uses the IP address to connect to the BBC’s web server using HTTP/HTTPS and the web page loads. The result is cached so future lookups are faster.
Answer: SMTP (Simple Mail Transfer Protocol, port 25/587) is responsible for sending emails. When a user clicks “Send,” SMTP pushes the email from the email client to the outgoing mail server. The SMTP server then uses DNS to find the recipient’s mail server and forwards the email there using SMTP. However, SMTP is not sufficient on its own because it only handles sending (pushing) emails. It cannot retrieve emails from the server for the recipient to read. A separate protocol is needed for receiving emails: either POP3 (which downloads emails to one device) or IMAP (which synchronises emails across multiple devices). A complete email system therefore needs SMTP for sending and POP3 or IMAP for receiving.
Answer: The business would use the following protocols: (1) HTTPS — for the online shop, to securely transmit customer payment details and personal information with encryption via SSL/TLS. (2) DNS — to translate the business’s domain name (e.g., www.shopname.com) into an IP address so customers’ browsers can find and connect to the web server. (3) FTP — for the web developer to upload and update website files on the hosting server. (4) SMTP — for sending emails (e.g., order confirmations, newsletters, staff communication). (5) IMAP — for receiving and synchronising emails across multiple devices (staff phones, laptops, office computers) so everyone can access the same inbox from any device. HTTP might also be used for non-sensitive informational pages, though HTTPS is now preferred for all pages.
Answer:
- HTTP: Port 80
- HTTPS: Port 443
- FTP: Port 20 (data transfer) and Port 21 (control/commands)
- SMTP: Port 25 (server-to-server) or Port 587 (client-to-server with authentication)
- POP3: Port 110
- IMAP: Port 143
- DNS: Port 53
Key Vocabulary
This table summarises the essential terms for this topic. Use it for revision and to check your understanding.
| Term | Definition |
|---|---|
| Protocol | An agreed set of rules that governs how devices communicate and exchange data over a network |
| Port number | A numerical identifier that directs network traffic to the correct application or service on a computer (e.g., port 80 for HTTP) |
| HTTP | HyperText Transfer Protocol — transfers web pages in plain text (port 80) |
| HTTPS | HyperText Transfer Protocol Secure — transfers web pages with SSL/TLS encryption (port 443) |
| SSL/TLS | Secure Sockets Layer / Transport Layer Security — encryption protocols that secure data in transit, used by HTTPS |
| Digital certificate | An electronic document that proves the identity of a website, used by HTTPS to authenticate servers |
| FTP | File Transfer Protocol — uploads and downloads files to/from a server (ports 20/21) |
| SMTP | Simple Mail Transfer Protocol — sends (pushes) emails from client to server and between servers (port 25/587) |
| POP3 | Post Office Protocol version 3 — downloads emails to a single device, deleting them from the server (port 110) |
| IMAP | Internet Message Access Protocol — synchronises emails across multiple devices, keeping them on the server (port 143) |
| DNS | Domain Name System — translates human-readable domain names into numerical IP addresses (port 53) |
| IP address | A unique numerical address assigned to every device on a network, used to identify and locate devices |
| Domain name | A human-readable name for a website (e.g., www.google.com) that DNS translates into an IP address |
| DNS resolver | A server (usually run by your ISP) that handles DNS lookups by querying root, TLD, and authoritative servers |
| Root server | A top-level DNS server that directs queries to the appropriate TLD server (e.g., .com, .uk, .org) |
| TLD server | A DNS server responsible for a top-level domain (e.g., all .com domains) that directs queries to the authoritative name server |
| Authoritative name server | The DNS server that holds the definitive IP address record for a specific domain name |
| Cache | A temporary store of recently accessed data, used by browsers and DNS to speed up repeated lookups |
| Encryption | The process of converting data into an unreadable format to prevent unauthorised access during transmission |
How to Succeed in the Exam
Video Resources
These Craig 'n' Dave videos cover the key protocols you need to know for the exam.
Past Paper Questions
Practise these exam-style questions. Click each question to reveal the mark scheme.
Explain the difference between HTTP and HTTPS. 2 marks
Mark scheme:
- HTTPS encrypts data using SSL/TLS / HTTP does not encrypt data (1 mark)
- HTTPS is more secure / used for sensitive data like banking and online shopping (1 mark)
Describe the role of DNS when a user accesses a website. 3 marks
Mark scheme:
- DNS stands for Domain Name System (1 mark)
- It translates the domain name/URL into an IP address (1 mark)
- So the browser knows which server to connect to (1 mark)
Protocols in Your Daily Life
Now that you understand the key network protocols, think about how many of them you use every single day — probably without even realising it:
- DNS: Every time you type a web address or click a link, DNS silently translates the domain name into an IP address in milliseconds. You use DNS hundreds of times a day without ever seeing it work.
- HTTPS: When you log into social media, check your bank balance, or buy something online, HTTPS encrypts your data. The padlock icon in your browser is your visual confirmation that HTTPS is active.
- HTTP: Some basic informational websites still use HTTP, though this is becoming rarer as the web moves towards HTTPS everywhere.
- SMTP + IMAP: When you send an email, SMTP pushes it to the server. When you open Gmail or Outlook on your phone and laptop and see the same emails on both, that is IMAP synchronising your inbox across devices.
- FTP: If you have ever uploaded files to a website or a shared server, FTP (or its secure variant) was likely handling the transfer behind the scenes.
Protocols are the invisible infrastructure that makes the internet work. Without HTTP/HTTPS, there would be no web browsing. Without SMTP, POP3, and IMAP, there would be no email. Without DNS, you would have to memorise numerical IP addresses for every website. Without FTP, web developers could not easily publish websites. Every online action you take relies on protocols working together seamlessly.
Challenge yourself: Next time you are browsing the web, look at the address bar. Is the site using HTTP or HTTPS? Can you spot the padlock? When you send an email, think about SMTP pushing it to the server and IMAP synchronising it on the other end. When a website loads in under a second, remember that DNS resolved the domain name in milliseconds. Seeing these protocols in action deepens your understanding beyond what any textbook can teach.