SlideShare a Scribd company logo
1 of 13
Protocols in computer network
As we all know that rules are very
important and required for the smooth
functioning of every institution.
Similarly, in a computer system we
have PROTOCOLS are nothing but the
rules and regulations in the context of
a computer system. They can be
implemented by hardware, software or
a combination of both.
WHAT EXACTLY IS A PROTOCOL?
 Rules and conventions explaining how something must be
done.
 Used to describe how devices can communicate.
 Protocol also defines the format of data i.e. to be
exchanged....
TCP/IP
It is the most important protocol consisting of a set of communication
protocols. Transmission control protocol (TCP) and the Internet
Protocol (IP) were the first networking protocol. Its functionality is
organized into four abstraction layers which are used to sort all
related protocols according to the scope of networking involved.
In computer networking, we have a process called Encapsulation which
is used to provide abstraction of protocols and services. It is a method
of designing Modular Communication in which a system is divided into
small parts called modes or logically separate functions in a network
are abstracted from their underlying structures by inclusion or
information hiding. In general, an application (the highest level of the
model) uses a set of protocols to send its data down the layers, being
further encapsulated at each level.
The four abstract layers are arranged as follow:
APPLICATION LAYER
It is where applications create user data and communicate this data to
other applications on another or the same host. This uses services
provided by the lower layers, especially the Transport Layer.
TRANSPORT LAYER
It performs host-to-host communications on either the same or
different hosts and on either the local network or remote networks.
INTERNET LAYER
The internet layer has the task of exchanging datagrams across network
boundaries.
LINK LAYER
It defines the networking methods within the scope of the local
network link on which hosts communicate without intervening routers.
POP3 IMAP SMTP
POP3 stands for Post Office
Protocol. POP3 allows an email
client to download an email from an
email server. The POP3 protocol is
simple and does not offer many
features except for download. Its
design assumes that the email
client downloads all available email
from the server, deletes them
from the server and then
disconnects. POP3 normally uses
port 110.
SMTP stands for
Simple Mail Transfer
Protocol. SMTP is used
when email is
delivered from an
email client, such as
Outlook Express, to an
email server or when
email is delivered
from one email server
to another. SMTP uses
port 25.
IMAP stands for Internet Message Access Protocol. IMAP shares many
similar features with POP3. It, too, is a protocol that an email client can
use to download email from an email server. However, IMAP includes
many more features than POP3. The IMAP protocol is designed to let users
keep their email on the server. IMAP requires more disk space on the
server and more CPU resources than POP3, as all emails are stored on the
server. IMAP normally uses port 143.
VoIP
Voice over IP or VoIP is a methodology and
group of technologies for the delivery of voice
communications and multimedia sessions over
IP networks. It has been implemented in
various ways using both proprietary protocols
and protocols based on open standards.
WORKING OF VoIP
VoIP systems employ session control and signaling protocols to control the
signaling, set up and teardown of calls. They transport audio streams over IP
networks using special media delivery protocols that encode voice, audio, video
with audio codecs, and video codecs as Digital audio by streaming media. Various
codecs exist that optimize the media stream based on application requirements
and network bandwidth; some implementations rely on narrowband and
compressed sheet, while others support high fidelity stereo codecs.
 PSTN (Public Switched Telephone network) is the world's collection of interconnected
voice-oriented public telephone networks, both commercial and government-owned.
 For option 2, no internet is provided because connectivity is dedicated to voice data
which assures high quality calls.
RTSP
The Real Time Streaming Protocol (RTSP) is a network control protocol designed
for use in entertainment and communications systems to control streaming
media servers. The protocol is used for establishing and controlling media
sessions between end points. Streaming media is multimedia that is constantly
received by and presented to an end-user while being delivered by a
provider. The transmission of streaming data itself is not a task of RTSP. Most
RTSP servers use the Real-time Transport Protocol (RTP) in conjunction
with Real-time Control Protocol (RTCP) for media stream delivery. However,
some vendors implement proprietary transport protocols. While similar in some
ways to HTTP, RTSP defines control sequences useful in controlling multimedia
playback. While HTTP is stateless, RTSP has state; an identifier is used when
needed to track concurrent sessions. Like HTTP, RTSP uses TCP to maintain an
end-to-end connection and, while most RTSP control messages are sent by the
client to the server, some commands travel in the other direction (i.e. from
server to client).
HTTPS
HTTPS, also known as HTTP secure is a protocol for secure communication
over a computer network which is widely used
on internet. The main motivation for HTTPS
is authentication of the visited website and
protection of the privacy and integrity of the
exchanged data. HTTPS creates a secure
channel over an insecure network. This ensures reasonable protection
from eavesdroppers and man-in-the-middle attacks, provided that
adequate cipher suites are used and that the server certificate is verified and
trusted.
How does HTTPS work?
DMCP
The Dynamic Host Configuration Protocol (DHCP) is a standardized network
protocol used on Internet Protocol (IP) networks.
When a computer or other networked device connects to a network, the DHCP
client software sends a broadcast query requesting necessary information. Any
DHCP server on the network may service the request. The DHCP server manages
a pool of IP addresses and information about client configuration parameters
such as default gateway, domain name, the name servers, and time servers.
On receiving a request, the server may respond with specific information for
each client, as previously configured by an administrator, or with a specific
address and any other information valid for the entire network and for the time
period for which the allocation (lease) is valid. A client typically queries for this
information immediately after booting, and periodically thereafter before the
expiration of the information. When a DHCP client refreshes an assignment, it
initially requests the same parameter values, but the DHCP server may assign a
new address based on the assignment policies set by administrators.
ICMP
The Internet Control Message Protocol (ICMP) is used by network devices, like
routers, to send error messages. ICMP can also be used to relay query messages.
It is assigned protocol number 1. ICMP messages are typically used for
diagnostic or control purposes or generated in response to errors
in IP operations. ICMP errors are directed to the source IP address of the
originating packet.
UDP
UDP stands for User Datagram Protocol .In UDP, the receiver does not
generate an acknowledgement of packet received and in turn, the sender does
not wait for any acknowledgement of packet sent. UDP provides two services not
provided by the IP layer. It provides port numbers to help distinguish different
user requests and, optionally, a checksum capability to verify that the data
arrived intact. UDP is unreliable and connectionless.
FTP
The File Transfer Protocol (FTP) is
used to transfer computer files between a
client and server on a computer network. It
is the simplest and most secure way to
exchange files over the internet. FTP is
built on client-server model architecture
and uses separate control and data connections between the client and the
server. FTP users may authenticate themselves with a clear-text sign-in
protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. FTP may run
in active or passive mode, which determines how the data connection is
established. In both cases, the client creates a TCP control connection from a
random, usually an unprivileged, port N to the FTP server command port 21.
 In active mode, the client starts listening for incoming data
connections from the server on port M. It sends the FTP command PORT
M to inform the server on which port it is listening. The server then
initiates a data channel to the client from its port 20, the FTP server
data port.
 In situations where the client is behind a firewall and unable to accept
incoming TCP connections, passive mode may be used. In this mode,
the client uses the control connection to send a PASV command to the
server and then receives a server IP address and server port number
from the server, which the client then uses to open a data connection
from an arbitrary client port to the server IP address and server port
number received.
ARP
The Address Resolution Protocol (ARP) is a protocol used by the Internet
Protocol (IP) to map IP network addresses to the hardware addresses used by a
data link protocol. The protocol operates below the network layer as a part of
the interface between the OSI network and OSI link layer. It is used the most
commonly used link layer protocol for (LANs) is Ethernet and is used to
support a range of network
layer protocols, including IP.
The address is "resolved"
using a protocol in which a
piece of information is sent by
a client process executing on
the local computer to a server
process executing on a remote
computer. The information received by the server allows the server to uniquely
identify the network system for which the address was required and therefore
to provide the required address. This process ends when the client receives a
response from the server containing the required address. Below is the Format
of an ARP message used to resolve the remote MAC Hardware Address (HA):
It is basically a model that characterizes and standardizes
the communication functions of a telecommunication or
computing system. Its main goal is to operate communication
systems with standard protocols. The model partitions a
communication system into abstraction layers that are
somewhat similar to the ones we learned about earlier.
TELNET
Telnet is an application layer protocol used on the Internet or local area
networks to provide a bidirectional interactive text-oriented communication
facility using a virtual terminal connection. User data is interspersed in-
band with Telnet control information in an 8-bit byte oriented data connection
over the Transmission Control Protocol (TCP). It is also known as the first
Internet.
In the old days, you had to physically walk to a server in order to access its data.
Even if the server had the hardware power to do multiple things at the same
time, you were blocked from using it at its full and you had to wait for others to
finish their work first. In many circumstances we couldn't even touch the actual
server.
Telnet brought extraordinary change. Using it meant you could simultaneously
connect multiple users to a single server. In order to connect to the server,
people only needed access to a terminal, which could be the simplest and
cheapest computer available. This computer didn't need to have powerful
hardware, it only needed a network connection and a text based interface.
NAME - PRIYA
CLASS - 10-C
ROLL NO. – 26
COMPUTER PROJECT FILE
PROTOCOLS
SUBMITTED TO –
MS. GEETU MA’AM

More Related Content

What's hot

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingAnjan Mahanta
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
What is Ethernet
What is EthernetWhat is Ethernet
What is EthernetSimplilearn
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 

What's hot (20)

TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Network software
Network softwareNetwork software
Network software
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Transport layer
Transport layer Transport layer
Transport layer
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 

Viewers also liked

Mail services and mail commands in linux
Mail services and mail commands in linuxMail services and mail commands in linux
Mail services and mail commands in linuxGracia Marcom
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure ShellWILLA REYES
 
09 telnet, remote dan ftp
09 telnet, remote dan ftp09 telnet, remote dan ftp
09 telnet, remote dan ftpNurul Hudin
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP PresentationHarish Chand
 
Instalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linuxInstalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linuxGer Hernandez
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)Raghu nath
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and GopherManoj Kumar
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]anil933
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)Cort1026
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnetAmandeep Kaur
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer ProtocolPeter R. Egli
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 

Viewers also liked (20)

E uugantuya bie daalt
E uugantuya bie daaltE uugantuya bie daalt
E uugantuya bie daalt
 
Mail services and mail commands in linux
Mail services and mail commands in linuxMail services and mail commands in linux
Mail services and mail commands in linux
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
09 telnet, remote dan ftp
09 telnet, remote dan ftp09 telnet, remote dan ftp
09 telnet, remote dan ftp
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Instalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linuxInstalación ftp, telnet y ssh sobre linux
Instalación ftp, telnet y ssh sobre linux
 
Ftp
FtpFtp
Ftp
 
Gariin avlaga
Gariin avlagaGariin avlaga
Gariin avlaga
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
 
Telnet
TelnetTelnet
Telnet
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
Protocols
ProtocolsProtocols
Protocols
 
Network protocol
Network protocolNetwork protocol
Network protocol
 

Similar to Protocols in computer network

Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfanjanacottonmills
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptxVivekTripathi684438
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer scienceAnushida1
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocolssiva rama
 

Similar to Protocols in computer network (20)

Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Mcse question
Mcse questionMcse question
Mcse question
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Common ports
Common portsCommon ports
Common ports
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 

Recently uploaded

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 

Protocols in computer network

  • 1. Protocols in computer network As we all know that rules are very important and required for the smooth functioning of every institution. Similarly, in a computer system we have PROTOCOLS are nothing but the rules and regulations in the context of a computer system. They can be implemented by hardware, software or a combination of both. WHAT EXACTLY IS A PROTOCOL?  Rules and conventions explaining how something must be done.  Used to describe how devices can communicate.  Protocol also defines the format of data i.e. to be exchanged....
  • 2. TCP/IP It is the most important protocol consisting of a set of communication protocols. Transmission control protocol (TCP) and the Internet Protocol (IP) were the first networking protocol. Its functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. In computer networking, we have a process called Encapsulation which is used to provide abstraction of protocols and services. It is a method of designing Modular Communication in which a system is divided into small parts called modes or logically separate functions in a network are abstracted from their underlying structures by inclusion or information hiding. In general, an application (the highest level of the model) uses a set of protocols to send its data down the layers, being further encapsulated at each level.
  • 3. The four abstract layers are arranged as follow: APPLICATION LAYER It is where applications create user data and communicate this data to other applications on another or the same host. This uses services provided by the lower layers, especially the Transport Layer. TRANSPORT LAYER It performs host-to-host communications on either the same or different hosts and on either the local network or remote networks. INTERNET LAYER The internet layer has the task of exchanging datagrams across network boundaries. LINK LAYER It defines the networking methods within the scope of the local network link on which hosts communicate without intervening routers.
  • 4. POP3 IMAP SMTP POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the email client downloads all available email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110. SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another. SMTP uses port 25. IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. It, too, is a protocol that an email client can use to download email from an email server. However, IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are stored on the server. IMAP normally uses port 143.
  • 5. VoIP Voice over IP or VoIP is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over IP networks. It has been implemented in various ways using both proprietary protocols and protocols based on open standards. WORKING OF VoIP VoIP systems employ session control and signaling protocols to control the signaling, set up and teardown of calls. They transport audio streams over IP networks using special media delivery protocols that encode voice, audio, video with audio codecs, and video codecs as Digital audio by streaming media. Various codecs exist that optimize the media stream based on application requirements and network bandwidth; some implementations rely on narrowband and compressed sheet, while others support high fidelity stereo codecs.  PSTN (Public Switched Telephone network) is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.  For option 2, no internet is provided because connectivity is dedicated to voice data which assures high quality calls.
  • 6. RTSP The Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points. Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a provider. The transmission of streaming data itself is not a task of RTSP. Most RTSP servers use the Real-time Transport Protocol (RTP) in conjunction with Real-time Control Protocol (RTCP) for media stream delivery. However, some vendors implement proprietary transport protocols. While similar in some ways to HTTP, RTSP defines control sequences useful in controlling multimedia playback. While HTTP is stateless, RTSP has state; an identifier is used when needed to track concurrent sessions. Like HTTP, RTSP uses TCP to maintain an end-to-end connection and, while most RTSP control messages are sent by the client to the server, some commands travel in the other direction (i.e. from server to client).
  • 7. HTTPS HTTPS, also known as HTTP secure is a protocol for secure communication over a computer network which is widely used on internet. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data. HTTPS creates a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted. How does HTTPS work?
  • 8. DMCP The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks. When a computer or other networked device connects to a network, the DHCP client software sends a broadcast query requesting necessary information. Any DHCP server on the network may service the request. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway, domain name, the name servers, and time servers. On receiving a request, the server may respond with specific information for each client, as previously configured by an administrator, or with a specific address and any other information valid for the entire network and for the time period for which the allocation (lease) is valid. A client typically queries for this information immediately after booting, and periodically thereafter before the expiration of the information. When a DHCP client refreshes an assignment, it initially requests the same parameter values, but the DHCP server may assign a new address based on the assignment policies set by administrators.
  • 9. ICMP The Internet Control Message Protocol (ICMP) is used by network devices, like routers, to send error messages. ICMP can also be used to relay query messages. It is assigned protocol number 1. ICMP messages are typically used for diagnostic or control purposes or generated in response to errors in IP operations. ICMP errors are directed to the source IP address of the originating packet. UDP UDP stands for User Datagram Protocol .In UDP, the receiver does not generate an acknowledgement of packet received and in turn, the sender does not wait for any acknowledgement of packet sent. UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests and, optionally, a checksum capability to verify that the data arrived intact. UDP is unreliable and connectionless.
  • 10. FTP The File Transfer Protocol (FTP) is used to transfer computer files between a client and server on a computer network. It is the simplest and most secure way to exchange files over the internet. FTP is built on client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. FTP may run in active or passive mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.  In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.  In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.
  • 11. ARP The Address Resolution Protocol (ARP) is a protocol used by the Internet Protocol (IP) to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer. It is used the most commonly used link layer protocol for (LANs) is Ethernet and is used to support a range of network layer protocols, including IP. The address is "resolved" using a protocol in which a piece of information is sent by a client process executing on the local computer to a server process executing on a remote computer. The information received by the server allows the server to uniquely identify the network system for which the address was required and therefore to provide the required address. This process ends when the client receives a response from the server containing the required address. Below is the Format of an ARP message used to resolve the remote MAC Hardware Address (HA): It is basically a model that characterizes and standardizes the communication functions of a telecommunication or computing system. Its main goal is to operate communication systems with standard protocols. The model partitions a communication system into abstraction layers that are somewhat similar to the ones we learned about earlier.
  • 12. TELNET Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in- band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). It is also known as the first Internet. In the old days, you had to physically walk to a server in order to access its data. Even if the server had the hardware power to do multiple things at the same time, you were blocked from using it at its full and you had to wait for others to finish their work first. In many circumstances we couldn't even touch the actual server. Telnet brought extraordinary change. Using it meant you could simultaneously connect multiple users to a single server. In order to connect to the server, people only needed access to a terminal, which could be the simplest and cheapest computer available. This computer didn't need to have powerful hardware, it only needed a network connection and a text based interface.
  • 13. NAME - PRIYA CLASS - 10-C ROLL NO. – 26 COMPUTER PROJECT FILE PROTOCOLS SUBMITTED TO – MS. GEETU MA’AM