SlideShare a Scribd company logo
Tcp and introduction to protocol
TCP/IP
Netware protocol suite
LINK SUPPORT LAYER (LSL)
Stands for Transmission Control Protocol and Internet Protocol is collection/suite of
protocols like IP, Bootp, ARP, FTP, HTTP, ICMP, HTTP etc
Multiple Link Interface Driver (MLID) :-
 it is Novell’s name for a network interface board driver.
MLID is a software that complies with Novell’s open data link interface (ODI)
architecture.
It is the interface between an mlid and the upper layer protocol stacks.
IEEE 802 x Standards
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.1 – physical layer, data link layer and Network layer
IEEE 802.2 – data link layer
IEEE 802.3 , IEEE 802.4, IEEE 802.5, 802.8, IEEE 802.9, IEEE 802.11, IEEE
802.12 – physical layer
IEEE 802-10 – transport layer, Network layer, Data link layer, physical layer.
Used for physical topology
Mechanical and electrical specifications of transmission media.
Rules for bit encoding.
Used for LLC (logical link control)
Used for connection services
Error control.
This establishes rules for Ethernet networking and specification.
Signaling mode 1- Broad Band
2- Base band
Base band Signalling:
1)Uses digital signalling
2)No frequency-division multiplexing
3)Bi-directional transmission
4)Signal travels over short distances
Broadband Signalling:
1)Uses analogue signalling
2)Unidirectional transmission
3)Frequency-division multiplexing is possible
4)Signal can travel over long distances before being attenuated
Broad Band
Base Band
IEEE 802.4
IEEE 802.5
IEEE 802.6
On a network using digital signal the transmission medium is used for a single
channel.
On a network using analogue signal the bandwidth of the transmission media is
divided into multiple channel. This enable transmission of multiple signal
through these channels.
Used for topologies
Used for media access control
Cat cable and optical fiber cable identifier.
Used for token passing Ring
Used to support a data transfer technology called as Distributed Queue Dual
Bus(DQDB).
IEEE 802.7
IEEE 802.8
IEEE 802.9
IEEE 802.10
IEEE 802.11
IEEE 802.12
Used for broadband communication.
Defines fiber optic technology.
This integrates voice transmission with data transmission.
Used for encryption mechanism.
Used for wireless lan (Wi-Fi)
This defines standard for 100-mbps physical star topologies.
IPX (Internet packet exchange protocol)
UDP (User Datagram Protocol)
IP (Internetwork Protocol)
Connection less (datagram) Protocol.
Derived from XNS’s Internetwork Datagram Protocol (IDP)
IPX addresses and routes packets from one location to another on an IPX
internetwork.
UDP (User Datagram Protocol) is a communications protocol that offers
a limited amount of service when messages are exchanged between
computers in a network that uses the Internet Protocol (IP). UDP is an
alternative to the Transmission Control Protocol (TCP) and, together with
IP known as UDP/IP.
It a connectionless packet switched network layer implementation that
performs addressing route selection.
IP can also fragments packets into smaller parts.
IP moves datagram through the internetwork one hop at a time by
referencing dynamic route tables at each hop.
IP performs a small amount of error control through a header checksum.
ADDRESS RESOLUTION PROTOCOL (ARP)
SIMPLE MESSEGE TRANSFER PROTOCOL (SMTP)
POST OFFICE PROTOCOL (POP)
INTERNET MESSAGE ACCESS PROTOCOL (IMAP)
Short for Address Resolution Protocol, a network layer protocol used to convert
an IP address into a physical address (called a DLC address), such as an
Ethernet address.
Short for Simple Mail Transfer Protocol, a protocol used for sending e-mail
messages between servers. Most e-mail systems that send mail over the Internet
use SMTP to send messages from one server to another; the messages can then
be retrieved with an e-mail client using either POP or IMAP.
short for Post Office Protocol, a protocol used to retrieve e-mail from a mail
server. Most e-mail applications (sometimes called an e-mail client) use the
POP protocol, although some can use the newer IMAP (Internet Message
Access Protocol)
Short for Internet Message Access Protocol, a protocol for retrieving e-mail
messages. The latest version, IMAP4, is similar to POP3 but supports some
additional features. For example, with IMAP4, you can search through your e-
mail messages for keywords while the messages are still on mail server. You can
then choose which messages to download to your machine.
SYSTEM NETWORK ARCHITECHTURE (SNA)
KEY SNA PROTOCOLS
Short for Systems Network Architecture, a set of network protocols developed by
IBM. Originally designed in 1974 for IBM's mainframe computers, SNA has
evolved over the years so that it now also supports peer-to-peer networks of
workstations
IBM’s proprietary network architecture
Define the general characteristics of computer hardware and software required
for interconnection.
Transaction service
Presentation service
Data flow control
Transmission control
Path control
Data link control
Physical control
Token Ring
Synchronous data link control (SDLC)
SNA Distribution Service (SNAD)
Document interchange architecture (DIA)
COMPARE DOD MODEL WITH OSI MODEL AND TCP/IP PROTOCOL
SUITE
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link Layer
Physical Layer
Process/Application
layer
Host-Host layer
Internet Layer
Network Layer
Telnet, DNS, DHCP,
Proxy, FTP, HTTP
TCP, UDP
IP, ICMP, ARP,
BOOTP
802.3(ethernet),802.1
1(wi-Fi), 802.5(Token
Ring), FDDI
OSI DOD TCP/IP
Internet Protocol(IP)
Internet Control Message Protocol (ICMP)
Transmission Control Protocol (TCP)
IP provides the specification that allow the routing fragments and reassemble
packets. While routing a data packet to a destination, the data packet is
fragmented to improve the efficiency of throughput, as the fragmented packets
can adopt different path on a network and they have to travel serially(one after
one). Again the fragmented packets are reassembled at the destination point by
using packet header. This process is accomplished with the help of IP. And the
packet delivered by the IP are called Transport Protocol Data Unit(TDPU).
The ICMP operate with IP to provide control on internetwork error and
intermission. It deals with erroneous massages. A massage by ICMP protocol is
sent to the source host when IP cannot deliver a packet and it discarded when
there is problem occurred on the network.
It is one of the primary protocol of the TCP/IP suite. It accepts messages of any
length from an upper layer protocol. The data unit used by TCP are called
segments. The TCP data segments are encapsulated within an IP header.
SERVICES PROVIDED BY TCP
Application/Process Layer protocol
Types Of Application Layer Protocol
Full duplex transmission
Flow control transmission
Connection oriented transmission
Acknowledge oriented transmission
Telnet
FTP
HTTP
SMTP
POP3
SNMP
NNTP
IMAP
DHCP
DNS
The application defines guidelines for application in user interface and
communication between applications. This layer know as the upper layer of
the OSI model.
INTERNET LAYER PROTOCOLS
IP
ICMP
ARP
BOOTP
RARP
Are used to load data packets between different hosts
It provides the specifications that allow the routing, fragmentation and
reassemble of packets. It used to send data from one host to another host.
It operates with IP to provide internetwork error and control information.
Arp used to map the IP address of the host to its corresponding MAC address.
Bootstrap Protocol, or BOOTP, is a network protocol used by a network client
to obtain an IP address from a configuration server.
Reverse of ARP
Short for Reverse Address Resolution Protocol, a TCP/IP protocol that permits a
physical address, such as an Ethernet address, to be translated into an IP address.
Hosts such as diskless workstations often only know their hardware interface
addresses, or MAC address, when booted but not their IP addresses. They must
discover their IP addresses from an external source, usually a RARP server.
In computer networking, a port is an application-specific or process-specific
software construct serving as a communications endpoint. It is used by transport
protocols of the Internet Protocol Suite, such as Transmission Control Protocol
(TCP) and User Datagram Protocol (UDP). A specific port is identified by its
number, commonly known as the port number.
PORT
Ad

More Related Content

What's hot (20)

TCP IP
TCP IPTCP IP
TCP IP
hivasu
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
irenazd
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Dhani Ahmad
 
Assingment 2
Assingment 2Assingment 2
Assingment 2
Md. Sohanur Rahman
 
Mod5
Mod5Mod5
Mod5
Alam Garcia
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
farhan516
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
Syed Zaid Irshad
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
Harshit Srivastava
 
Tcp
TcpTcp
Tcp
giaolvq
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
PRINCE KUMAR
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
LuxoftTraining
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Frank Fang Kuo Yu
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
Rakhi Saxena
 
Network layer
Network layerNetwork layer
Network layer
Hasib Shaikh
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 

Viewers also liked (6)

Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
Sripati Mahapatra
 
Subnetting
SubnettingSubnetting
Subnetting
Sripati Mahapatra
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
Sajith Ekanayaka
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
INTEGRATED CIRCUIT
INTEGRATED CIRCUITINTEGRATED CIRCUIT
INTEGRATED CIRCUIT
Sripati Mahapatra
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
Sripati Mahapatra
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
Sripati Mahapatra
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
Sajith Ekanayaka
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
Sripati Mahapatra
 
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTERANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
ANALOG TO DIGITAL AND DIGITAL TO ANALOG CONVERTER
Sripati Mahapatra
 
Ad

Similar to Tcp and introduction to protocol (20)

The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
Jake Weaver
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Kollins Lolong
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
Arti Parab Academics
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
Anwal Mirza
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
rp5373568
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Mukesh Gautam
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
KANNANKR12
 
tcp-ip-ppt-140212011249-pptpresentaion02.pdf
tcp-ip-ppt-140212011249-pptpresentaion02.pdftcp-ip-ppt-140212011249-pptpresentaion02.pdf
tcp-ip-ppt-140212011249-pptpresentaion02.pdf
RiturajSingh130410
 
Tcp ip-ppt
Tcp ip-pptTcp ip-ppt
Tcp ip-ppt
suganyababu14
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
hariprasadnr
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
TCP&IP Model.pptx
TCP&IP Model.pptxTCP&IP Model.pptx
TCP&IP Model.pptx
karmaYonten5
 
tcp-ip-ppt-protocols-140212011249-phpapp02.ppt
tcp-ip-ppt-protocols-140212011249-phpapp02.ppttcp-ip-ppt-protocols-140212011249-phpapp02.ppt
tcp-ip-ppt-protocols-140212011249-phpapp02.ppt
piwig56192
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
Kumar Alok
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
aqeelhaider74
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
EnumulaBhargava1
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
Jake Weaver
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
Arti Parab Academics
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
rp5373568
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
KANNANKR12
 
tcp-ip-ppt-140212011249-pptpresentaion02.pdf
tcp-ip-ppt-140212011249-pptpresentaion02.pdftcp-ip-ppt-140212011249-pptpresentaion02.pdf
tcp-ip-ppt-140212011249-pptpresentaion02.pdf
RiturajSingh130410
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
tcp-ip-ppt-protocols-140212011249-phpapp02.ppt
tcp-ip-ppt-protocols-140212011249-phpapp02.ppttcp-ip-ppt-protocols-140212011249-phpapp02.ppt
tcp-ip-ppt-protocols-140212011249-phpapp02.ppt
piwig56192
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Ad

More from Sripati Mahapatra (10)

Windows 10 editions
Windows 10 editionsWindows 10 editions
Windows 10 editions
Sripati Mahapatra
 
Windows10 fundamental
Windows10 fundamentalWindows10 fundamental
Windows10 fundamental
Sripati Mahapatra
 
Raid Levels
Raid LevelsRaid Levels
Raid Levels
Sripati Mahapatra
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
configure IP address in command mode
configure IP address in command modeconfigure IP address in command mode
configure IP address in command mode
Sripati Mahapatra
 
Storage device
Storage deviceStorage device
Storage device
Sripati Mahapatra
 
Processor
ProcessorProcessor
Processor
Sripati Mahapatra
 
Mother board
Mother boardMother board
Mother board
Sripati Mahapatra
 
Basics of computer
Basics of computerBasics of computer
Basics of computer
Sripati Mahapatra
 
01.number systems
01.number systems01.number systems
01.number systems
Sripati Mahapatra
 

Recently uploaded (20)

UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Vibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdfVibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdf
Baiju Muthukadan
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Foundations of Cybersecurity - Google Certificate
Foundations of Cybersecurity - Google CertificateFoundations of Cybersecurity - Google Certificate
Foundations of Cybersecurity - Google Certificate
VICTOR MAESTRE RAMIREZ
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdfAI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
The Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdfThe Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdf
Precisely
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptxWebinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
MSP360
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Enterprise Integration Is Dead! Long Live AI-Driven Integration with Apache C...
Markus Eisele
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
James Anderson
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Vibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdfVibe Coding_ Develop a web application using AI (1).pdf
Vibe Coding_ Develop a web application using AI (1).pdf
Baiju Muthukadan
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025Zilliz Cloud Monthly Technical Review: May 2025
Zilliz Cloud Monthly Technical Review: May 2025
Zilliz
 
UiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer OpportunitiesUiPath Agentic Automation: Community Developer Opportunities
UiPath Agentic Automation: Community Developer Opportunities
DianaGray10
 
Foundations of Cybersecurity - Google Certificate
Foundations of Cybersecurity - Google CertificateFoundations of Cybersecurity - Google Certificate
Foundations of Cybersecurity - Google Certificate
VICTOR MAESTRE RAMIREZ
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdfAI You Can Trust: The Critical Role of Governance and Quality.pdf
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
The Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdfThe Changing Compliance Landscape in 2025.pdf
The Changing Compliance Landscape in 2025.pdf
Precisely
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptxWebinar - Top 5 Backup Mistakes MSPs and Businesses Make   .pptx
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptx
MSP360
 

Tcp and introduction to protocol

  • 2. TCP/IP Netware protocol suite LINK SUPPORT LAYER (LSL) Stands for Transmission Control Protocol and Internet Protocol is collection/suite of protocols like IP, Bootp, ARP, FTP, HTTP, ICMP, HTTP etc Multiple Link Interface Driver (MLID) :-  it is Novell’s name for a network interface board driver. MLID is a software that complies with Novell’s open data link interface (ODI) architecture. It is the interface between an mlid and the upper layer protocol stacks.
  • 3. IEEE 802 x Standards IEEE 802.1 IEEE 802.2 IEEE 802.3 IEEE 802.1 – physical layer, data link layer and Network layer IEEE 802.2 – data link layer IEEE 802.3 , IEEE 802.4, IEEE 802.5, 802.8, IEEE 802.9, IEEE 802.11, IEEE 802.12 – physical layer IEEE 802-10 – transport layer, Network layer, Data link layer, physical layer. Used for physical topology Mechanical and electrical specifications of transmission media. Rules for bit encoding. Used for LLC (logical link control) Used for connection services Error control. This establishes rules for Ethernet networking and specification. Signaling mode 1- Broad Band 2- Base band
  • 4. Base band Signalling: 1)Uses digital signalling 2)No frequency-division multiplexing 3)Bi-directional transmission 4)Signal travels over short distances Broadband Signalling: 1)Uses analogue signalling 2)Unidirectional transmission 3)Frequency-division multiplexing is possible 4)Signal can travel over long distances before being attenuated
  • 5. Broad Band Base Band IEEE 802.4 IEEE 802.5 IEEE 802.6 On a network using digital signal the transmission medium is used for a single channel. On a network using analogue signal the bandwidth of the transmission media is divided into multiple channel. This enable transmission of multiple signal through these channels. Used for topologies Used for media access control Cat cable and optical fiber cable identifier. Used for token passing Ring Used to support a data transfer technology called as Distributed Queue Dual Bus(DQDB).
  • 6. IEEE 802.7 IEEE 802.8 IEEE 802.9 IEEE 802.10 IEEE 802.11 IEEE 802.12 Used for broadband communication. Defines fiber optic technology. This integrates voice transmission with data transmission. Used for encryption mechanism. Used for wireless lan (Wi-Fi) This defines standard for 100-mbps physical star topologies.
  • 7. IPX (Internet packet exchange protocol) UDP (User Datagram Protocol) IP (Internetwork Protocol) Connection less (datagram) Protocol. Derived from XNS’s Internetwork Datagram Protocol (IDP) IPX addresses and routes packets from one location to another on an IPX internetwork. UDP (User Datagram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP) and, together with IP known as UDP/IP. It a connectionless packet switched network layer implementation that performs addressing route selection. IP can also fragments packets into smaller parts. IP moves datagram through the internetwork one hop at a time by referencing dynamic route tables at each hop. IP performs a small amount of error control through a header checksum.
  • 8. ADDRESS RESOLUTION PROTOCOL (ARP) SIMPLE MESSEGE TRANSFER PROTOCOL (SMTP) POST OFFICE PROTOCOL (POP) INTERNET MESSAGE ACCESS PROTOCOL (IMAP) Short for Address Resolution Protocol, a network layer protocol used to convert an IP address into a physical address (called a DLC address), such as an Ethernet address. Short for Simple Mail Transfer Protocol, a protocol used for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol) Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e- mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
  • 9. SYSTEM NETWORK ARCHITECHTURE (SNA) KEY SNA PROTOCOLS Short for Systems Network Architecture, a set of network protocols developed by IBM. Originally designed in 1974 for IBM's mainframe computers, SNA has evolved over the years so that it now also supports peer-to-peer networks of workstations IBM’s proprietary network architecture Define the general characteristics of computer hardware and software required for interconnection. Transaction service Presentation service Data flow control Transmission control Path control Data link control Physical control Token Ring Synchronous data link control (SDLC) SNA Distribution Service (SNAD) Document interchange architecture (DIA)
  • 10. COMPARE DOD MODEL WITH OSI MODEL AND TCP/IP PROTOCOL SUITE Application layer Presentation layer Session layer Transport layer Network layer Data link Layer Physical Layer Process/Application layer Host-Host layer Internet Layer Network Layer Telnet, DNS, DHCP, Proxy, FTP, HTTP TCP, UDP IP, ICMP, ARP, BOOTP 802.3(ethernet),802.1 1(wi-Fi), 802.5(Token Ring), FDDI OSI DOD TCP/IP
  • 11. Internet Protocol(IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) IP provides the specification that allow the routing fragments and reassemble packets. While routing a data packet to a destination, the data packet is fragmented to improve the efficiency of throughput, as the fragmented packets can adopt different path on a network and they have to travel serially(one after one). Again the fragmented packets are reassembled at the destination point by using packet header. This process is accomplished with the help of IP. And the packet delivered by the IP are called Transport Protocol Data Unit(TDPU). The ICMP operate with IP to provide control on internetwork error and intermission. It deals with erroneous massages. A massage by ICMP protocol is sent to the source host when IP cannot deliver a packet and it discarded when there is problem occurred on the network. It is one of the primary protocol of the TCP/IP suite. It accepts messages of any length from an upper layer protocol. The data unit used by TCP are called segments. The TCP data segments are encapsulated within an IP header.
  • 12. SERVICES PROVIDED BY TCP Application/Process Layer protocol Types Of Application Layer Protocol Full duplex transmission Flow control transmission Connection oriented transmission Acknowledge oriented transmission Telnet FTP HTTP SMTP POP3 SNMP NNTP IMAP DHCP DNS The application defines guidelines for application in user interface and communication between applications. This layer know as the upper layer of the OSI model.
  • 13. INTERNET LAYER PROTOCOLS IP ICMP ARP BOOTP RARP Are used to load data packets between different hosts It provides the specifications that allow the routing, fragmentation and reassemble of packets. It used to send data from one host to another host. It operates with IP to provide internetwork error and control information. Arp used to map the IP address of the host to its corresponding MAC address. Bootstrap Protocol, or BOOTP, is a network protocol used by a network client to obtain an IP address from a configuration server. Reverse of ARP
  • 14. Short for Reverse Address Resolution Protocol, a TCP/IP protocol that permits a physical address, such as an Ethernet address, to be translated into an IP address. Hosts such as diskless workstations often only know their hardware interface addresses, or MAC address, when booted but not their IP addresses. They must discover their IP addresses from an external source, usually a RARP server. In computer networking, a port is an application-specific or process-specific software construct serving as a communications endpoint. It is used by transport protocols of the Internet Protocol Suite, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). A specific port is identified by its number, commonly known as the port number. PORT