What Is a Protocol?

Imagine you are visiting a country where nobody speaks your language. You cannot ask for directions, order food, or understand signs. Communication breaks down completely because there is no shared set of rules for exchanging information. This is exactly the problem that computers face when they try to talk to each other — and protocols are the solution.

A network protocol is an agreed set of rules that governs how devices communicate over a network. Protocols define how data is formatted, transmitted, received, and acknowledged. They ensure that a message sent by one device can be correctly understood by another, even if the two devices are made by different manufacturers, run different operating systems, or are located on opposite sides of the world.

Why Are Protocols Needed?

Without protocols, network communication would be impossible. Consider the challenges:

In this topic you will learn:

Key Concept: Protocol A network protocol is an agreed set of rules that defines how data is formatted, transmitted, and received between devices on a network. Protocols are essential because they allow devices from different manufacturers, running different operating systems, to communicate using a common standard. Without protocols, no two different computers could exchange data reliably.
Did You Know? Every protocol is assigned one or more port numbers. A port number is like a door number on a building — it tells the computer which application or service the data is intended for. A single computer can run a web server (port 80), an email server (port 25), and an FTP server (port 21) simultaneously, and port numbers ensure each incoming message reaches the correct service.

The Key Network Protocols

There are many network protocols, but for GCSE Computer Science you need to know seven in detail. Each protocol has a specific purpose, uses specific port numbers, and is designed for a particular type of network communication.

HTTP — HyperText Transfer Protocol

HTTP is the protocol used to transfer web pages from a web server to your browser. Every time you type a web address into your browser or click a link, HTTP is working behind the scenes to request and deliver the page.

How HTTP Works

HTTP operates on a request-response model:

  1. You type a URL (such as http://www.example.com/page.html) into your browser.
  2. Your browser sends an HTTP request to the web server at that address, asking for the specified page.
  3. The web server receives the request, finds the page, and sends it back as an HTTP response containing the HTML, CSS, images, and other content.
  4. Your browser receives the response and renders (displays) the web page on your screen.

Key Facts about HTTP

Security Warning: HTTP sends data in plain text with no encryption. This means that if someone intercepts the data (for example, on a public Wi-Fi network), they can read everything — including passwords, form data, and personal information. For this reason, HTTP is being replaced by HTTPS for most websites. You should never enter sensitive information on a website that uses HTTP instead of HTTPS.

HTTPS — HyperText Transfer Protocol Secure

HTTPS is the secure, encrypted version of HTTP. It works in exactly the same way as HTTP (request-response for web pages), but all data is encrypted using SSL (Secure Sockets Layer) or its successor TLS (Transport Layer Security) before being transmitted. This means that even if someone intercepts the data, they cannot read it because it is scrambled.

How HTTPS Provides Security

Key Facts about HTTPS

Key Concept: HTTP vs HTTPS HTTP (port 80) transfers web pages in plain text — data is not encrypted and can be intercepted. HTTPS (port 443) encrypts all data using SSL/TLS, protecting it from eavesdropping. HTTPS also authenticates the server using digital certificates. Always look for the padlock icon in your browser to confirm HTTPS is active, especially when entering passwords or payment details.

FTP — File Transfer Protocol

FTP is a protocol specifically designed for uploading and downloading files to and from a server. While HTTP can also transfer files (when you download a file from a website), FTP is purpose-built for managing files on a remote server and is much more efficient for large file transfers.

How FTP Works

FTP uses a client-server model:

  1. The user connects to an FTP server using an FTP client application (such as FileZilla) and authenticates with a username and password.
  2. Once connected, the user can browse the server’s file system, just like browsing folders on their own computer.
  3. The user can upload files from their computer to the server, download files from the server to their computer, or delete, rename, and move files on the server.

Key Facts about FTP

Key Concept: FTP FTP (ports 20/21) is used for transferring files between a client and a server. It allows users to upload, download, rename, and manage files on a remote server. Web developers commonly use FTP to upload website files to a hosting server. Like HTTP, standard FTP is not encrypted, so secure alternatives (SFTP/FTPS) should be used for sensitive transfers.

SMTP — Simple Mail Transfer Protocol

SMTP is the protocol used for sending emails. When you compose an email and click “Send,” SMTP is the protocol that pushes your email from your device to the mail server and then forwards it between mail servers until it reaches the recipient’s mail server.

How SMTP Works

  1. You compose an email in your email client (Outlook, Gmail, Thunderbird, etc.) and click Send.
  2. Your email client uses SMTP to send the email to your outgoing mail server (also called the SMTP server).
  3. Your SMTP server looks up the recipient’s domain (e.g., gmail.com) using DNS to find the recipient’s mail server.
  4. Your SMTP server forwards the email to the recipient’s mail server using SMTP.
  5. The email is stored on the recipient’s mail server, waiting for the recipient to collect it (using POP3 or IMAP).

Key Facts about SMTP

Common Mistake: Students sometimes say that SMTP is used for “sending and receiving emails.” This is incorrect. SMTP is only for sending (pushing) emails. To receive (retrieve/download) emails, you need either POP3 or IMAP. Think of SMTP as the postal van that picks up your letter and delivers it to the sorting office, but a different van (POP3 or IMAP) delivers it to the recipient’s letterbox.

POP3 — Post Office Protocol version 3

POP3 is a protocol used to download emails from a mail server to a single device. When you check your email, POP3 retrieves the emails from the server and saves them on your local device.

How POP3 Works

  1. Your email client connects to the mail server using POP3.
  2. POP3 downloads all new emails from the server to your device (laptop, phone, etc.).
  3. By default, POP3 then deletes the emails from the server after downloading them. The emails now exist only on your local device.
  4. You can read, organise, and manage your emails offline on that device.

Key Facts about POP3

IMAP — Internet Message Access Protocol

IMAP is a protocol used to synchronise emails across multiple devices. Unlike POP3, IMAP keeps emails stored on the server and synchronises them with every device that connects. This is the protocol used by most modern email services.

How IMAP Works

  1. Your email client connects to the mail server using IMAP.
  2. IMAP synchronises your email — it shows you the emails stored on the server without downloading and deleting them.
  3. Emails remain on the server. Any changes you make (reading, deleting, moving to folders) are reflected on the server and therefore on all your other devices.
  4. If you read an email on your phone, it will also appear as read on your laptop, tablet, and any other device.

Key Facts about IMAP

Key Concept: Email Protocols SMTP (port 25/587) sends emails. POP3 (port 110) downloads emails to one device and deletes them from the server. IMAP (port 143) synchronises emails across multiple devices, keeping them on the server. In modern use, SMTP + IMAP is the most common combination because people access email from multiple devices.

DNS — Domain Name System

DNS is the system that translates human-readable domain names into IP addresses. Computers identify each other using numerical IP addresses (like 142.250.187.206), but humans find it much easier to remember names (like www.google.com). DNS acts as the “phone book” of the internet, converting names into numbers so your computer can find the right server.

Why DNS Is Needed

Every device on the internet has a unique IP address — a numerical identifier like 142.250.187.206 (IPv4) or 2a00:1450:4009:820::200e (IPv6). These numbers are how computers locate each other on the internet. However, humans cannot easily remember long strings of numbers for every website they visit. DNS solves this by allowing you to type www.google.com instead of 142.250.187.206. The DNS system automatically looks up the corresponding IP address.

How a DNS Lookup Works (Step by Step)

When you type a domain name into your browser, the following process occurs:

  1. Browser cache check: Your browser first checks its own cache (local memory) to see if it has looked up this domain recently. If it has the IP address stored from a previous visit, it uses that immediately and skips the remaining steps.
  2. Operating system cache check: If the browser cache does not have it, the request goes to the operating system, which checks its own DNS cache.
  3. DNS resolver (recursive resolver): If neither cache has the answer, your computer sends the request to a DNS resolver. This is usually a server operated by your Internet Service Provider (ISP). The resolver’s job is to track down the correct IP address by querying other DNS servers.
  4. Root server: The resolver contacts a root DNS server. There are 13 sets of root servers worldwide. The root server does not know the IP address of www.google.com, but it knows which server handles .com domains and directs the resolver there.
  5. TLD (Top-Level Domain) server: The resolver contacts the TLD server for .com. This server does not know the exact IP address either, but it knows which authoritative name server is responsible for google.com and directs the resolver there.
  6. Authoritative name server: The resolver contacts the authoritative name server for google.com. This server has the definitive record and returns the IP address (e.g., 142.250.187.206) to the resolver.
  7. IP address returned: The resolver sends the IP address back to your computer. Both the resolver and your computer cache (store) this result for future use, so the next lookup will be much faster.
  8. Browser connects: Your browser now uses the IP address to connect directly to Google’s web server using HTTP or HTTPS, and the web page is loaded.
DNS Lookup Process

  You type: www.google.com

  [Your Browser]
       |
       v
  [DNS Resolver (ISP)]
       |
       v
  [Root Server]  ---->  "I don't know, but try the .com TLD server"
       |
       v
  [.com TLD Server]  ---->  "I don't know, but try Google's name server"
       |
       v
  [Authoritative Name Server for google.com]
       |
       v
  Returns IP: 142.250.187.206
       |
       v
  [Your Browser connects to 142.250.187.206 via HTTP/HTTPS]
       |
       v
  Web page loads!
        

Key Facts about DNS

Key Concept: DNS DNS (port 53) translates domain names into IP addresses. When you type a URL, the DNS lookup process involves your browser, a DNS resolver, root servers, TLD servers, and authoritative name servers. The IP address is returned to your browser, which then connects to the web server. Results are cached to speed up future visits. Without DNS, you would need to type numerical IP addresses for every website.
Common Mistake: Students sometimes say “DNS converts IP addresses into domain names.” While reverse DNS lookups do exist, for GCSE purposes DNS converts domain names into IP addresses (names to numbers). The user types the name; DNS finds the number. Always describe it in this direction in exam answers.

Comparing Protocols

Email Protocols Comparison

Email communication relies on three protocols working together. SMTP handles sending, while POP3 and IMAP handle receiving. The table below compares all three:

FeatureSMTPPOP3IMAP
Full name Simple Mail Transfer Protocol Post Office Protocol v3 Internet Message Access Protocol
Purpose Sending emails Downloading emails Synchronising emails
Direction Pushes email from client to server and between servers Pulls (downloads) emails from server to client Syncs emails between server and multiple clients
Port 25 / 587 110 143
Emails on server? Stored temporarily until forwarded Deleted after download (by default) Kept on server permanently
Multiple devices N/A (sending only) Poor — emails only on the device that downloaded them Excellent — emails synced across all devices
Offline access N/A Good — emails stored locally Limited — requires internet to access emails on server
Server storage N/A Low — emails removed from server High — all emails remain on server
Modern usage Universal — used by all email systems for sending Less common — outdated for multi-device use Standard — used by Gmail, Outlook, and most modern services
Exam Tip: Email Protocol Combination A complete email journey uses SMTP to send and either POP3 or IMAP to receive. A common exam question is: “Explain the roles of SMTP and IMAP in sending and receiving an email.” Your answer should explain that SMTP pushes the email from the sender to the mail server and between servers, while IMAP allows the recipient to synchronise and access the email on the destination server from multiple devices.

Summary of All Protocols

This table provides a complete reference for all the protocols you need to know for GCSE Computer Science:

ProtocolFull NamePurposePort(s)Example Use
HTTP HyperText Transfer Protocol Requesting and delivering web pages (unencrypted) 80 Browsing a basic website
HTTPS HyperText Transfer Protocol Secure Secure, encrypted transfer of web pages 443 Online banking, shopping, logging in
FTP File Transfer Protocol Uploading/downloading files to/from a server 20 / 21 Web developer uploading site files
SMTP Simple Mail Transfer Protocol Sending emails (client to server and server to server) 25 / 587 Clicking “Send” on an email
POP3 Post Office Protocol version 3 Downloading emails to a single device 110 Checking email on one laptop
IMAP Internet Message Access Protocol Synchronising emails across multiple devices 143 Accessing Gmail on phone and laptop
DNS Domain Name System Translating domain names to IP addresses 53 Typing www.bbc.co.uk into a browser
Common Mistake: Students sometimes confuse FTP with HTTP when it comes to file transfers. While you can download a file via HTTP (clicking a download link on a website), FTP is a dedicated protocol for managing files on a server — uploading, downloading, deleting, renaming, and organising files. FTP gives you direct access to the server’s file system, whereas HTTP only lets you request specific files that the web server makes available.
Exam Tip: Port Numbers You are expected to know the port numbers for each protocol. A useful memory aid: HTTP is 80 (the “standard” web), HTTPS is 443 (the “secure” web), FTP is 20/21 (the “two-one” for files), SMTP is 25 (sending), POP3 is 110 (pulling), IMAP is 143 (syncing), and DNS is 53 (domain lookup). Practise until you can recall these instantly.

Test Your Knowledge

Try these interactive exercises to check your understanding of network protocols. Read each question carefully before answering.

Exercise 1: Protocol Matcher

Read the scenario below and select the correct protocol that would be used.

Score: 0 / 0

Exercise 2: Port Number Challenge

You are shown a protocol name. Type the correct port number in the box and click Check. For protocols with two ports (e.g., FTP), enter either one.

Score: 0 / 0

Exercise 3: DNS Lookup Sequence

The steps of a DNS lookup are shown below in a random order. Click them in the correct order (1st to last) to rebuild the DNS lookup process.

Your sequence:

Practice Questions

Click on each question to reveal the answer. Try to answer in your head or on paper first before checking!

Q1: Define the term "network protocol" and explain why protocols are needed.

Answer: A network protocol is an agreed set of rules that defines how data is formatted, transmitted, and received between devices on a network. Protocols are needed because devices on a network may be made by different manufacturers and run different operating systems. Without a common set of rules (protocols), these devices would not be able to understand each other’s data. Protocols act as a common language, ensuring that a message sent by one device is correctly interpreted by another, regardless of hardware or software differences.

Q2: Explain the difference between HTTP and HTTPS. Why should online banking use HTTPS rather than HTTP?

Answer: HTTP (port 80) transfers web pages in plain text with no encryption. This means that anyone who intercepts the data can read it. HTTPS (port 443) is the secure version — it encrypts all data using SSL/TLS before transmission, so intercepted data cannot be read. HTTPS also uses digital certificates to authenticate the server, proving that the website is genuine. Online banking must use HTTPS because it handles extremely sensitive data — login credentials, account numbers, and financial transactions. If HTTP were used, a hacker on the same network could intercept and read this data. HTTPS encryption ensures that even if data is intercepted, it is unreadable without the encryption key.

Q3: Describe how FTP is used by a web developer. State the port numbers used by FTP.

Answer: FTP (File Transfer Protocol) is used by web developers to upload website files (HTML, CSS, JavaScript, images) from their local computer to the web hosting server. The developer uses an FTP client (such as FileZilla) to connect to the server by entering the server address, username, and password. Once connected, they can browse the server’s file system, upload new files, download files, and delete or rename existing files. FTP uses port 20 for data transfer (the actual file content) and port 21 for control commands (login, directory listing, file management instructions).

Q4: Compare POP3 and IMAP. Explain why IMAP is more suitable for a user who accesses email on both a phone and a laptop.

Answer: POP3 (port 110) downloads emails from the mail server to the local device and then deletes them from the server (by default). This means emails are only available on the device that downloaded them. IMAP (port 143) synchronises emails across all devices, keeping them stored on the server. Changes made on one device (reading, deleting, moving emails) are reflected on all other devices. IMAP is more suitable for a user with both a phone and a laptop because: (1) emails are accessible on both devices rather than being stuck on one, (2) if the user reads an email on their phone, it will appear as read on the laptop too, and (3) the mailbox is always consistent across all devices. With POP3, emails downloaded on the phone would not appear on the laptop, creating confusion.

Q5: Describe the step-by-step process of a DNS lookup when a user types "www.bbc.co.uk" into their browser.

Answer: (1) The browser first checks its local cache to see if it already has the IP address for www.bbc.co.uk from a recent visit. (2) If not found, the request is sent to a DNS resolver, usually operated by the user’s ISP. (3) The resolver contacts a root DNS server, which does not know the IP address but directs the resolver to the TLD server responsible for .uk domains. (4) The resolver contacts the .uk TLD server, which directs it to the authoritative name server for bbc.co.uk. (5) The resolver contacts the authoritative name server, which holds the definitive record and returns the IP address (e.g., 151.101.0.81). (6) The IP address is returned to the browser. (7) The browser uses the IP address to connect to the BBC’s web server using HTTP/HTTPS and the web page loads. The result is cached so future lookups are faster.

Q6: Explain the role of SMTP in sending an email. Why is SMTP not sufficient on its own for a complete email system?

Answer: SMTP (Simple Mail Transfer Protocol, port 25/587) is responsible for sending emails. When a user clicks “Send,” SMTP pushes the email from the email client to the outgoing mail server. The SMTP server then uses DNS to find the recipient’s mail server and forwards the email there using SMTP. However, SMTP is not sufficient on its own because it only handles sending (pushing) emails. It cannot retrieve emails from the server for the recipient to read. A separate protocol is needed for receiving emails: either POP3 (which downloads emails to one device) or IMAP (which synchronises emails across multiple devices). A complete email system therefore needs SMTP for sending and POP3 or IMAP for receiving.

Q7: A small business has a website for selling products online and also uses email for communication. List the protocols the business would use and explain the purpose of each.

Answer: The business would use the following protocols: (1) HTTPS — for the online shop, to securely transmit customer payment details and personal information with encryption via SSL/TLS. (2) DNS — to translate the business’s domain name (e.g., www.shopname.com) into an IP address so customers’ browsers can find and connect to the web server. (3) FTP — for the web developer to upload and update website files on the hosting server. (4) SMTP — for sending emails (e.g., order confirmations, newsletters, staff communication). (5) IMAP — for receiving and synchronising emails across multiple devices (staff phones, laptops, office computers) so everyone can access the same inbox from any device. HTTP might also be used for non-sensitive informational pages, though HTTPS is now preferred for all pages.

Q8: State the port numbers used by each of the following protocols: HTTP, HTTPS, FTP, SMTP, POP3, IMAP, DNS. [Knowledge recall question]

Answer:

  • HTTP: Port 80
  • HTTPS: Port 443
  • FTP: Port 20 (data transfer) and Port 21 (control/commands)
  • SMTP: Port 25 (server-to-server) or Port 587 (client-to-server with authentication)
  • POP3: Port 110
  • IMAP: Port 143
  • DNS: Port 53

Key Vocabulary

This table summarises the essential terms for this topic. Use it for revision and to check your understanding.

TermDefinition
ProtocolAn agreed set of rules that governs how devices communicate and exchange data over a network
Port numberA numerical identifier that directs network traffic to the correct application or service on a computer (e.g., port 80 for HTTP)
HTTPHyperText Transfer Protocol — transfers web pages in plain text (port 80)
HTTPSHyperText Transfer Protocol Secure — transfers web pages with SSL/TLS encryption (port 443)
SSL/TLSSecure Sockets Layer / Transport Layer Security — encryption protocols that secure data in transit, used by HTTPS
Digital certificateAn electronic document that proves the identity of a website, used by HTTPS to authenticate servers
FTPFile Transfer Protocol — uploads and downloads files to/from a server (ports 20/21)
SMTPSimple Mail Transfer Protocol — sends (pushes) emails from client to server and between servers (port 25/587)
POP3Post Office Protocol version 3 — downloads emails to a single device, deleting them from the server (port 110)
IMAPInternet Message Access Protocol — synchronises emails across multiple devices, keeping them on the server (port 143)
DNSDomain Name System — translates human-readable domain names into numerical IP addresses (port 53)
IP addressA unique numerical address assigned to every device on a network, used to identify and locate devices
Domain nameA human-readable name for a website (e.g., www.google.com) that DNS translates into an IP address
DNS resolverA server (usually run by your ISP) that handles DNS lookups by querying root, TLD, and authoritative servers
Root serverA top-level DNS server that directs queries to the appropriate TLD server (e.g., .com, .uk, .org)
TLD serverA DNS server responsible for a top-level domain (e.g., all .com domains) that directs queries to the authoritative name server
Authoritative name serverThe DNS server that holds the definitive IP address record for a specific domain name
CacheA temporary store of recently accessed data, used by browsers and DNS to speed up repeated lookups
EncryptionThe process of converting data into an unreadable format to prevent unauthorised access during transmission

How to Succeed in the Exam

Exam Tip: Know Each Protocol’s Purpose and Port For each of the seven protocols (HTTP, HTTPS, FTP, SMTP, POP3, IMAP, DNS), you must know its full name, its purpose, its port number(s), and be able to give a real-world example. A very common question format is: “State the protocol used for [scenario] and give its port number.” Practise recalling all seven until you can do it instantly.
Exam Tip: HTTP vs HTTPS When explaining HTTPS, always mention three things: (1) data is encrypted using SSL/TLS, (2) the server is authenticated using a digital certificate, and (3) you can identify HTTPS by the padlock icon in the browser. Simply saying “HTTPS is more secure than HTTP” is not enough for full marks — you must explain how it is more secure.
Exam Tip: POP3 vs IMAP A favourite exam question is comparing POP3 and IMAP. Remember the key distinction: POP3 downloads and deletes (single device, offline access), while IMAP synchronises and keeps (multiple devices, requires internet). If a question mentions using email on multiple devices, the answer is almost always IMAP.
Exam Tip: DNS Lookup Steps You may be asked to describe the DNS lookup process. Remember the chain: browser cache → DNS resolver → root server → TLD server → authoritative server → IP returned → browser connects. Mentioning caching at the end (results are stored for faster future lookups) can earn extra marks.
Exam Tip: SMTP Direction Always be precise about the direction of SMTP. It sends (pushes) emails. It does not receive or download them. If asked about a “complete email journey,” explain that SMTP sends the email and POP3 or IMAP is used by the recipient to retrieve it.
Exam Tip: FTP Two Ports FTP uses two ports: port 20 for data transfer and port 21 for control commands. If the mark scheme asks for the FTP port, stating both ports shows stronger knowledge. Remember: 20 = data, 21 = commands.

Video Resources

These Craig 'n' Dave videos cover the key protocols you need to know for the exam.

Past Paper Questions

Practise these exam-style questions. Click each question to reveal the mark scheme.

Explain the difference between HTTP and HTTPS. 2 marks

Mark scheme:

  • HTTPS encrypts data using SSL/TLS / HTTP does not encrypt data (1 mark)
  • HTTPS is more secure / used for sensitive data like banking and online shopping (1 mark)
Describe the role of DNS when a user accesses a website. 3 marks

Mark scheme:

  • DNS stands for Domain Name System (1 mark)
  • It translates the domain name/URL into an IP address (1 mark)
  • So the browser knows which server to connect to (1 mark)

Protocols in Your Daily Life

Now that you understand the key network protocols, think about how many of them you use every single day — probably without even realising it:

Protocols are the invisible infrastructure that makes the internet work. Without HTTP/HTTPS, there would be no web browsing. Without SMTP, POP3, and IMAP, there would be no email. Without DNS, you would have to memorise numerical IP addresses for every website. Without FTP, web developers could not easily publish websites. Every online action you take relies on protocols working together seamlessly.

Challenge yourself: Next time you are browsing the web, look at the address bar. Is the site using HTTP or HTTPS? Can you spot the padlock? When you send an email, think about SMTP pushing it to the server and IMAP synchronising it on the other end. When a website loads in under a second, remember that DNS resolved the domain name in milliseconds. Seeing these protocols in action deepens your understanding beyond what any textbook can teach.

Final Thought Protocols are the agreed-upon rules that allow billions of different devices — made by thousands of different manufacturers, running dozens of different operating systems — to communicate seamlessly across the world. They are one of the most important concepts in computer science. Without standardised protocols, the internet as we know it simply could not exist. Understanding protocols means understanding the foundation of all modern digital communication.