Skip to content

Question bank

1. Elaborate UDP Features along with the structure of the UDP header:

UDP Features: - Connectionless: UDP is a connectionless protocol, meaning it doesn't establish a connection before sending data. Each packet is independent and may take a different route to reach the destination. - Unreliable: UDP does not guarantee delivery of packets. It doesn't perform error checking or retransmission of lost packets. This makes UDP faster but less reliable compared to TCP. - Low overhead: UDP has a minimal header overhead compared to TCP, making it suitable for applications where speed is more critical than reliability. - Broadcast and multicast: UDP supports broadcast and multicast communication, allowing a single packet to be sent to multiple recipients simultaneously.

Structure of UDP Header: 0 7 8 15 16 23 24 31 +--------+--------+--------+--------+ | Source Port | Destination Port | +--------+--------+--------+--------+ | Length | Checksum | +--------+--------+--------+--------+ - Source Port (16 bits): Identifies the port number of the sending application/process. - Destination Port (16 bits): Identifies the port number of the receiving application/process. - Length (16 bits): Specifies the length of the UDP header and the data in bytes. - Checksum (16 bits): Used for error detection. It covers both the header and data fields.

2. Compare and contrast TCP and UDP:

Comparison: - Both TCP and UDP are protocols used for transmitting data over networks. - Both operate at the transport layer of the OSI model. - Both use port numbers to identify the source and destination applications.

Contrast: - TCP is a connection-oriented protocol, while UDP is connectionless. - TCP provides reliable, ordered, and error-checked delivery of data, while UDP does not guarantee delivery or ordering of packets. - TCP implements flow control and congestion control mechanisms, while UDP does not. - TCP is slower but more reliable than UDP due to its additional features. - TCP is used for applications that require reliable delivery of data, such as web browsing, email, file transfer, etc., while UDP is used for applications where speed and low overhead are more critical, such as real-time multimedia streaming, DNS, VoIP, etc.

3. Discuss with a diagram the TCP Sliding Window Protocol:

  1. Window Size: Both the sender and receiver maintain a window, which is a contiguous range of sequence numbers. This window represents the amount of data that can be transmitted without waiting for an acknowledgment.

  2. Flow Control: The receiver advertises its window size to the sender, indicating the amount of available buffer space it has for incoming data.

  3. Sending Data: The sender sends data packets within the range of the receiver's advertised window size. It can send multiple packets without waiting for individual acknowledgments.

  4. Acknowledgment: Upon receiving data packets, the receiver sends acknowledgment (ACK) packets back to the sender, indicating the next sequence number it expects to receive.

  5. Advancement of Window: As acknowledgments are received, both the sender and receiver slide their windows forward, allowing for the transmission of additional data.

  6. Retransmission: If the sender does not receive acknowledgments within a certain timeout period, it assumes that some packets were lost or corrupted and retransmits those packets.

Now, let's address some questions about the TCP sliding window protocol:

  1. What is the purpose of the sliding window in TCP?

The sliding window in TCP serves several purposes: - It allows for the efficient utilization of network bandwidth by enabling the sender to transmit multiple packets before waiting for acknowledgments. - It facilitates flow control by regulating the amount of data sent based on the receiver's buffer space availability. - It ensures reliable data transmission by enabling the sender to retransmit lost or corrupted packets.

  1. How does the sliding window protocol handle congestion control?

TCP's sliding window protocol employs various congestion control mechanisms, such as: - Slow start: Initially, the window size grows exponentially to quickly fill the available bandwidth, but it slows down as congestion is detected. - Congestion avoidance: Once a certain threshold (congestion window size) is reached, the window size increases linearly to avoid causing further congestion. - Fast retransmit and fast recovery: If duplicate acknowledgments are received, indicating packet loss, TCP quickly retransmits the missing packet without waiting for a timeout, and it reduces the congestion window size to alleviate congestion.

  1. What happens if the receiver's buffer becomes full in the sliding window protocol?

If the receiver's buffer becomes full, it advertises a smaller window size to the sender, indicating that it cannot accept additional data until space becomes available. The sender adjusts its transmission rate accordingly, reducing the window size to prevent overflowing the receiver's buffer.

  1. How does the sliding window protocol ensure reliable data transmission?

The sliding window protocol ensures reliable data transmission through mechanisms such as: - Positive acknowledgments: The receiver sends acknowledgments for successfully received packets, allowing the sender to know which packets were received successfully. - Selective repeat: If a packet is lost or corrupted, only that specific packet is retransmitted rather than retransmitting the entire window. - Timeout-based retransmission: If acknowledgments are not received within a certain timeout period, the sender retransmits the missing packets to ensure they are received by the receiver.

  1. What role does the acknowledgment number play in the sliding window protocol?

The acknowledgment number indicates the sequence number of the next expected packet by the receiver. It allows the sender to know which packets have been successfully received and acknowledged by the receiver. As acknowledgments are received, both the sender and receiver slide their windows forward, indicating successful transmission and reception of data.

These questions and answers provide insights into the functionality and significance of the TCP sliding window protocol in ensuring reliable and efficient data transmission over networks.

4. Elaborate the 3-way handshake mechanism and its need:

3-way Handshake Mechanism: - The 3-way handshake is used by TCP to establish a connection between a client and a server. - It involves three steps: SYN, SYN-ACK, and ACK. 1. SYN (Synchronize): The client sends a SYN packet to the server, indicating its intention to establish a connection and specifying an initial sequence number. 2. SYN-ACK (Synchronize-Acknowledgment): The server responds with a SYN-ACK packet, acknowledging the client's request and also indicating its intention to establish a connection. The server also sends its own initial sequence number. 3. ACK (Acknowledgment): Finally, the client sends an ACK packet to the server, acknowledging receipt of the server's SYN-ACK packet. At this point, the connection is established, and data transmission can begin.

Need for 3-way Handshake: - The 3-way handshake ensures that both the client and the server are ready to establish a connection before any data transmission occurs. - It helps in establishing synchronization between the client and the server regarding sequence numbers and other parameters required for reliable communication. - It verifies that both endpoints are active and reachable, reducing the chances of establishing a connection with an inactive or unauthorized entity. - It helps in preventing SYN flood attacks by requiring a valid acknowledgment from the client before completing the connection establishment process.

5. Discuss in detail the leaky bucket protocol with a diagram:

  • Here's how the Leaky Bucket algorithm works:

  • Bucket: Imagine a bucket that can hold a fixed amount of water, representing the maximum amount of data the network can handle in a given time frame. This fixed capacity represents the maximum rate at which data can be transmitted.

  • Input: Data packets arriving at the network are considered as drops of water being poured into the bucket. These data packets could be of varying sizes, but the bucket can only hold a fixed amount at any given time.

  • Leak Rate: The bucket has a leak, which causes water to drip out at a constant rate, even if no data is being poured into it. This leak represents the maximum rate at which the network can process data.

  • Processing: As data packets are poured into the bucket, they accumulate. If the bucket overflows, meaning it exceeds its maximum capacity, packets are discarded or marked for slower transmission, preventing network congestion.

  • Output: Data leaves the bucket at a constant rate dictated by the leak rate, even if there is a burst of incoming data. This ensures a smooth and controlled flow of traffic out of the network.

  • Adaptability: The leak rate can be adjusted dynamically based on network conditions and priorities. For instance, during times of heavy traffic, the leak rate can be decreased to prevent overflow, while during lighter traffic, it can be increased to utilize available bandwidth more efficiently.

  • The Leaky Bucket algorithm provides several benefits:

  • Traffic Regulation: It regulates the flow of data, preventing sudden bursts that could overwhelm the network.
  • Congestion Control: By discarding excess packets, it helps prevent congestion in the network.
  • Smooth Transmission: It ensures a steady and controlled flow of data, enhancing the overall performance and stability of the network.
  • However, the Leaky Bucket algorithm also has some limitations:
  • Strict Enforcement: It can be too rigid in some scenarios, as it strictly enforces the maximum rate of data transmission.
  • Delay: It can introduce some delay in data transmission, especially if packets are discarded frequently.
  • Complexity: Implementing the Leaky Bucket algorithm requires careful tuning of parameters and monitoring of network conditions.

6. Compare leaky bucket and token bucket protocols.

Point of Comparison Leaky Bucket Protocol Token Bucket Protocol
Basic Concept - Data is continuously poured into a leaky bucket. - Tokens are continuously added to a token bucket.
- Data leaks out at a constant rate. - Tokens are removed at a variable rate when data arrives.
- Overflowing data is discarded or delayed. - Data is transmitted only if tokens are available.
Rate Control - Controls the average data rate. - Controls the peak data rate.
- Suitable for regulating average traffic. - Suitable for handling bursty traffic.
Burstiness Handling - Not efficient in handling bursty traffic. - Efficiently handles bursty traffic.
- Can lead to packet loss during bursts. - Smooths out bursts by allowing bursts within token limits.
Implementation Flexibility - Simpler to implement. - More complex to implement.
- Suitable for simple traffic shaping needs. - Offers more advanced traffic shaping capabilities.
Resource Utilization - May underutilize network bandwidth in some scenarios. - Can utilize network bandwidth more efficiently.
- Leaks bandwidth when traffic is below capacity. - Tokens are accumulated during low traffic periods.
- Not adaptive to varying traffic conditions. - More adaptive to varying traffic conditions.
Packet Discard Mechanism - Discards packets directly when overflow occurs. - Delays packet transmission until tokens are available.
- Can lead to uneven packet transmission. - Provides more uniform packet transmission.

7. Discuss features and applications of UDP.

  • Features of UDP:
  • Connectionless: UDP operates without establishing a connection between the sender and receiver, making it lightweight and efficient for real-time applications.
  • Unreliable: UDP does not guarantee delivery or ordering of packets, which reduces overhead but may result in packet loss or out-of-order delivery.
  • Low Overhead: UDP has a minimal header overhead compared to TCP, making it suitable for applications where speed is crucial, such as real-time multimedia streaming or online gaming.
  • Broadcast and Multicast Support: UDP allows broadcast and multicast communication, enabling a single packet to be sent to multiple recipients simultaneously, which is useful for applications like streaming media or DNS queries.

  • Applications of UDP:

  • Real-Time Communication: UDP is commonly used in applications that require low latency and can tolerate some packet loss, such as VoIP (Voice over IP), video conferencing, and online gaming.
  • Multimedia Streaming: UDP is preferred for streaming live audio or video content due to its low overhead and ability to handle bursts of data.
  • DNS (Domain Name System): DNS queries and responses are often transmitted using UDP due to the lightweight nature of UDP packets and the stateless nature of DNS.
  • Network Monitoring: UDP is used in network monitoring tools and protocols like SNMP (Simple Network Management Protocol) for sending status and event notifications.

8. Elaborate the cases when retransmission occurs in TCP.

  • Packet Loss: If an acknowledgment (ACK) is not received for a transmitted packet within a certain timeout period, TCP assumes the packet has been lost and triggers retransmission.
  • Out-of-Order Delivery: If TCP receives an acknowledgment for a higher sequence number before receiving acknowledgment for a lower sequence number, it implies that the lower-numbered packet was lost or arrived out of order. In such cases, TCP retransmits the missing packet.
  • Duplicate ACKs: TCP uses duplicate acknowledgment signals to detect packet loss. If it receives multiple duplicate ACKs for the same packet, it infers that the original packet or an earlier retransmission was lost and initiates retransmission.
  • Fast Retransmit: TCP may employ fast retransmit algorithms, where it retransmits a packet upon receiving duplicate ACKs before the timeout period elapses, assuming that the segment has been lost.
    Retransmission is a crucial mechanism in TCP to ensure reliable data delivery, especially in the presence of network congestion or errors.

9. Discuss features and applications of TCP.

  • Features of TCP:
    • Connection-oriented: TCP establishes a connection between the sender and receiver before data exchange, ensuring reliable, ordered, and error-checked delivery of data.
    • Reliable Delivery: TCP guarantees that data sent by the sender is received correctly by the receiver, handling packet loss, reordering, and error detection through acknowledgment mechanisms.
    • Flow Control: TCP implements flow control mechanisms to prevent the sender from overwhelming the receiver with data, ensuring efficient transmission across the network.
    • Congestion Control: TCP dynamically adjusts its transmission rate based on network congestion signals, preventing network congestion collapse and ensuring fair resource allocation.
    • Full Duplex Communication: TCP allows bidirectional communication, enabling data to be transmitted simultaneously in both directions between the client and server.
  • Applications of TCP:
    • Web Browsing: TCP is the foundation of HTTP (Hypertext Transfer Protocol) used for fetching web pages, ensuring reliable delivery of HTML content, images, and other resources.
    • Email: SMTP (Simple Mail Transfer Protocol) and IMAP (Internet Message Access Protocol) use TCP for sending and receiving emails, ensuring reliable delivery of messages.
    • File Transfer: FTP (File Transfer Protocol) and SFTP (Secure File Transfer Protocol) utilize TCP for transferring files over the network securely and reliably.
    • Remote Access: TCP-based protocols like SSH (Secure Shell) and Telnet provide secure and reliable remote access to network devices and servers.
    • Database Access: TCP is used for accessing databases through protocols like MySQL, PostgreSQL, and Oracle, ensuring reliable and consistent data transmission.

10. Discuss the congestion avoidance mechanism in TCP.

  • Congestion Window (CWND): TCP dynamically adjusts its congestion window size based on network conditions. The congestion window determines the number of unacknowledged packets that can be in flight at any given time.
  • Slow Start: TCP starts with a conservative congestion window size and gradually increases it exponentially (doubling) until it reaches a threshold called the slow start threshold (ssthresh). This allows TCP to probe the network for available bandwidth efficiently.
  • Congestion Avoidance: Once the congestion window size exceeds the ssthresh, TCP switches to a congestion avoidance mode. In this mode, it increases the congestion window linearly (additive increase) rather than exponentially, reducing the risk of triggering congestion collapse.
  • Fast Recovery: TCP monitors network conditions through acknowledgments and adjusts the congestion window accordingly. If packet loss occurs, TCP enters a fast recovery state, reducing the congestion window and retransmitting lost packets to

11.Elaborate Domain Name System Protocol.

  • Domain Name System (DNS): The Domain Name System (DNS) is a decentralized hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It translates domain names, which are human-readable addresses, into IP addresses, which are numerical identifiers used by network devices to locate each other.

  • Functioning:

When a user enters a domain name (e.g., www.example.com) into a web browser, the DNS protocol resolves this domain name into the corresponding IP address. - The DNS resolution process involves several steps: - DNS Query: The client sends a DNS query to a DNS resolver (such as the one provided by the ISP or configured locally). - Recursive Query: If the resolver doesn't have the IP address in its cache, it sends a recursive query to the DNS root servers, asking for the IP address of the domain. - Iterative Queries: The root server responds with a referral to the authoritative DNS server responsible for the top-level domain (TLD) of the requested domain (e.g., .com). - Continued Queries: The resolver sends iterative queries to the authoritative DNS servers for each subsequent domain level (e.g., example.com). - Response: Finally, the authoritative DNS server responds with the IP address associated with the requested domain, which is then cached by the resolver for future use. DNS operates primarily over UDP on port 53, but it can also use TCP for large queries or zone transfers.

DNS employs caching at various levels to improve performance and reduce the load on authoritative DNS servers.

12. Discuss in detail the Simple Mail Transfer Protocol (SMTP).

  • Definition: SMTP, or Simple Mail Transfer Protocol, is a standard protocol used for sending email messages between servers over the internet. It works alongside other protocols such as POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) which are used for retrieving emails from a server.

  • Operation:

  • Establishing Connection: SMTP initiates a TCP connection on port 25 (by default) between the sender's mail server and the recipient's mail server.
  • Handshaking: Once the connection is established, a handshaking process occurs where the sending server identifies itself to the receiving server.
  • Message Transfer: The sending server sends the email message to the recipient's server by transmitting the email header, body, and any attachments.
  • Relaying: If the recipient's server is not the final destination, it relays the message to another server or multiple servers until it reaches its destination.
  • Delivery: The recipient's server stores the email in the recipient's mailbox or forwards it to the recipient's email client for retrieval.

  • Features:

  • Reliability: SMTP ensures reliable delivery of email messages by employing acknowledgments and error detection mechanisms.
  • Authentication: SMTP supports authentication mechanisms to verify the identity of the sender and prevent unauthorized access.
  • Security: SMTP can be secured using encryption protocols like SSL/TLS to protect the confidentiality and integrity of email communications.
  • Queue Management: SMTP servers maintain queues to manage incoming and outgoing email messages, ensuring efficient delivery even during peak periods.

  • Extensions:

  • SMTP Authentication (SMTP AUTH): Provides a mechanism for clients to authenticate with the server before sending emails, enhancing security.
  • SMTP STARTTLS: Allows SMTP communication to be encrypted using TLS (Transport Layer Security) for secure transmission of email messages.
  • SMTPUTF8: Supports the use of UTF-8 characters in email addresses and message content, enabling internationalization and multilingual email communication.

SMTP is a fundamental protocol in email communication, enabling the reliable transmission of messages across the internet.

13. Elaborate Multipurpose Internet Mail Extension Protocol (MIME) and Post Office Protocol version 3 (POP3) protocol.

  • Multipurpose Internet Mail Extension Protocol (MIME):
  • Definition: MIME is an extension to SMTP that allows email messages to include non-textual content such as images, audio, video, and binary files.
  • Features:

    • Content Types: MIME defines various content types such as text/plain, text/html, image/jpeg, audio/mp3, etc., allowing email clients to interpret and display different types of content appropriately.
    • Encoding: MIME supports encoding mechanisms such as Base64 and Quoted-Printable to convert binary data into ASCII characters for transmission over email.
    • Attachments: MIME enables email messages to include attachments by encapsulating binary files within the message body, allowing recipients to download and open attachments.
  • Post Office Protocol version 3 (POP3):

  • Definition: POP3 is a protocol used by email clients to retrieve email messages from a remote server.
  • Operation:

    • Authentication: The email client authenticates with the POP3 server using a username and password.
    • Download: Once authenticated, the email client downloads email messages from the server to the local device.
    • Storage: POP3 typically downloads messages to the client's device and removes them from the server, although there are options to leave copies on the server.
    • Deletion: After downloading, POP3 optionally deletes messages from the server, freeing up server space.
    • Stateful: POP3 maintains a stateful connection, meaning it keeps track of the messages that have been downloaded and their read/unread status.
  • Comparison:

  • MIME vs. POP3: MIME is responsible for encoding and formatting email messages, enabling the inclusion of multimedia content and attachments, while POP3 is used for retrieving email messages from a server to a local client.

MIME and POP3 are integral components of email communication, enabling the exchange of multimedia-rich messages and efficient retrieval of emails from remote servers.

14. Discuss remote login.

  • Definition: Remote login, also known as remote access or remote terminal access, is a process that enables users to log in to a computer or network from a different location over a network connection.
  • Protocols: Remote login is facilitated by protocols such as Telnet, SSH (Secure Shell), and Remote Desktop Protocol (RDP), depending on the type of system being accessed and the level of security required.
  • Operation:
  • Users initiate a remote login session by connecting to the remote system using appropriate client software or commands.
  • Upon successful connection, users are prompted to authenticate themselves by providing valid credentials such as a username and password.
  • Once authenticated, users gain access to the remote system's command-line interface or graphical user interface, allowing them to interact with the system as if they were physically present.
  • Features:
  • Access Anywhere: Remote login allows users to access their workstations, servers, or network resources from anywhere with an internet connection, facilitating remote work and administration.
  • Resource Sharing: It enables users to share files, applications, and resources located on remote systems without the need for physical proximity.
  • Troubleshooting: Remote login is commonly used by IT support personnel to troubleshoot and resolve issues on remote computers or servers without the need for onsite visits.
  • Security: Secure remote login protocols such as SSH encrypt the communication between the client and server, ensuring confidentiality and integrity of data transmitted over the network.

Remote login is widely used in various scenarios, including remote work, system administration, technical support, and collaborative projects, providing flexibility and efficiency in accessing remote systems.

15. Explain the working of Dynamic Host Configuration Protocol (DHCP).

  • Dynamic Host Configuration Protocol (DHCP):
  • Definition: DHCP is a network protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.
  • Operation:
    • Address Allocation: When a device connects to a network, it sends a DHCP Discover message to the DHCP server, requesting an IP address.
    • Lease Assignment: The DHCP server receives the Discover message and responds with a DHCP Offer, offering an available IP address along with lease duration and other configuration parameters.
    • Address Request: The device selects one of the offered IP addresses and sends a DHCP Request message to the server, confirming the lease assignment.
    • Address Acknowledgment: The DHCP server acknowledges the request by sending a DHCP Acknowledgment (ACK) message to the device, confirming the lease assignment and providing the configuration details.

Let's address each question with detailed explanations:

16. Elaborate BOOTP Protocol.

  • BOOTP Protocol (Bootstrap Protocol):
  • The Bootstrap Protocol (BOOTP) is a network protocol used to assign IP addresses and other configuration information to network devices, particularly diskless workstations, during the boot process.
  • Functioning:
    • When a device boots up and initializes its network interface, it broadcasts a BOOTP request packet on the local network.
    • A BOOTP server, typically a DHCP server configured to support BOOTP requests, responds with a BOOTP reply packet containing the IP address, subnet mask, default gateway, and other network parameters.
    • Once the device receives the configuration information, it can complete the boot process and establish network connectivity.
  • BOOTP uses UDP as the transport protocol and operates on port 67 for server-side communication and port 68 for client-side communication.
  • Although BOOTP was widely used in the past, it has largely been superseded by DHCP (Dynamic Host Configuration Protocol), which offers more advanced features and flexibility.

17. Discuss Simple Network Management Protocol (SNMP).

  • Simple Network Management Protocol (SNMP):
  • SNMP is an application layer protocol used for managing and monitoring network devices and systems.
  • Functionality:
    • SNMP operates in a manager-agent architecture, where network management stations (managers) communicate with network devices (agents) to collect information and perform management tasks.
    • Managers use SNMP to query agents for information about device status, performance metrics, and configuration settings.
    • Agents, embedded in network devices such as routers, switches, and servers, maintain a Management Information Base (MIB) containing data organized in a hierarchical structure.
    • SNMP allows managers to monitor network traffic, detect faults, configure devices remotely, and perform other administrative tasks.
  • SNMP uses UDP as the transport protocol and operates on port 161 for receiving SNMP requests and port 162 for receiving SNMP traps (asynchronous notifications).
  • SNMP versions include SNMPv1, SNMPv2c, and SNMPv3, each offering different levels of security and functionality.

18. Elaborate on how the Hyper Text Transfer Protocol (HTTP) works.

  • Hyper Text Transfer Protocol (HTTP):
  • HTTP is an application layer protocol used for transmitting and receiving hypertext documents on the World Wide Web.
  • Functioning:
    • When a client (such as a web browser) initiates an HTTP request, it establishes a TCP connection with the server on port 80 (default for HTTP) or port 443 for HTTPS.
    • The client sends an HTTP request message to the server, specifying the desired action (e.g., GET, POST), the URL of the requested resource, and additional headers.
    • The server processes the request, retrieves the requested resource (e.g., HTML document, image, video) from its storage or generates it dynamically, and constructs an HTTP response message.
    • The server sends the HTTP response message back to the client, containing the requested resource along with metadata such as status code, content type, and response headers.
    • Upon receiving the response, the client renders the content, displays it to the user, and may issue additional requests for embedded resources (e.g., images, scripts, stylesheets) referenced in the original document.
  • HTTP is stateless, meaning each request-response cycle is independent of previous interactions. To maintain session state and user identity, techniques like cookies and session tokens are commonly used.

19. Compare DHCP and BOOTP.

  • DHCP (Dynamic Host Configuration Protocol) and BOOTP (Bootstrap Protocol):
  • Functionality:
    • Both DHCP and BOOTP are used to assign IP addresses and configuration parameters to network devices during the boot process.
    • DHCP is a more advanced and flexible protocol that supports dynamic address allocation, lease renewal, and additional configuration options compared to BOOTP.
    • BOOTP, originally designed for diskless workstations, requires manual configuration of IP addresses and lacks features like lease management and automatic IP allocation.
  • Features:
    • DHCP supports dynamic allocation of IP addresses from a pool, automatic lease renewal, and centralized management through DHCP servers.
    • BOOTP assigns static IP addresses to devices based on their MAC addresses and requires manual configuration of IP address mappings on the server.
    • DHCP provides support for options such as subnet mask, default gateway, DNS server, and domain name, whereas BOOTP offers limited configuration parameters.
    • DHCP operates on ports 67 and 68, while BOOTP uses the same ports for server and client communication.
    • In practical terms, DHCP has largely replaced BOOTP due to its enhanced features and scalability.

20. Compare HTTP and HTTPS.

Point of Comparison HTTP HTTPS
Protocol Definition Hypertext Transfer Protocol Hypertext Transfer Protocol Secure
Security Not secure, data is transmitted in plain text Secure, data is encrypted using SSL/TLS encryption
Data Encryption No encryption Data encryption using SSL/TLS encryption
Port Typically uses port 80 Typically uses port 443
URI Begins with "http://" Begins with "https://"
Certificate Required Not required SSL/TLS certificate required for secure connection
Authentication No built-in authentication mechanism Supports client and server authentication
Data Integrity Data may be altered during transmission Ensures data integrity through encryption and hashing
Performance Generally faster due to lack of encryption overhead Slightly slower due to encryption overhead
Browser Indication Not indicated in the browser Indicated by a padlock icon or "Secure" label
SEO Impact No SEO advantage HTTPS can have a positive impact on SEO rankings