Deeps

483 views
440 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
483
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Deeps

  1. 1. CHETAN S IS021 DEEPAK P.J IS022 PAVAN.R IS062 PHANEESH L.N IS066
  2. 2. TCP/IP MODEL
  3. 3. TCP <ul><li>The Transmission Control Protocol (TCP) is one of the core protocols of the internet protocol suit. </li></ul><ul><li>provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. </li></ul><ul><li>provides a communication service at an intermediate level between an application program and the internet protocol (IP). </li></ul>
  4. 4. <ul><li>TCP detects the lost IP packets and requests for the retransmission of these packets. </li></ul><ul><li>TCP is optimized for accurate delivery rather than timely delivery. </li></ul><ul><li>It uses a technique known as positive acknowledgment with retransmission to guarantee reliability of the transfer of packets. </li></ul>
  5. 5. TCP header
  6. 6. IP <ul><li>The Internet Protocol (IP) is a protocol used for communicating data across a packet switched internetwork using the internet protocol suit. </li></ul><ul><li>TASK – delivering the packets from the source host to the destination host solely based on their addresses. </li></ul>
  7. 7. FTP <ul><li>FTP is used to exchange and manipulate files over a TCP/IP based networks. </li></ul><ul><li>built on a client server architecture and utilizes separate control and data connections between the client and server applications. </li></ul><ul><li>FTP servers listen on the well-known port number 21 (IANA-reserved) </li></ul><ul><li>Objectives </li></ul><ul><li>>promote sharing of files. </li></ul><ul><li>>encourage indirect or implicit use of ……remote computers. </li></ul><ul><li>>transfer data reliably and efficiently. </li></ul>
  8. 8. SMTP <ul><li>Simple Mail Transfer Protocol (SMTP) is an Internet standard for e-mail transmission across the IP networks. </li></ul><ul><li>SMTP is a text based protocol. </li></ul>
  9. 9. IP UTILITIES <ul><li>TYPES </li></ul><ul><li>CONNECTIVITY UTILITIES </li></ul><ul><li>DIAGNOSTIC UTILITIES </li></ul><ul><li>SERVER BASED UTILITIES </li></ul>
  10. 10. CONNECTIVITY UTILITIES <ul><li>FTP </li></ul><ul><li>TFTP </li></ul><ul><li>TELNET </li></ul><ul><li>REXEC </li></ul><ul><li>RCP </li></ul><ul><li>RSH </li></ul>
  11. 11. TFTP [Trivial file transfer protocol] <ul><li>Used to transfer files to/from a remote computer. </li></ul><ul><li>Computer should be running TFTP service or daemon. </li></ul><ul><li>Servers are typically UNIX based. </li></ul>
  12. 12. SYNTAX <ul><li>tftp [-i(optional)] [Host] [{get |put}] [Source] [Destination] </li></ul><ul><li>Ex : tftp 192.168.1.101 get new.txt C:documents ew.txt </li></ul>
  13. 13. <ul><li>Uses UDP port 69 as its transport protocol. </li></ul><ul><li>The file is sent in fixed length blocks of 512 bytes. </li></ul><ul><li>TFTP supports three different transfer modes, netascii, octet and mail. </li></ul><ul><li>This command is available only if the Internet Protocol (TCP/IP) protocol is installed as a component in the properties of a network adapter in Network Connections. </li></ul>
  14. 14. <ul><li>USES </li></ul><ul><li>TFTP is used to read files from, or write files to, a remote server. </li></ul><ul><li>It was useful for booting computers such as routers which did not not have any data storage devices. </li></ul><ul><li>DISADVANTAGES </li></ul><ul><li>TFTP cannot list directory contents. </li></ul><ul><li>TFTP has no authentication or encryption mechanisms. </li></ul>
  15. 15. DIAGNOSTIC UTILITIES <ul><li>NETSTAT </li></ul><ul><li>PATHPING </li></ul><ul><li>PING </li></ul><ul><li>TRACERT </li></ul><ul><li>IPCONFIG </li></ul><ul><li>NBTSTAT </li></ul><ul><li>ROUTE </li></ul><ul><li>LPQ </li></ul><ul><li>NSLOOKUP </li></ul><ul><li>NETSH </li></ul>
  16. 16. PATHPING <ul><li>Works for windows series only. </li></ul><ul><li>Combines features of ping and tracert. </li></ul><ul><li>Each node is pinged individually in a single command. </li></ul><ul><li>The behaviour of each node is studied over an extended period. </li></ul>
  17. 17. NETSH <ul><li>Locally or remotely change network configuration of a computer. </li></ul><ul><li>To run a group of commands against a computer. </li></ul><ul><li>Interacts with OS through dll. </li></ul>
  18. 18. NSLOOKUP <ul><li>It is to query internet domain name servers. </li></ul><ul><li>Information for a particular host or domain or all the records of the domain like address, domain name etc; </li></ul>

×