SSH and HTTPS
Telnet does not encrypt anything; that is why it is too insecure to use as a network protocol.
To encrypt data
frame
The answer is Protocol's. Protocol is the set of rules for formatting the data across the network.
Packets
ICMP (Internet Control Message Protocol)
Several port protocols are designed to encrypt communications, including Secure Sockets Layer (SSL) and Transport Layer Security (TLS), commonly used with HTTPS (port 443) for secure web traffic. Other protocols include Secure Shell (SSH) on port 22 for secure remote access and File Transfer Protocol Secure (FTPS) on port 990 for secure file transfers. Additionally, Internet Protocol Security (IPsec) can encrypt data at the network layer, often used in Virtual Private Networks (VPNs).
The File Transfer Protocol is a standard network protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server
a way for transmitting data form one computer to the another across a network is called as communication protocol
To ensure data delivery.to ensure that data arrives at its destination in the proper sequence
1 tcp transmission control protocol 2 udp protocol
L2TP is a tunneling protocol for an IP network. L2 data is transmitted over the network but has no encryption or authentication abilities. This type of protocol is usually paired with IPSec to provide encryption and authentication.