SlideShare a Scribd company logo
1 of 10
TCP/IP Model
The Internet protocol suite, commonly known as TCP/IP, is the set of
communications protocols used in the Internet and similar computer
networks.
The TCP/IP model consists of five layers:
1. Application layer
2. Transport layer
3. Internet layer
4. Network access layer
Application layer:
•HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us
to access the data over the world wide web. It transfers the data in the form
of plain text, audio, video. It is known as a Hypertext transfer protocol as it
has the efficiency to use in a hypertext environment where there are rapid
jumps from one document to another.
•SNMP: SNMP stands for Simple Network Management Protocol. It is a
framework used for managing the devices on the internet by using the
TCP/IP protocol suite.
•SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol
that supports the e-mail is known as a Simple mail transfer protocol. This
protocol is used to send the data to another e-mail address.
•DNS: DNS stands for Domain Name System. An IP address is used to
identify the connection of a host to the internet uniquely. But, people prefer
to use the names instead of addresses. Therefore, the system that maps the
name to the address is known as Domain Name System.
•TELNET: It is an abbreviation for Terminal Network. It establishes the
connection between the local computer and remote computer in such a way
that the local terminal appears to be a terminal at the remote system.
•FTP: FTP stands for File Transfer Protocol. FTP is a standard internet
protocol used for transmitting the files from one computer to another
computer.
Transport Layer:
TCP Protocol
TCP enables applications to communicate with each other as though they
were connected by a physical circuit. TCP sends data in a form that appears
to be transmitted in a character-by-character fashion, rather than as discrete
packets. This transmission consists of the following:
•Starting point, which opens the connection
•Entire transmission in byte order
•Ending point, which closes the connection.
TCP attaches a header onto the transmitted data. This header contains
many parameters that help processes on the sending system connect to
peer processes on the receiving system.
TCP confirms that a packet has reached its destination by establishing an
end-to-end connection between sending and receiving hosts. TCP is
therefore considered a “reliable, connection-oriented” protocol.
SCTP Protocol
SCTP is a reliable, connection-oriented transport layer protocol that provides
the same services to applications that are available from TCP. Moreover,
SCTP can support connections between systems that have more than one
address, or multihomed. The SCTP connection between sending and
receiving system is called an association. Data in the association is
organized in chunks. Because SCTP supports multihoming, certain
applications, particularly applications used by the telecommunications
industry, need to run over SCTP, rather than TCP.
UDP Protocol
UDP provides datagram delivery service. UDP does not verify connections
between receiving and sending hosts. Because UDP eliminates the
processes of establishing and verifying connections, applications that send
small amounts of data use UDP.
Internet Layer
1.IP – stands for Internet Protocol and it is responsible for delivering packets
from the source host to the destination host by looking at the IP addresses in
the packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently.
But IPv6 is growing as the number of IPv4 addresses are limited in number
when compared to the number of users.
2.ICMP – stands for Internet Control Message Protocol. It is encapsulated
within IP datagrams and is responsible for providing hosts with information
about network problems.
3.ARP – stands for Address Resolution Protocol. Its job is to find the
hardware address of a host from a known IP address. ARP has several
types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
Network Access Layer
•A network layer is the lowest layer of the TCP/IP model.
•A network layer is the combination of the Physical layer and Data Link layer
defined in the OSI reference model.
•It defines how the data should be sent physically through the network.
•This layer is mainly responsible for the transmission of the data between
two devices on the same network.
•The functions carried out by this layer are encapsulating the IP datagram
into frames transmitted by the network and mapping of IP addresses into
physical addresses.
•The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame
relay.
References
www.google.com
www.javatpoint.com
www.geeksforgeeks.org
https://docs.oracle.com

More Related Content

What's hot (20)

Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
OSI Model
OSI ModelOSI Model
OSI Model
 
TCP/IP Presentation
TCP/IP PresentationTCP/IP Presentation
TCP/IP Presentation
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Osi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.comOsi Layer model provided by TopTechy.com
Osi Layer model provided by TopTechy.com
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
OSI models
OSI modelsOSI models
OSI models
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Osi model
Osi modelOsi model
Osi model
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 

Similar to Tcp/Ip Model

presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentationNoor Khalid
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptxVivekTripathi684438
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.pptaymenshykh
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer scienceAnushida1
 
Presentation on tcp ip by kalyan kk
Presentation on tcp ip by kalyan kkPresentation on tcp ip by kalyan kk
Presentation on tcp ip by kalyan kkkalyan kumar
 

Similar to Tcp/Ip Model (20)

presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Tcp
TcpTcp
Tcp
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Presentation on tcp ip by kalyan kk
Presentation on tcp ip by kalyan kkPresentation on tcp ip by kalyan kk
Presentation on tcp ip by kalyan kk
 

More from ShofiqulIslam38

Lab Room Topology design with Cisco Packet Tracer
Lab Room Topology  design with Cisco Packet TracerLab Room Topology  design with Cisco Packet Tracer
Lab Room Topology design with Cisco Packet TracerShofiqulIslam38
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerShofiqulIslam38
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerShofiqulIslam38
 
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
Metropolitan  Area Network(MAN) design with Cisco Packet TracerMetropolitan  Area Network(MAN) design with Cisco Packet Tracer
Metropolitan Area Network(MAN) design with Cisco Packet TracerShofiqulIslam38
 
Hybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet TracerHybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet TracerShofiqulIslam38
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerShofiqulIslam38
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet TracerShofiqulIslam38
 
Bus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet TracerBus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet TracerShofiqulIslam38
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerShofiqulIslam38
 
Mesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet TracerMesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet TracerShofiqulIslam38
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topologyShofiqulIslam38
 
Basic Concepts of Computer Networking
 Basic Concepts of Computer Networking Basic Concepts of Computer Networking
Basic Concepts of Computer NetworkingShofiqulIslam38
 

More from ShofiqulIslam38 (13)

Lab Room Topology design with Cisco Packet Tracer
Lab Room Topology  design with Cisco Packet TracerLab Room Topology  design with Cisco Packet Tracer
Lab Room Topology design with Cisco Packet Tracer
 
Mail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet TracerMail Server Configure with Cisco Packet Tracer
Mail Server Configure with Cisco Packet Tracer
 
DNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet TracerDNS Server configure with Cisco Packet Tracer
DNS Server configure with Cisco Packet Tracer
 
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
Metropolitan  Area Network(MAN) design with Cisco Packet TracerMetropolitan  Area Network(MAN) design with Cisco Packet Tracer
Metropolitan Area Network(MAN) design with Cisco Packet Tracer
 
Hybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet TracerHybrid Topology design with Cisco Packet Tracer
Hybrid Topology design with Cisco Packet Tracer
 
Tree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet TracerTree Topology design with Cisco Packet Tracer
Tree Topology design with Cisco Packet Tracer
 
Ring Topology design with Cisco Packet Tracer
Ring  Topology design with Cisco Packet TracerRing  Topology design with Cisco Packet Tracer
Ring Topology design with Cisco Packet Tracer
 
Bus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet TracerBus Topology design with Cisco Packet Tracer
Bus Topology design with Cisco Packet Tracer
 
Star Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet TracerStar Topology design with Cisco Packet Tracer
Star Topology design with Cisco Packet Tracer
 
Mesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet TracerMesh Topology design with Cisco Packet Tracer
Mesh Topology design with Cisco Packet Tracer
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Basic Concepts of Computer Networking
 Basic Concepts of Computer Networking Basic Concepts of Computer Networking
Basic Concepts of Computer Networking
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Tcp/Ip Model

  • 2. The Internet protocol suite, commonly known as TCP/IP, is the set of communications protocols used in the Internet and similar computer networks.
  • 3. The TCP/IP model consists of five layers: 1. Application layer 2. Transport layer 3. Internet layer 4. Network access layer
  • 4. Application layer: •HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the world wide web. It transfers the data in the form of plain text, audio, video. It is known as a Hypertext transfer protocol as it has the efficiency to use in a hypertext environment where there are rapid jumps from one document to another. •SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the devices on the internet by using the TCP/IP protocol suite. •SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is known as a Simple mail transfer protocol. This protocol is used to send the data to another e-mail address.
  • 5. •DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the internet uniquely. But, people prefer to use the names instead of addresses. Therefore, the system that maps the name to the address is known as Domain Name System. •TELNET: It is an abbreviation for Terminal Network. It establishes the connection between the local computer and remote computer in such a way that the local terminal appears to be a terminal at the remote system. •FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files from one computer to another computer.
  • 6. Transport Layer: TCP Protocol TCP enables applications to communicate with each other as though they were connected by a physical circuit. TCP sends data in a form that appears to be transmitted in a character-by-character fashion, rather than as discrete packets. This transmission consists of the following: •Starting point, which opens the connection •Entire transmission in byte order •Ending point, which closes the connection. TCP attaches a header onto the transmitted data. This header contains many parameters that help processes on the sending system connect to peer processes on the receiving system. TCP confirms that a packet has reached its destination by establishing an end-to-end connection between sending and receiving hosts. TCP is therefore considered a “reliable, connection-oriented” protocol.
  • 7. SCTP Protocol SCTP is a reliable, connection-oriented transport layer protocol that provides the same services to applications that are available from TCP. Moreover, SCTP can support connections between systems that have more than one address, or multihomed. The SCTP connection between sending and receiving system is called an association. Data in the association is organized in chunks. Because SCTP supports multihoming, certain applications, particularly applications used by the telecommunications industry, need to run over SCTP, rather than TCP. UDP Protocol UDP provides datagram delivery service. UDP does not verify connections between receiving and sending hosts. Because UDP eliminates the processes of establishing and verifying connections, applications that send small amounts of data use UDP.
  • 8. Internet Layer 1.IP – stands for Internet Protocol and it is responsible for delivering packets from the source host to the destination host by looking at the IP addresses in the packet headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing as the number of IPv4 addresses are limited in number when compared to the number of users. 2.ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams and is responsible for providing hosts with information about network problems. 3.ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
  • 9. Network Access Layer •A network layer is the lowest layer of the TCP/IP model. •A network layer is the combination of the Physical layer and Data Link layer defined in the OSI reference model. •It defines how the data should be sent physically through the network. •This layer is mainly responsible for the transmission of the data between two devices on the same network. •The functions carried out by this layer are encapsulating the IP datagram into frames transmitted by the network and mapping of IP addresses into physical addresses. •The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay.