SlideShare a Scribd company logo
1 of 4
Download to read offline
The communication channel consists of the below procedure how the communication happens
between the web browser and web server
Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one
you're reading right now). A protocol is really nothing but a standard way of doing things. If you
were to meet the President of the United States, or the king of a country, there would be specific
procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There
would be a specific way to walk, to talk, a standard greeting, and a standard way to end the
conversation. Protocols in the TCP/IP stack serve the same purpose.
The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer
there are different protocols that are used to standardize the flow of information, and each one is
a computer program (running on your computer) that's used to format the information into a
packet as it's moving down the TCP/IP stack. A packet is a combination of the Application
Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network
Layer takes the packet and turns it into a frame).
The Application Layer
This consists of all applications that use the network to transfer data. It does not care about how
the data gets between two points and it knows very little about the status of the network.
Applications pass data to the next layer in the TCP/IP stack and then continue to perform other
functions until a reply is received. The Application Layer uses host names (like
www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text
Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic
mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a
few.
The main purpose of the Application Layer is to provide a common command language and
syntax between applications that are running on different operating systems -kind of like an
interpreter. The data that is sent by an application that uses the network is formatted to conform
to one of several set standards. The receiving computer can understand the data that is being sent
even if it is running a different operating system than the sender due to the standards that all
network applications conform to.
The Transport Layer
...is responsible for assigning source and destination port numbers to applications. Port numbers
are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers
from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public
(standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS
(udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from
256 to 1023 are assigned by the IANA to companies for the applications that they sell.
Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are
using to read this page, for example. Windows will only assign port numbers up to 5000 -more
than enough port numbers for a Windows based PC. Each application has a unique port number
assigned to it by the transport layer so that as data is received by the Transport Layer it knows
which application to give the data to. An example is when you have more than one browser
window running. Each window is a separate instance of the program that you use to surf the web,
and each one has a different port number assigned to it so you can go to www.dalantech.com in
one browser window and this site does not load into another browser window. Applications like
FireFox that use tabbed windows simply have a unique port number assigned to each tab
The Internet Layer
...is the "glue" that holds networking together. It permits the sending, receiving, and routing of
data.
The Network Layer
Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical
medium that is used to transmit and receive data. The Network Layer uses Media Access Control
(MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an
interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers
that allow you to clone the MAC address of the NIC in your PC.
we can still use communication channel cloud symbol for that communication that happens
through google.
Solution
The communication channel consists of the below procedure how the communication happens
between the web browser and web server
Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one
you're reading right now). A protocol is really nothing but a standard way of doing things. If you
were to meet the President of the United States, or the king of a country, there would be specific
procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There
would be a specific way to walk, to talk, a standard greeting, and a standard way to end the
conversation. Protocols in the TCP/IP stack serve the same purpose.
The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer
there are different protocols that are used to standardize the flow of information, and each one is
a computer program (running on your computer) that's used to format the information into a
packet as it's moving down the TCP/IP stack. A packet is a combination of the Application
Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network
Layer takes the packet and turns it into a frame).
The Application Layer
This consists of all applications that use the network to transfer data. It does not care about how
the data gets between two points and it knows very little about the status of the network.
Applications pass data to the next layer in the TCP/IP stack and then continue to perform other
functions until a reply is received. The Application Layer uses host names (like
www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text
Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic
mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a
few.
The main purpose of the Application Layer is to provide a common command language and
syntax between applications that are running on different operating systems -kind of like an
interpreter. The data that is sent by an application that uses the network is formatted to conform
to one of several set standards. The receiving computer can understand the data that is being sent
even if it is running a different operating system than the sender due to the standards that all
network applications conform to.
The Transport Layer
...is responsible for assigning source and destination port numbers to applications. Port numbers
are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers
from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public
(standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS
(udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from
256 to 1023 are assigned by the IANA to companies for the applications that they sell.
Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are
using to read this page, for example. Windows will only assign port numbers up to 5000 -more
than enough port numbers for a Windows based PC. Each application has a unique port number
assigned to it by the transport layer so that as data is received by the Transport Layer it knows
which application to give the data to. An example is when you have more than one browser
window running. Each window is a separate instance of the program that you use to surf the web,
and each one has a different port number assigned to it so you can go to www.dalantech.com in
one browser window and this site does not load into another browser window. Applications like
FireFox that use tabbed windows simply have a unique port number assigned to each tab
The Internet Layer
...is the "glue" that holds networking together. It permits the sending, receiving, and routing of
data.
The Network Layer
Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical
medium that is used to transmit and receive data. The Network Layer uses Media Access Control
(MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an
interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers
that allow you to clone the MAC address of the NIC in your PC.
we can still use communication channel cloud symbol for that communication that happens
through google.

More Related Content

Similar to The communication channel consists of the below procedure how the co.pdf

Similar to The communication channel consists of the below procedure how the co.pdf (20)

How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Internet
InternetInternet
Internet
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Bt0076, tcpip
Bt0076, tcpipBt0076, tcpip
Bt0076, tcpip
 
Web tcp ip
Web tcp ipWeb tcp ip
Web tcp ip
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 

More from ajitdoll

This is a displacement reaction not precipitation.pdf
                     This is a displacement reaction not precipitation.pdf                     This is a displacement reaction not precipitation.pdf
This is a displacement reaction not precipitation.pdfajitdoll
 
Quality control the focus of quality control is on deliverables .pdf
    Quality control  the focus of quality control is on deliverables .pdf    Quality control  the focus of quality control is on deliverables .pdf
Quality control the focus of quality control is on deliverables .pdfajitdoll
 
We know that in general acids and bases are very .pdf
                     We know that in general acids and bases are very .pdf                     We know that in general acids and bases are very .pdf
We know that in general acids and bases are very .pdfajitdoll
 
where is data .pdf
                     where is data                                   .pdf                     where is data                                   .pdf
where is data .pdfajitdoll
 
The name of the given compound is 2-hydoxy propan.pdf
                     The name of the given compound is 2-hydoxy propan.pdf                     The name of the given compound is 2-hydoxy propan.pdf
The name of the given compound is 2-hydoxy propan.pdfajitdoll
 
Substitution Reactions of Benzene and Other Aroma.pdf
                     Substitution Reactions of Benzene and Other Aroma.pdf                     Substitution Reactions of Benzene and Other Aroma.pdf
Substitution Reactions of Benzene and Other Aroma.pdfajitdoll
 
sp2 Solu.pdf
                     sp2                                      Solu.pdf                     sp2                                      Solu.pdf
sp2 Solu.pdfajitdoll
 
Oxidised Al(s) Reduced Cu2+(aq) .pdf
                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf
Oxidised Al(s) Reduced Cu2+(aq) .pdfajitdoll
 
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdfajitdoll
 
Leu-Phen-Val-Met .pdf
                     Leu-Phen-Val-Met                                 .pdf                     Leu-Phen-Val-Met                                 .pdf
Leu-Phen-Val-Met .pdfajitdoll
 
I believe you do. I recall most reactants used i.pdf
                     I believe you do.  I recall most reactants used i.pdf                     I believe you do.  I recall most reactants used i.pdf
I believe you do. I recall most reactants used i.pdfajitdoll
 
hello When you add NaOH to benzoic acid a neutra.pdf
                     hello  When you add NaOH to benzoic acid a neutra.pdf                     hello  When you add NaOH to benzoic acid a neutra.pdf
hello When you add NaOH to benzoic acid a neutra.pdfajitdoll
 
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdfWhen a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdfajitdoll
 
When You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdfWhen You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdfajitdoll
 
conductivity = k. no of ions in solution NaI = N.pdf
                     conductivity = k. no of ions in solution  NaI = N.pdf                     conductivity = k. no of ions in solution  NaI = N.pdf
conductivity = k. no of ions in solution NaI = N.pdfajitdoll
 
treatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdftreatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdfajitdoll
 
The first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdfThe first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdfajitdoll
 
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdfThe apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdfajitdoll
 
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdfIt is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdfajitdoll
 
sorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdfsorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdfajitdoll
 

More from ajitdoll (20)

This is a displacement reaction not precipitation.pdf
                     This is a displacement reaction not precipitation.pdf                     This is a displacement reaction not precipitation.pdf
This is a displacement reaction not precipitation.pdf
 
Quality control the focus of quality control is on deliverables .pdf
    Quality control  the focus of quality control is on deliverables .pdf    Quality control  the focus of quality control is on deliverables .pdf
Quality control the focus of quality control is on deliverables .pdf
 
We know that in general acids and bases are very .pdf
                     We know that in general acids and bases are very .pdf                     We know that in general acids and bases are very .pdf
We know that in general acids and bases are very .pdf
 
where is data .pdf
                     where is data                                   .pdf                     where is data                                   .pdf
where is data .pdf
 
The name of the given compound is 2-hydoxy propan.pdf
                     The name of the given compound is 2-hydoxy propan.pdf                     The name of the given compound is 2-hydoxy propan.pdf
The name of the given compound is 2-hydoxy propan.pdf
 
Substitution Reactions of Benzene and Other Aroma.pdf
                     Substitution Reactions of Benzene and Other Aroma.pdf                     Substitution Reactions of Benzene and Other Aroma.pdf
Substitution Reactions of Benzene and Other Aroma.pdf
 
sp2 Solu.pdf
                     sp2                                      Solu.pdf                     sp2                                      Solu.pdf
sp2 Solu.pdf
 
Oxidised Al(s) Reduced Cu2+(aq) .pdf
                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf
Oxidised Al(s) Reduced Cu2+(aq) .pdf
 
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
 
Leu-Phen-Val-Met .pdf
                     Leu-Phen-Val-Met                                 .pdf                     Leu-Phen-Val-Met                                 .pdf
Leu-Phen-Val-Met .pdf
 
I believe you do. I recall most reactants used i.pdf
                     I believe you do.  I recall most reactants used i.pdf                     I believe you do.  I recall most reactants used i.pdf
I believe you do. I recall most reactants used i.pdf
 
hello When you add NaOH to benzoic acid a neutra.pdf
                     hello  When you add NaOH to benzoic acid a neutra.pdf                     hello  When you add NaOH to benzoic acid a neutra.pdf
hello When you add NaOH to benzoic acid a neutra.pdf
 
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdfWhen a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
 
When You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdfWhen You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdf
 
conductivity = k. no of ions in solution NaI = N.pdf
                     conductivity = k. no of ions in solution  NaI = N.pdf                     conductivity = k. no of ions in solution  NaI = N.pdf
conductivity = k. no of ions in solution NaI = N.pdf
 
treatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdftreatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdf
 
The first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdfThe first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdf
 
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdfThe apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
 
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdfIt is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
 
sorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdfsorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdf
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

The communication channel consists of the below procedure how the co.pdf

  • 1. The communication channel consists of the below procedure how the communication happens between the web browser and web server Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one you're reading right now). A protocol is really nothing but a standard way of doing things. If you were to meet the President of the United States, or the king of a country, there would be specific procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There would be a specific way to walk, to talk, a standard greeting, and a standard way to end the conversation. Protocols in the TCP/IP stack serve the same purpose. The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer there are different protocols that are used to standardize the flow of information, and each one is a computer program (running on your computer) that's used to format the information into a packet as it's moving down the TCP/IP stack. A packet is a combination of the Application Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network Layer takes the packet and turns it into a frame). The Application Layer This consists of all applications that use the network to transfer data. It does not care about how the data gets between two points and it knows very little about the status of the network. Applications pass data to the next layer in the TCP/IP stack and then continue to perform other functions until a reply is received. The Application Layer uses host names (like www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a few. The main purpose of the Application Layer is to provide a common command language and syntax between applications that are running on different operating systems -kind of like an interpreter. The data that is sent by an application that uses the network is formatted to conform to one of several set standards. The receiving computer can understand the data that is being sent even if it is running a different operating system than the sender due to the standards that all network applications conform to. The Transport Layer ...is responsible for assigning source and destination port numbers to applications. Port numbers are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public (standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS (udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from
  • 2. 256 to 1023 are assigned by the IANA to companies for the applications that they sell. Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are using to read this page, for example. Windows will only assign port numbers up to 5000 -more than enough port numbers for a Windows based PC. Each application has a unique port number assigned to it by the transport layer so that as data is received by the Transport Layer it knows which application to give the data to. An example is when you have more than one browser window running. Each window is a separate instance of the program that you use to surf the web, and each one has a different port number assigned to it so you can go to www.dalantech.com in one browser window and this site does not load into another browser window. Applications like FireFox that use tabbed windows simply have a unique port number assigned to each tab The Internet Layer ...is the "glue" that holds networking together. It permits the sending, receiving, and routing of data. The Network Layer Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical medium that is used to transmit and receive data. The Network Layer uses Media Access Control (MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers that allow you to clone the MAC address of the NIC in your PC. we can still use communication channel cloud symbol for that communication that happens through google. Solution The communication channel consists of the below procedure how the communication happens between the web browser and web server Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one you're reading right now). A protocol is really nothing but a standard way of doing things. If you were to meet the President of the United States, or the king of a country, there would be specific procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There would be a specific way to walk, to talk, a standard greeting, and a standard way to end the conversation. Protocols in the TCP/IP stack serve the same purpose. The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer there are different protocols that are used to standardize the flow of information, and each one is a computer program (running on your computer) that's used to format the information into a packet as it's moving down the TCP/IP stack. A packet is a combination of the Application
  • 3. Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network Layer takes the packet and turns it into a frame). The Application Layer This consists of all applications that use the network to transfer data. It does not care about how the data gets between two points and it knows very little about the status of the network. Applications pass data to the next layer in the TCP/IP stack and then continue to perform other functions until a reply is received. The Application Layer uses host names (like www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a few. The main purpose of the Application Layer is to provide a common command language and syntax between applications that are running on different operating systems -kind of like an interpreter. The data that is sent by an application that uses the network is formatted to conform to one of several set standards. The receiving computer can understand the data that is being sent even if it is running a different operating system than the sender due to the standards that all network applications conform to. The Transport Layer ...is responsible for assigning source and destination port numbers to applications. Port numbers are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public (standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS (udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from 256 to 1023 are assigned by the IANA to companies for the applications that they sell. Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are using to read this page, for example. Windows will only assign port numbers up to 5000 -more than enough port numbers for a Windows based PC. Each application has a unique port number assigned to it by the transport layer so that as data is received by the Transport Layer it knows which application to give the data to. An example is when you have more than one browser window running. Each window is a separate instance of the program that you use to surf the web, and each one has a different port number assigned to it so you can go to www.dalantech.com in one browser window and this site does not load into another browser window. Applications like FireFox that use tabbed windows simply have a unique port number assigned to each tab The Internet Layer ...is the "glue" that holds networking together. It permits the sending, receiving, and routing of data.
  • 4. The Network Layer Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical medium that is used to transmit and receive data. The Network Layer uses Media Access Control (MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers that allow you to clone the MAC address of the NIC in your PC. we can still use communication channel cloud symbol for that communication that happens through google.