SlideShare a Scribd company logo
#1 WHAT IS
NETWORKING?
ASD ACADEMY
www.asdacademy.in
Admission Open
Diploma in Cyber Security &
Coding
Call Now: +91-9680100687 (What’s App)
WHAT IS NETWORKING IN COMPUTER?
• Computer networking refers to interconnected
computing devices that can exchange data and
share resources with each other.
• These networked devices use a system of
rules, called communications protocols, to
transmit information over physical or wireless
technologies.
2
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
TYPES OF NETWORK DEVICES
• Hub.
• Switch.
• Router.
• Bridge.
• Gateway.
• Modem.
• Repeater.
• Access Point.
3
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS HUB?
• Hubs. A hub is a physical layer networking
device which is used to connect multiple
devices in a network.
• They are generally used to connect computers
in a LAN.
• A hub has many ports in it.
• A computer which intends to be connected to
the network is plugged in to one of these ports.
4
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS SWITCH?
• A switch is a device in a computer network that
connects other devices together. Multiple data
cables are plugged into a switch to enable
communication between different networked
devices.
• A network switch connects devices (such as
computers, printers, wireless access points) in
a network to each other, and allows them to
'talk' by exchanging data packets.
5
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS ROUTER?
• A router is a device that connects two or more
packet-switched networks or subnetworks.
• It serves two primary functions: managing
traffic between these networks by forwarding
data packets to their intended IP addresses,
and allowing multiple devices to use the same
Internet connection.
• Router and Switch are both network connecting
devices. Router works at network layer and is
responsible to find the shortest path for a
packet whereas Switch connects various
devices in a network.
• Router connects devices across multiple
networks. Following are the important
differences between Router and Switch.
6
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS REPEATER?
• In digital communication systems, a repeater is
a device that receives a digital signal on an
electromagnetic or optical transmission medium
and regenerates the signal along the next leg of
the medium.
• A WiFi repeater or extender is used to extend
the coverage area of your WiFi network. It
works by receiving your existing WiFi signal,
amplifying it and then transmitting the boosted
signal.
7
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS ACCESS POINT?
• An access point is a device, such as a wireless
router, that allows wireless devices to connect
to a network.
• Most access points have built-in routers, while
others must be connected to a router in order to
provide network access.
8
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS IP ADDRESS?
• An IP address, or Internet Protocol address, is
a series of numbers that identifies any device
on a network. Computers use IP addresses to
communicate with each other both over the
internet as well as on other networks.
• Or in other words, an IP address is a unique
address that is used to identify computers or
nodes on the internet. This address is just a
string of numbers written in a certain format. It
is generally expressed in a set of numbers for
example 192.155. 12.1. Here each number in
the set is from 0 to 255 range.
9
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS MAC ADDRESS?
• A Media Access Control address (MAC
address) is a hardware identifier that uniquely
identifies each device on a network. Primarily,
the manufacturer assigns it. They are often
found on a device's network interface controller
(NIC) card.
• The MAC address is a 12 digit hexadecimal
number that is most often displayed with a
colon or hypen separating every two digits (an
octet), making it easier to read. Example: A
MAC address of 2c549188c9e3 is typically
displayed as 2C:54:91:88:C9:E3 or 2c-54-91-
88-c9-e3.
10
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS PROTOCOL?
• protocol, in computer science, a set of rules or
procedures for transmitting data between
electronic devices, such as computers. In order
for computers to exchange information, there
must be a preexisting agreement as to how the
information will be structured and how each
side will send and receive it.
• It is a set of rules that need to be followed by
the communicating parties in order to have
successful and reliable data communication.
For example - Ethernet and HTTP.
11
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
WHAT IS PORT NUMBER?
• Once the address is used to deliver data to the
wanted host on the network, the port number is
used to identify the process for which the data
is used. This enables one host to provide more
than one service. How you define the port
number depends on your configuration.
• Port numbers are sometimes seen in web or
other uniform resource locators (URLs). By
default, HTTP uses port 80 and HTTPS uses
port 443, but a URL like
http://www.example.com:8080/path/ specifies
that the web browser connects instead to port
8080 of the HTTP server.
12
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687
OSI
MODE
Next Session
on
Admission Open | Diploma in Cyber Security & Coding
Admission Open | What’s App: +91-9680100687

More Related Content

Similar to #1 What is Networking.pptx

Class Note
Class NoteClass Note
Class Note
AK IJ
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
PoojaBahirat1
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Mark Rotondella
 
Internet of things
Internet of thingsInternet of things
Internet of things
Selvaraj Kesavan
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
SimarpreetKaur735622
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Lect_2.pptx
Lect_2.pptxLect_2.pptx
Lect_2.pptx
Senthil Vit
 
Unit Iv
Unit IvUnit Iv
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
Irsandi Hasan
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
Naman Rastogi
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
picklesvalery
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
bmit1
 
There are many kinds of network devices 1.pdf
There are many kinds of network devices 1.pdfThere are many kinds of network devices 1.pdf
There are many kinds of network devices 1.pdf
EIHEducation
 

Similar to #1 What is Networking.pptx (20)

Class Note
Class NoteClass Note
Class Note
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Lect_2.pptx
Lect_2.pptxLect_2.pptx
Lect_2.pptx
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
There are many kinds of network devices 1.pdf
There are many kinds of network devices 1.pdfThere are many kinds of network devices 1.pdf
There are many kinds of network devices 1.pdf
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

#1 What is Networking.pptx

  • 1. #1 WHAT IS NETWORKING? ASD ACADEMY www.asdacademy.in Admission Open Diploma in Cyber Security & Coding Call Now: +91-9680100687 (What’s App)
  • 2. WHAT IS NETWORKING IN COMPUTER? • Computer networking refers to interconnected computing devices that can exchange data and share resources with each other. • These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies. 2 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 3. TYPES OF NETWORK DEVICES • Hub. • Switch. • Router. • Bridge. • Gateway. • Modem. • Repeater. • Access Point. 3 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 4. WHAT IS HUB? • Hubs. A hub is a physical layer networking device which is used to connect multiple devices in a network. • They are generally used to connect computers in a LAN. • A hub has many ports in it. • A computer which intends to be connected to the network is plugged in to one of these ports. 4 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 5. WHAT IS SWITCH? • A switch is a device in a computer network that connects other devices together. Multiple data cables are plugged into a switch to enable communication between different networked devices. • A network switch connects devices (such as computers, printers, wireless access points) in a network to each other, and allows them to 'talk' by exchanging data packets. 5 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 6. WHAT IS ROUTER? • A router is a device that connects two or more packet-switched networks or subnetworks. • It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection. • Router and Switch are both network connecting devices. Router works at network layer and is responsible to find the shortest path for a packet whereas Switch connects various devices in a network. • Router connects devices across multiple networks. Following are the important differences between Router and Switch. 6 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 7. WHAT IS REPEATER? • In digital communication systems, a repeater is a device that receives a digital signal on an electromagnetic or optical transmission medium and regenerates the signal along the next leg of the medium. • A WiFi repeater or extender is used to extend the coverage area of your WiFi network. It works by receiving your existing WiFi signal, amplifying it and then transmitting the boosted signal. 7 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 8. WHAT IS ACCESS POINT? • An access point is a device, such as a wireless router, that allows wireless devices to connect to a network. • Most access points have built-in routers, while others must be connected to a router in order to provide network access. 8 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 9. WHAT IS IP ADDRESS? • An IP address, or Internet Protocol address, is a series of numbers that identifies any device on a network. Computers use IP addresses to communicate with each other both over the internet as well as on other networks. • Or in other words, an IP address is a unique address that is used to identify computers or nodes on the internet. This address is just a string of numbers written in a certain format. It is generally expressed in a set of numbers for example 192.155. 12.1. Here each number in the set is from 0 to 255 range. 9 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 10. WHAT IS MAC ADDRESS? • A Media Access Control address (MAC address) is a hardware identifier that uniquely identifies each device on a network. Primarily, the manufacturer assigns it. They are often found on a device's network interface controller (NIC) card. • The MAC address is a 12 digit hexadecimal number that is most often displayed with a colon or hypen separating every two digits (an octet), making it easier to read. Example: A MAC address of 2c549188c9e3 is typically displayed as 2C:54:91:88:C9:E3 or 2c-54-91- 88-c9-e3. 10 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 11. WHAT IS PROTOCOL? • protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it. • It is a set of rules that need to be followed by the communicating parties in order to have successful and reliable data communication. For example - Ethernet and HTTP. 11 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 12. WHAT IS PORT NUMBER? • Once the address is used to deliver data to the wanted host on the network, the port number is used to identify the process for which the data is used. This enables one host to provide more than one service. How you define the port number depends on your configuration. • Port numbers are sometimes seen in web or other uniform resource locators (URLs). By default, HTTP uses port 80 and HTTPS uses port 443, but a URL like http://www.example.com:8080/path/ specifies that the web browser connects instead to port 8080 of the HTTP server. 12 Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687
  • 13. OSI MODE Next Session on Admission Open | Diploma in Cyber Security & Coding Admission Open | What’s App: +91-9680100687