Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Semester 5 - Network Protocol


Published on

Fundamental of Web Design

Published in: Education, Technology
  • Be the first to comment

Semester 5 - Network Protocol

  1. 1. NETWORK PROTOCOL MMD2093 FUNDAMENTAL OF WEB DESIGN PENSYARAH : PUAN KHAIRUL NOOR AZWA BINTI KAMARUDDIN NAMA AHLI : Khor Ai Ling (1111100188) Nabihah Binti Wahab (1111101301) Amira Binti Ahmad Radzi (1111101036) Norrasidah Binti Md Noor (1111101016) Aina Nabilah Abdul Rashid (1111101032) Nur Aisyahtul Amira Binti Zulkefli (1111101033) DIPLOMA IN MANAGEMENT WITH MULTIMEDIA (DMG10)
  2. 2. WHAT IS NETWORK PROTOCOLS?  A network protocol defines rules that allow for communication between network devices or a set of rules that govern the format of messages so they can be exchanged successfully.  When you have two or more computers connected to each other, you have a network.  The purpose of a network is to enable the sharing of files and information between multiple systems.  A specific set of communication rules is called a protocol rules that govern the communications between two computers connected to the network.
  3. 3. TCP / IP  TCP/IP based networks play an increasingly important role .  TCP stands for Transmission Control Protocol and IP stands for Internet Protocol.  The term TCP/IP is not limited just to these two protocols.
  4. 4.  Group of protocols related to the TCP and IP protocols such as :  Telnet  DNS (Domain Name Service)  SMTP (Simple Mail Transfer Protocol)  POP (Post Office Protocol )  FTP (File Transfer Protocol )  HTTP (Hypertext Transfer Protocol)  HTTPS (HyperText Transport Protocol Secure )  SSL (Secure Sockets Layer) TCP / IP
  5. 5. TELNET  Standard application protocol for remote login/ it provides the encoding rules to link a user’s keyboard/display on a client (“user”) system with a command interpreter on remote server system. also incorporated within others application protocols such as example, FTP and SMTP
  6. 6. SMTP (SIMPLE MAIL TRANSFER PROTOCOL)  The Simple Mail Transport Protocol (SMTP) controls the transfer of email messages on the Internet.  SMTP defines the interaction between Internet hosts that participate in forwarding email from a sender to its destination.
  7. 7. POP (POST OFFICE PROTOCOL )  The Post Office Protocol (POP) allows you to fetch email that is waiting in a mail server mailbox.  POP defines a number of operations for how to access and store email on your server.
  8. 8. FTP (FILE TRANSFER PROTOCOL )  is the primary internet standard for files transfer.  FTP is a method to transfer files across the Internet using an FTP client program.  FTP is commonly used on school networks and by Web publishers.  The File Transfer Protocol (FTP) is used widely on the Internet for transferring files to and from a remote host.
  9. 9. HTTP (HYPERTEXT TRANSFER PROTOCOL)  HTTP is the foundation of data communication for the World Wide Web.  Hypertext is a multi-linear set of objects.  Building a network using hyperlinks.  For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.  Transmit and receive data in an unsecured manner
  10. 10. HTTPS (HYPERTEXT TRANSPORT PROTOCOL SECURE )  Transmit and receive data in a secured manner  Examples of sites that use HTTPS include banking and investment websites, e-commerce websites, and most websites that require you to log in.  You can tell if a website is secure by viewing the URL in the address field of your Web Browser.  If the Web address starts with https://, you know you are accessing a secure website.  Most browsers will also display a lock icon somewhere along the edge of the window to indicate the website you are currently visiting is secure.  You can click the lock icon to view the secure certificate that authenticates the website.
  11. 11. SSL (SECURE SOCKETS LAYER)  This link ensures that all data passed between the web server and browsers remain private .  SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers.  SSL provides a way to ensure that the security is being provided to the transaction and the data in use.
  12. 12. COMMAND PROMPT What is a command prompt ?  Non-graphical interface that allows you to interact with your operating system.  At the command prompt, you enter commands by typing their names followed by options and arguments.  Most modern computers use a graphical user interface (GUI), which allows users to access programs and documents.  Some programs and commands are still only available only through a command prompt.
  13. 13. What is a command prompt use for ?  used to execute entered command  most commonly used to execute batch files, perform advanced administrative functions, and troubleshoot and solve certain kinds of Windows issues.
  14. 14. How to access the command prompt ?  can be accessed via the Command Prompt shortcut located in the Accessories program group in Windows.  Another way to access Command Prompt would be to execute CMD or CMD.EXE from the Run dialog box
  15. 15. How to used a command prompt ?  you must enter a valid command along with any optional parameters.  executes the command as entered and performs whatever task or function it's designed to perform in Windows. Availability command prompt ? Available on:  every Windows NT-based operating system which includes Windows 7, Windows Vista, Windows XP, Windows 2000, and Windows Server 2008/2003.