SlideShare a Scribd company logo
1 of 13
 PRESENTERS:
 Saroj Aryal
 www.fb/sarojsaroza
DURING THE DESIGN OF THIS PRESENTATION OUR GROUP ARE
VERY ENCOURAGING SOULS WHO ARE SUPPORTING EACH OTHER IN
THE GROUP. WE CANNOT STAY WITHOUT GIVING SINCERE THANKSTO
THEM.
WE ARE GREATFUL TO OUR SUBJECT TEACHER MR.NABENDRA
SHRESTHA,FOR PLAYING THE ROLE OF GUIDENCE AND GIVING US
SUCH A PRESENTATION WHICH IS IMPOSSIBLE WITHOUT HIM.
-PRESENTERS
 STANDARDS OF TCP/IP
 INTRODUCTIONTCP/IP AND ITS HISTORY
 COMPARISION OF OSI TO TCP/IP
 LAYERS OFTCP/IP
 COMMUNICATION WITH REFERENCE TO TCP/IP
 PROTOCOL USED INTCP/IP
 CONCLUSION
 USE THE CONCEPT OF OSI MODEL.
 OSI ARE REDUCED IN FOUR LAYERS.
 FREELY EXCHANGE OF DATA.
 DOESNOT EXACTLY MATCHTHE OSI MODEL.
 GOOD FAILURE RECOVERY.
 LOW DATA OVERHEAD.
 HIGH ERROR-RATE HANDLING.
 THE ABILITY TO ADD NETWORKS WITHOUT INTERRUPTING EXISTING
SERVICES.
 IT’S THE COMMON WORLDWIDE STANDARD NOW FOR NETWORKING.
 BUILT IN INTELLIGENT MECHANISM FOR ERROR AND FLOW CONTROL.
 TOGETHER MANAGE THE FLOW OF DATA.
 IP INDISCRIMINATELY PUMPS PACKETS.
 TCP IS CHARGED WITH MAKING SURE THEY GET THERE.
 OPENING AND CLOSING SESSION.
 PACKET MANAGEMENT.
 FLOW CONTROL.
 ERROR DETECTION AND HANDLING.
 TCP/IP WAS CREATED USINGTHE D0D(DEPARTMENT OF
DEFENSE),WHICH IS MADE UP OF FOUR LAYERS INSTEAD OF THE SEVEN
THAT MAKE UP THE OSI.
 TCP/IP MODEL: APPLICATION
TRANSPORT
INTERNET
NETWORK
 INTCP BUT NOT CONTAINS CONTAINS IN OSI
 CONSISTS OF FOUR LAYERS.
 ONLY ONE MODE IN THE NETWORK LAYER BUT BOTH MODES IN THE
TRANSPORT LAYER ARE SUPPORTED.
 THE PROTOCOLS HAVE BEEN INVENTED BEFORE MODELS,SOTHE
FUNCTIONALITIES ARE PERFECTLY DESCRIBED.
 PROTOCOLS IN THE OSI MODEL ARE BETTER HIDDEN AND CAN BE
REPLACED RELATIVELY EASILY AS THE TECHNOLOGY CHANGES,WHICH
IS ONE OFTHE MAIN OBJECTIVES OF LAYRED PROTOCOLS.
 COMBINATION OF DATALINK AND PHYSICAL LAYER OF OSI MODEL.
 CONCERNED WITH ACCESS AND FORWARD DATA ACROSSTHE NETWORK
FOR TWO END SYSTEMSATACHEDTO SAME NETWORKS.
 USESTHE PROTOCOL LIKETOKEN RING.
 TAKESTHE DATA SEGEMENT AND FORMTHE PACKET THAN IT SENDS
THOSE PACKETS TOTHE NETWORK.
 ALLOWS THE HOST COMPUTERSTO INSERT PACKETS INTO ANY
NETWORK AND HAVETHEMTO DELIVER INDEPENDENTLYTOTHE
DESTINATION.
 USES PROTOCOL LIKE IP,ICMP,RIP.
 CONCERNED WITH ENDTO END DELIVERY OF DATA FROM SOURCETO
DESTINATION.
 CONNECTION ORIENTED.
 ESTABLISHES A CONECTION BEFORE SENDING DATA FROM SOURCETO
DESTINATION.
 ESTABLISHESTHE FIXED PATH AND TRANSMIT THE MESSAGE ON THAT
PATH FOR WHOLE SESSION
 HAS ACNOWLEDGEMENT FACILITY.
 USESTCP PROTOCOL.
 COMBINTION OF PRESENTATION AND SESSION LAYER OF OSI MODEL.
 INCLUDES ALLTHE PROCESSTHAT INVOLVED USER INTERACTION.
 DETERMINE THE PRESENTTION OF DATA IN DIFFERET FORMAT SUCH AS
DATA COMPRESSION,DATA ENCRYPTION AND DECRYPTION.
 CONTROLTHE ESTBLISHED SESSION BETWEENTHE COMPUTERS.
 USES PROTOCOLS LIKE SMTP,HTTP,FTP,TELNET,POP.
 TCP/IP IS BUILT AS INFORMATION IS PASSED DOEN FROM APPLICATION
TOTHE PHYSICAL NETWORK LAYER .
 WHEN DATA IS SENT EACH LAYERTREATS ALL OFTHE INFORMATION IT
RECEIVES FROM THE LAYER ABOVE AS DATA AND ADDS CONTROL
INFORMATIONTOTHE FRONT OF DATA.
 CONTROL INFORMATION IS CALLED HEADER.
 ADDITION OF A HEADER IS CALLED IN CAPSULATION.
 WHEN DATA IS RECEIVED, THE OPPOSITE PROCEDURETAKES PLACE AS
EACH LAYER REMOVES ITS HEADER BEFORE PASSINGTHE DATATOTHE
LAYER ABOVE.
 DATA ENCAPSULATION INTCP/IP:
 APPLICATION LAYER – DATA
 TRANSPORT LAYER – HEADER,DATA
 INTERNET LAYER- HEADER,HEADER,DATA
 NETWORK ACCESS LAYER- HEADER,HEADER,HAEDER,DATA.
 APPLICATION LAYER:
FILETRANSFER(TFTP,FTP,NFS),EMAIL(SMTP),REMOTE
LOGIN(TELNET,RLOGIN),NETWORK MANAGEMENT(SNMP),NAME
MANAGEMENT(DNS).
 TRANSPORT LAYER:TCP(CONNECTION
ORIENTED),UDP(CONNECTIONLESS).
 INTERNET LAYER : IP,ICP,ARP,RARP.
 NETWORKACCESS LAYER : ETHERNET,FAST ETHERNET,SLIP AND
PPP,FDDI,ATM,FRAME RELAY AND SMDS,ARP,PROXY,RARP.
 FROM THIS PRESENTATION WE ALL CAMETO KNOWTHE
STANDARDS,COMPARISION,LAYERS,COMMUNICATION WITH
REFERENCE,PROTOCOLS OF TCP/IPWHICH ARE ALL DESCRIBED
PREVIOUSLY.
 THANKYOU……!!

More Related Content

Similar to Presentation on TCP/IP

Pervasive nation
Pervasive nationPervasive nation
Pervasive nationlizard4444
 
Topic 2.1 network communication using osi model
Topic 2.1 network communication using osi modelTopic 2.1 network communication using osi model
Topic 2.1 network communication using osi modelDoLce MiEra
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIRJET Journal
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptNukriTskvitaia
 
IRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced CommunicationIRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced CommunicationIRJET Journal
 
Network Layered Models Rroosend
Network Layered Models RroosendNetwork Layered Models Rroosend
Network Layered Models Rroosendrroosend
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication ArchitectureKamal Acharya
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5Irsandi Hasan
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdfNguynTy5
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi modelNaiyan Noor
 

Similar to Presentation on TCP/IP (20)

kuldeep
kuldeepkuldeep
kuldeep
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
 
Topic 2.1 network communication using osi model
Topic 2.1 network communication using osi modelTopic 2.1 network communication using osi model
Topic 2.1 network communication using osi model
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
 
IRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced CommunicationIRJET- Universal Network Setup for Advanced Communication
IRJET- Universal Network Setup for Advanced Communication
 
Network layers
Network layersNetwork layers
Network layers
 
Network Layered Models Rroosend
Network Layered Models RroosendNetwork Layered Models Rroosend
Network Layered Models Rroosend
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Osi model
Osi modelOsi model
Osi model
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication Architecture
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
Dual stack approach ipv4 ipv6
Dual stack approach ipv4 ipv6Dual stack approach ipv4 ipv6
Dual stack approach ipv4 ipv6
 
Osi rp3
Osi rp3Osi rp3
Osi rp3
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
G04844450
G04844450G04844450
G04844450
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Presentation on TCP/IP

  • 1.  PRESENTERS:  Saroj Aryal  www.fb/sarojsaroza
  • 2. DURING THE DESIGN OF THIS PRESENTATION OUR GROUP ARE VERY ENCOURAGING SOULS WHO ARE SUPPORTING EACH OTHER IN THE GROUP. WE CANNOT STAY WITHOUT GIVING SINCERE THANKSTO THEM. WE ARE GREATFUL TO OUR SUBJECT TEACHER MR.NABENDRA SHRESTHA,FOR PLAYING THE ROLE OF GUIDENCE AND GIVING US SUCH A PRESENTATION WHICH IS IMPOSSIBLE WITHOUT HIM. -PRESENTERS
  • 3.  STANDARDS OF TCP/IP  INTRODUCTIONTCP/IP AND ITS HISTORY  COMPARISION OF OSI TO TCP/IP  LAYERS OFTCP/IP  COMMUNICATION WITH REFERENCE TO TCP/IP  PROTOCOL USED INTCP/IP  CONCLUSION
  • 4.  USE THE CONCEPT OF OSI MODEL.  OSI ARE REDUCED IN FOUR LAYERS.  FREELY EXCHANGE OF DATA.  DOESNOT EXACTLY MATCHTHE OSI MODEL.  GOOD FAILURE RECOVERY.  LOW DATA OVERHEAD.  HIGH ERROR-RATE HANDLING.  THE ABILITY TO ADD NETWORKS WITHOUT INTERRUPTING EXISTING SERVICES.  IT’S THE COMMON WORLDWIDE STANDARD NOW FOR NETWORKING.  BUILT IN INTELLIGENT MECHANISM FOR ERROR AND FLOW CONTROL.
  • 5.  TOGETHER MANAGE THE FLOW OF DATA.  IP INDISCRIMINATELY PUMPS PACKETS.  TCP IS CHARGED WITH MAKING SURE THEY GET THERE.  OPENING AND CLOSING SESSION.  PACKET MANAGEMENT.  FLOW CONTROL.  ERROR DETECTION AND HANDLING.  TCP/IP WAS CREATED USINGTHE D0D(DEPARTMENT OF DEFENSE),WHICH IS MADE UP OF FOUR LAYERS INSTEAD OF THE SEVEN THAT MAKE UP THE OSI.  TCP/IP MODEL: APPLICATION TRANSPORT INTERNET NETWORK
  • 6.  INTCP BUT NOT CONTAINS CONTAINS IN OSI  CONSISTS OF FOUR LAYERS.  ONLY ONE MODE IN THE NETWORK LAYER BUT BOTH MODES IN THE TRANSPORT LAYER ARE SUPPORTED.  THE PROTOCOLS HAVE BEEN INVENTED BEFORE MODELS,SOTHE FUNCTIONALITIES ARE PERFECTLY DESCRIBED.  PROTOCOLS IN THE OSI MODEL ARE BETTER HIDDEN AND CAN BE REPLACED RELATIVELY EASILY AS THE TECHNOLOGY CHANGES,WHICH IS ONE OFTHE MAIN OBJECTIVES OF LAYRED PROTOCOLS.
  • 7.  COMBINATION OF DATALINK AND PHYSICAL LAYER OF OSI MODEL.  CONCERNED WITH ACCESS AND FORWARD DATA ACROSSTHE NETWORK FOR TWO END SYSTEMSATACHEDTO SAME NETWORKS.  USESTHE PROTOCOL LIKETOKEN RING.
  • 8.  TAKESTHE DATA SEGEMENT AND FORMTHE PACKET THAN IT SENDS THOSE PACKETS TOTHE NETWORK.  ALLOWS THE HOST COMPUTERSTO INSERT PACKETS INTO ANY NETWORK AND HAVETHEMTO DELIVER INDEPENDENTLYTOTHE DESTINATION.  USES PROTOCOL LIKE IP,ICMP,RIP.
  • 9.  CONCERNED WITH ENDTO END DELIVERY OF DATA FROM SOURCETO DESTINATION.  CONNECTION ORIENTED.  ESTABLISHES A CONECTION BEFORE SENDING DATA FROM SOURCETO DESTINATION.  ESTABLISHESTHE FIXED PATH AND TRANSMIT THE MESSAGE ON THAT PATH FOR WHOLE SESSION  HAS ACNOWLEDGEMENT FACILITY.  USESTCP PROTOCOL.
  • 10.  COMBINTION OF PRESENTATION AND SESSION LAYER OF OSI MODEL.  INCLUDES ALLTHE PROCESSTHAT INVOLVED USER INTERACTION.  DETERMINE THE PRESENTTION OF DATA IN DIFFERET FORMAT SUCH AS DATA COMPRESSION,DATA ENCRYPTION AND DECRYPTION.  CONTROLTHE ESTBLISHED SESSION BETWEENTHE COMPUTERS.  USES PROTOCOLS LIKE SMTP,HTTP,FTP,TELNET,POP.
  • 11.  TCP/IP IS BUILT AS INFORMATION IS PASSED DOEN FROM APPLICATION TOTHE PHYSICAL NETWORK LAYER .  WHEN DATA IS SENT EACH LAYERTREATS ALL OFTHE INFORMATION IT RECEIVES FROM THE LAYER ABOVE AS DATA AND ADDS CONTROL INFORMATIONTOTHE FRONT OF DATA.  CONTROL INFORMATION IS CALLED HEADER.  ADDITION OF A HEADER IS CALLED IN CAPSULATION.  WHEN DATA IS RECEIVED, THE OPPOSITE PROCEDURETAKES PLACE AS EACH LAYER REMOVES ITS HEADER BEFORE PASSINGTHE DATATOTHE LAYER ABOVE.  DATA ENCAPSULATION INTCP/IP:  APPLICATION LAYER – DATA  TRANSPORT LAYER – HEADER,DATA  INTERNET LAYER- HEADER,HEADER,DATA  NETWORK ACCESS LAYER- HEADER,HEADER,HAEDER,DATA.
  • 12.  APPLICATION LAYER: FILETRANSFER(TFTP,FTP,NFS),EMAIL(SMTP),REMOTE LOGIN(TELNET,RLOGIN),NETWORK MANAGEMENT(SNMP),NAME MANAGEMENT(DNS).  TRANSPORT LAYER:TCP(CONNECTION ORIENTED),UDP(CONNECTIONLESS).  INTERNET LAYER : IP,ICP,ARP,RARP.  NETWORKACCESS LAYER : ETHERNET,FAST ETHERNET,SLIP AND PPP,FDDI,ATM,FRAME RELAY AND SMDS,ARP,PROXY,RARP.
  • 13.  FROM THIS PRESENTATION WE ALL CAMETO KNOWTHE STANDARDS,COMPARISION,LAYERS,COMMUNICATION WITH REFERENCE,PROTOCOLS OF TCP/IPWHICH ARE ALL DESCRIBED PREVIOUSLY.  THANKYOU……!!