Kinds of Internet Protocols:
Internet protocols are different kinds of Internet connections for different things on the internet. They help in the access, transfer, exchange and downloading associated with files, or information on the web. Without these protocols, the Internet wouldn't be, as we know it today because many browsers wouldn't work without the permission of those protocols. There are different kinds of Internet protocols each serving another purpose. These are

1. Email transfer protocol

This protocol enables the use and availability associated with email, it is what the mailbox is to letters. It includes three other protocols that make transfer and access from the emails; these are the easy mail transfer protocol (SMTP), the web message access protocol (IMAP) and also the Post office protocol 3 (POP3). The IMAP and POP3 are the protocols that permit you to receive emails while the SMTP can be used when sending emails hence the actual "transfer" part. These three protocols are embedded in many web browsers.


This protocol is used like a server of Usenet forums that focus on organizational forums that have various topics of discussion. These forums are divided to topics, subjects or styles. This protocol offers a platform where they may be discussed and views exchanged.

 3. Document retrieval protocols

As the title suggest, this protocols allow you to retrieve information from the web to the computer or in the computer to the Internet. Though it's now redundant, you could utilize it to view the files should you knew the name of the file or properties about this.

4. FTP (File Transfer Protocol)

The file transfer protocol is a protocol that enables you to move one file from your computer to another on the web. You can also log onto a computer remotely and access the files inside it with authority from the additional computer. This protocol also allows downloading of applications from the web.

5. Telnet

This protocol enables you to access a remote computer. It works so you are able to look at files on the other computer as you were there by telneting right into a specific file or application within the remote computer and you'll be able to see what is on the actual computer. It is a beloved with many hackers.

6. Gopher

Gopher enables you to know a few details in regards to a file, application or a description of the file before you download this. These files could be on the remote computer and gopher enables you to view these files in the hierarchical manner and delivers these phones you when you search them about the server.


This protocol allows web servers to exhibit and display all the facets of a webpage. They form the very first part of every web address so that all web pages or web site. This protocol makes it possible for the file transfer protocol to complete its work.