SlideShare a Scribd company logo
1 of 84
Download to read offline
gatesmasher
https://www.youtube.com/watch?v=VEXamVtq1yI
Source Port defines the port of the application, which is sending the data. So, this
field contains the source port address, which is 16 bits.
Destination Port-- defines the port of the application on the receiving side. So,
this field contains the destination port address, which is 16 bits.
It represents an
urgent pointer. If it is
set, then the data is
processed urgently.
If the ACK is
set to 0,
then it
means that
the data
packet does
not contain
an
acknowledg
ment.
Working of TCP--In TCP, the connection is established by using three-way handshaking. The client sends the segment with its sequence number. The server, in return, sends its segment with
its own sequence number as well as the acknowledgement sequence, which is one more than the client sequence number. When the client receives the acknowledgment of its segment, then
it sends the acknowledgment to the server. In this way, the connection is established between the client and the server.
Disadvantage of TCP
It increases a large amount of overhead as each segment gets its own TCP
header, so fragmentation by the router increases the overhead.
relay -broadcast
Connection-oriented
services require a
bandwidth of a high
range
Connection-less Service
requires a bandwidth of low
range.
eg TCP eg UDP
ans written in notes
QoS-It is overall performance measure of a computer network.
In Leaky Bucket- The input rate can vary, but the output rate
remains constant. Similarly, in networking, a technique called
leaky bucket can smooth out bursty traffic. Bursty chunks are
stored in the bucket and sent out at an average rate.
Token bucket--In this, the bucket holds tokens generated at regular intervals of time.If
there is a ready packet , a token is removed from Bucket and packet is send.If there is
no token in the bucket, then the packet cannot be sent.
In leaky
bucket- When
the host has
to send a
packet ,
packet is
thrown in
bucket.
simple mail transfer protocol
Hypertext transfer protocol
IIII. SNMP
SNMP provides the following three basic capabilities: (i) Get: enables the management station to retrieve the value of objects at the agent; (ii) Set: enables the
management station to set the value of objects at the agent; (iii) Trap: enables an agent to notify the management station of significant events."
specify and control
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf
aktu-computer-network-quantum-rotated.pdf

More Related Content

What's hot

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 
Data Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITSData Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITS
Avijeet Negel
 

What's hot (20)

Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Chapter 5 : Link Layer
Chapter 5 : Link LayerChapter 5 : Link Layer
Chapter 5 : Link Layer
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
High speed lan
High speed lanHigh speed lan
High speed lan
 
Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Decomposition technique In Software Engineering
Decomposition technique In Software Engineering
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Data link layer
Data link layer Data link layer
Data link layer
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Network software
Network softwareNetwork software
Network software
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Icmp
IcmpIcmp
Icmp
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Data Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITSData Communication And Networking - DATA RATE LIMITS
Data Communication And Networking - DATA RATE LIMITS
 
Static networks
Static networksStatic networks
Static networks
 

Similar to aktu-computer-network-quantum-rotated.pdf

5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
ZahouAmel1
 
Transmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksTransmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer Networks
Manimaran A
 

Similar to aktu-computer-network-quantum-rotated.pdf (20)

TCP.docx
TCP.docxTCP.docx
TCP.docx
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptx
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Tcp
TcpTcp
Tcp
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Osi model
Osi modelOsi model
Osi model
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
lecturer3.pptx
lecturer3.pptxlecturer3.pptx
lecturer3.pptx
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
計概
計概計概
計概
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptx
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Transmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer NetworksTransmission Control Protocol_ Computer Networks
Transmission Control Protocol_ Computer Networks
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 

Recently uploaded

一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
c3384a92eb32
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
mikehavy0
 

Recently uploaded (20)

Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 

aktu-computer-network-quantum-rotated.pdf

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Source Port defines the port of the application, which is sending the data. So, this field contains the source port address, which is 16 bits. Destination Port-- defines the port of the application on the receiving side. So, this field contains the destination port address, which is 16 bits.
  • 57. It represents an urgent pointer. If it is set, then the data is processed urgently. If the ACK is set to 0, then it means that the data packet does not contain an acknowledg ment. Working of TCP--In TCP, the connection is established by using three-way handshaking. The client sends the segment with its sequence number. The server, in return, sends its segment with its own sequence number as well as the acknowledgement sequence, which is one more than the client sequence number. When the client receives the acknowledgment of its segment, then it sends the acknowledgment to the server. In this way, the connection is established between the client and the server. Disadvantage of TCP It increases a large amount of overhead as each segment gets its own TCP header, so fragmentation by the router increases the overhead.
  • 58. relay -broadcast Connection-oriented services require a bandwidth of a high range Connection-less Service requires a bandwidth of low range. eg TCP eg UDP
  • 59. ans written in notes
  • 60.
  • 61.
  • 62.
  • 63. QoS-It is overall performance measure of a computer network. In Leaky Bucket- The input rate can vary, but the output rate remains constant. Similarly, in networking, a technique called leaky bucket can smooth out bursty traffic. Bursty chunks are stored in the bucket and sent out at an average rate. Token bucket--In this, the bucket holds tokens generated at regular intervals of time.If there is a ready packet , a token is removed from Bucket and packet is send.If there is no token in the bucket, then the packet cannot be sent. In leaky bucket- When the host has to send a packet , packet is thrown in bucket.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. simple mail transfer protocol Hypertext transfer protocol
  • 71. SNMP provides the following three basic capabilities: (i) Get: enables the management station to retrieve the value of objects at the agent; (ii) Set: enables the management station to set the value of objects at the agent; (iii) Trap: enables an agent to notify the management station of significant events."
  • 72.