SlideShare a Scribd company logo
1 of 34
A Presentation Report
On
““ NETWORKNETWORK
PROTOCOLS ”PROTOCOLS ”
Electronics & Communication
Year 2012-13.
Submitted By:
Shah Nautami
NetworkNetwork :-:-
A network is a set of devices (often referred to as
nodes) connected by communication links. A
node can be a computer, printer, or any other
device capable of sending and/or receiving data
generated by other nodes on the network.
What is network protocol ?What is network protocol ?
The network protocol is a set of
very detailed rules, sequences, message
formats, and procedures that
computer systems use and understand
when exchanging data with each
other.
Overview :-Overview :-
Reverse Address Resolution Protocol
(RARP)
Internet protocolInternet protocol
( IP )( IP )
IP :-IP :-
 Unreliable & connectionless datagram protocol –
best-effort delievery service.
 Must be paired with a reliable protocol such as
TCP.
Ex. Post office service.
 It transports data in packets called datagram. It
consisting of two parts : (1) Header & (2) Data.
 Header contains information essential to routing
& delievery.
Version
(4 bits)
HLEN
(4 bits)
Service
type
(8 bits)
Total length
(16 bits)
Identification (16 bits) Flags
(3 bits)
Fragmentatio
n offset
(13 bits)
Time to live
(8 bits)
Protocol
(8 bits)
Header checksum
(16 bits)
Source IP address
Destination IP address
Option
Header Data
Address Resolution protocol
( ARP )
ARP :-
• ARP associates an IP address with its physical address. On aARP associates an IP address with its physical address. On a
typical physical network, such as a LAN, each device on atypical physical network, such as a LAN, each device on a
link is identified by a physical or station address that islink is identified by a physical or station address that is
usually imprinted on the NIC.usually imprinted on the NIC.
• ARP is used to find the physical address of the node whenARP is used to find the physical address of the node when
its internet address is known.its internet address is known.
• Anytime a host , or a router , needs to find the physicalAnytime a host , or a router , needs to find the physical
address of another host on its now , it format an ARP queryaddress of another host on its now , it format an ARP query
packet that includes the ip address and broadcast it over thepacket that includes the ip address and broadcast it over the
n/w .n/w .
REQUEST
Fig . ARP Request
Fig . ARP Responce
Looking for any MAC add. :
A46EF45983AB
•ARP and RARP :-
• Four cases using ARP :-
Reverse Address Resolution
Protocol
(RARP)
RARPRARP :-
• RARP finds the logical address for aRARP finds the logical address for a
machine that only knows its physicalmachine that only knows its physical
address.address.
• The host wishing to retrieve its IPThe host wishing to retrieve its IP
address broadcasts an RARP queryaddress broadcasts an RARP query
packet that contains its physical addresspacket that contains its physical address
to every host on its physical network. ato every host on its physical network. a
server on the network recognizes theserver on the network recognizes the
RARP packet & returns the host ‘ s IPRARP packet & returns the host ‘ s IP
address .address .
WHY DO WE NEED RARP ?
 A host to have its IP address store in its hard
disk .
 Now what if the host is a dioskless computer .
 OR what if computer is being connect to the n/w
for a first time .
 OR what if you get new computer but you
decide to keep old NIC .
RARP operation :-RARP operation :-
ARP and RARP :-
 RARP works much like ARP.
 The Internet is based on IP addresses .
 Protocols may have different (MAC)
addresses .
 The ARP and RARP protocols perform
the translation between IP addresses
and MAC layer addresses .
Internet Group MessageInternet Group Message
protocolprotocol
( IGMP )( IGMP )
IGMP :-
 Internet Group Management Protocol (IGMP) is a
communications protocol used by hosts and
adjacent routers on IP networks to establish
multicast group membership .
 IGMP is an integral part of the IP multicast
specification. IGMP can be used for online
streaming video and gaming, and allows more
efficient use of resources when supporting these
types of applications .
 IGMP is used on IPv4 networks.
Fig . : IGMP operation
IGMP OPERATION :-IGMP OPERATION :-
Host Operations
– To receive multicast datagram , a host
must join a group . To join a group , the
host sends an IGMP membership report
packet through an attached interface .
IGMP OPERATION :-
 Multicast Router Operations
– Multicast routers listen to all multicast
addresses to detect
membership reports .
• 1. receiver (host) signals to join a group ,
• 2. creates an entry in the local group database .
• 3. To verify group membership , multicast routers
regularly send an IGMP
Query message .
Fig. : Query & Report message
Internet Control MessageInternet Control Message
ProtocolProtocol
(ICMP)(ICMP)
ICMP :-ICMP :-
 ICMP is used by host and routers to send
notification of datagram problems back to the
sender .
 ICMP used for just error detection it will not correct
that error .
 If a datagram travels from router to router untill
it reaches it one that can deliever it to its final
destination . If a router is unable to deliever the
datagram because of unsual conditions , ICMP
allows it to inform original source .
ICMP messages :-
 ICMP messages are divided into
error-reporting messages and query
messages.
 The error-reporting messages report
problems that a router or a host
(destination) may encounter.
 The query messages get specific
information from a router or another
host.
Table :Table : ICMPICMP messagesmessages
Destination-unreachable messages with
codes 3 can be created only by the
destination host .
Other destination-unreachable
messages can be created only by
routers.
Note:Note:
Example of error-reporting
message :-
target host is reachebaltarget host is reachebal
or not ?or not ?
An echo-request message can
be sent by a host or router.
An echo-reply message is
sent by the host or router
which receives an echo-
request message.
Note:Note:
Example of query message :-
Nnnnnn

More Related Content

What's hot (20)

Arp
ArpArp
Arp
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
ARP
ARPARP
ARP
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Rarp
RarpRarp
Rarp
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IP Routing
IP RoutingIP Routing
IP Routing
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
Ch21 network layer final
Ch21 network layer finalCh21 network layer final
Ch21 network layer final
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 

Viewers also liked

C# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENTC# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENTDr. Awase Khirni Syed
 
Data controls ppt
Data controls pptData controls ppt
Data controls pptIblesoft
 
ASP.NET Presentation
ASP.NET PresentationASP.NET Presentation
ASP.NET Presentationdimuthu22
 
The ASP.NET Web API for Beginners
The ASP.NET Web API for BeginnersThe ASP.NET Web API for Beginners
The ASP.NET Web API for BeginnersKevin Hazzard
 
data controls in asp.net
data controls in asp.netdata controls in asp.net
data controls in asp.netsubakrish
 
ASP.NET Web API
ASP.NET Web APIASP.NET Web API
ASP.NET Web APIhabib_786
 
ASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP FundamentalsASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP FundamentalsIdo Flatow
 
Server Controls of ASP.Net
Server Controls of ASP.NetServer Controls of ASP.Net
Server Controls of ASP.NetHitesh Santani
 
Concepts of Asp.Net
Concepts of Asp.NetConcepts of Asp.Net
Concepts of Asp.Netvidyamittal
 
Asp.NET Validation controls
Asp.NET Validation controlsAsp.NET Validation controls
Asp.NET Validation controlsGuddu gupta
 
ASP.NET 10 - Data Controls
ASP.NET 10 - Data ControlsASP.NET 10 - Data Controls
ASP.NET 10 - Data ControlsRandy Connolly
 
ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1Kumar S
 

Viewers also liked (18)

Asp.net basic
Asp.net basicAsp.net basic
Asp.net basic
 
C# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENTC# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENT
 
ASP.NET Web form
ASP.NET Web formASP.NET Web form
ASP.NET Web form
 
Ch 7 data binding
Ch 7 data bindingCh 7 data binding
Ch 7 data binding
 
Data controls ppt
Data controls pptData controls ppt
Data controls ppt
 
ASP.NET Presentation
ASP.NET PresentationASP.NET Presentation
ASP.NET Presentation
 
Asp.net
 Asp.net Asp.net
Asp.net
 
The ASP.NET Web API for Beginners
The ASP.NET Web API for BeginnersThe ASP.NET Web API for Beginners
The ASP.NET Web API for Beginners
 
data controls in asp.net
data controls in asp.netdata controls in asp.net
data controls in asp.net
 
ASP.NET Web API
ASP.NET Web APIASP.NET Web API
ASP.NET Web API
 
ASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP FundamentalsASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP Fundamentals
 
Server Controls of ASP.Net
Server Controls of ASP.NetServer Controls of ASP.Net
Server Controls of ASP.Net
 
Concepts of Asp.Net
Concepts of Asp.NetConcepts of Asp.Net
Concepts of Asp.Net
 
Asp.NET Validation controls
Asp.NET Validation controlsAsp.NET Validation controls
Asp.NET Validation controls
 
ASP.NET 10 - Data Controls
ASP.NET 10 - Data ControlsASP.NET 10 - Data Controls
ASP.NET 10 - Data Controls
 
Web forms in ASP.net
Web forms in ASP.netWeb forms in ASP.net
Web forms in ASP.net
 
ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1
 
Introduction to asp.net
Introduction to asp.netIntroduction to asp.net
Introduction to asp.net
 

Similar to Nnnnnn

Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1arun0501
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocolsIUBAT
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptxMuhammadMoosaPanhwar
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPhamsa nandhini
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Network layer protocols.pptx
Network layer protocols.pptxNetwork layer protocols.pptx
Network layer protocols.pptxMNSUAM
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferenceCengage Learning
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 

Similar to Nnnnnn (20)

Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Network layer protocols.pptx
Network layer protocols.pptxNetwork layer protocols.pptx
Network layer protocols.pptx
 
Tcp
TcpTcp
Tcp
 
Arpwatch
ArpwatchArpwatch
Arpwatch
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
Unit05
Unit05Unit05
Unit05
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Nnnnnn

  • 1. A Presentation Report On ““ NETWORKNETWORK PROTOCOLS ”PROTOCOLS ” Electronics & Communication Year 2012-13. Submitted By: Shah Nautami
  • 2. NetworkNetwork :-:- A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network.
  • 3. What is network protocol ?What is network protocol ? The network protocol is a set of very detailed rules, sequences, message formats, and procedures that computer systems use and understand when exchanging data with each other.
  • 4. Overview :-Overview :- Reverse Address Resolution Protocol (RARP)
  • 6. IP :-IP :-  Unreliable & connectionless datagram protocol – best-effort delievery service.  Must be paired with a reliable protocol such as TCP. Ex. Post office service.  It transports data in packets called datagram. It consisting of two parts : (1) Header & (2) Data.  Header contains information essential to routing & delievery.
  • 7. Version (4 bits) HLEN (4 bits) Service type (8 bits) Total length (16 bits) Identification (16 bits) Flags (3 bits) Fragmentatio n offset (13 bits) Time to live (8 bits) Protocol (8 bits) Header checksum (16 bits) Source IP address Destination IP address Option Header Data
  • 9. ARP :- • ARP associates an IP address with its physical address. On aARP associates an IP address with its physical address. On a typical physical network, such as a LAN, each device on atypical physical network, such as a LAN, each device on a link is identified by a physical or station address that islink is identified by a physical or station address that is usually imprinted on the NIC.usually imprinted on the NIC. • ARP is used to find the physical address of the node whenARP is used to find the physical address of the node when its internet address is known.its internet address is known. • Anytime a host , or a router , needs to find the physicalAnytime a host , or a router , needs to find the physical address of another host on its now , it format an ARP queryaddress of another host on its now , it format an ARP query packet that includes the ip address and broadcast it over thepacket that includes the ip address and broadcast it over the n/w .n/w .
  • 10. REQUEST Fig . ARP Request
  • 11. Fig . ARP Responce Looking for any MAC add. : A46EF45983AB
  • 13. • Four cases using ARP :-
  • 15. RARPRARP :- • RARP finds the logical address for aRARP finds the logical address for a machine that only knows its physicalmachine that only knows its physical address.address. • The host wishing to retrieve its IPThe host wishing to retrieve its IP address broadcasts an RARP queryaddress broadcasts an RARP query packet that contains its physical addresspacket that contains its physical address to every host on its physical network. ato every host on its physical network. a server on the network recognizes theserver on the network recognizes the RARP packet & returns the host ‘ s IPRARP packet & returns the host ‘ s IP address .address .
  • 16. WHY DO WE NEED RARP ?  A host to have its IP address store in its hard disk .  Now what if the host is a dioskless computer .  OR what if computer is being connect to the n/w for a first time .  OR what if you get new computer but you decide to keep old NIC .
  • 17. RARP operation :-RARP operation :-
  • 18. ARP and RARP :-  RARP works much like ARP.  The Internet is based on IP addresses .  Protocols may have different (MAC) addresses .  The ARP and RARP protocols perform the translation between IP addresses and MAC layer addresses .
  • 19. Internet Group MessageInternet Group Message protocolprotocol ( IGMP )( IGMP )
  • 20. IGMP :-  Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group membership .  IGMP is an integral part of the IP multicast specification. IGMP can be used for online streaming video and gaming, and allows more efficient use of resources when supporting these types of applications .  IGMP is used on IPv4 networks.
  • 21. Fig . : IGMP operation
  • 22. IGMP OPERATION :-IGMP OPERATION :- Host Operations – To receive multicast datagram , a host must join a group . To join a group , the host sends an IGMP membership report packet through an attached interface .
  • 23. IGMP OPERATION :-  Multicast Router Operations – Multicast routers listen to all multicast addresses to detect membership reports . • 1. receiver (host) signals to join a group , • 2. creates an entry in the local group database . • 3. To verify group membership , multicast routers regularly send an IGMP Query message .
  • 24. Fig. : Query & Report message
  • 25. Internet Control MessageInternet Control Message ProtocolProtocol (ICMP)(ICMP)
  • 26. ICMP :-ICMP :-  ICMP is used by host and routers to send notification of datagram problems back to the sender .  ICMP used for just error detection it will not correct that error .  If a datagram travels from router to router untill it reaches it one that can deliever it to its final destination . If a router is unable to deliever the datagram because of unsual conditions , ICMP allows it to inform original source .
  • 27.
  • 28. ICMP messages :-  ICMP messages are divided into error-reporting messages and query messages.  The error-reporting messages report problems that a router or a host (destination) may encounter.  The query messages get specific information from a router or another host.
  • 29. Table :Table : ICMPICMP messagesmessages
  • 30. Destination-unreachable messages with codes 3 can be created only by the destination host . Other destination-unreachable messages can be created only by routers. Note:Note:
  • 31. Example of error-reporting message :- target host is reachebaltarget host is reachebal or not ?or not ?
  • 32. An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo- request message. Note:Note:
  • 33. Example of query message :-