SlideShare a Scribd company logo
Submitted To: Submitted By:
Mr. Santosh Pawar Gulshan Khara
Miss. Savitha G. Roll No.-16CA32
Seminar
On
AppleTalk
Content
 Introduction
 History
 Design
 Network Components
• Sockets
• Nodes
• Networks
• Zones
 Addressing in AppleTalk
 AppleTalk Manager
 Security
 Advantages
 Disadvantages
 Conclusion
Introduction
AppleTalk is a network operating system designed
to connect Apple computers. Its components are
built on Macintosh operating systems. There are
two main versions of AppleTalk depending on how
many years in the past the network was
implemented, Phase 1 and Phase 2.
History
Just prior to its release in early
1985,AppleBus was renamed AppleTalk.
The system had a number of limitations,
including a speed of only 230.4 Kbit/s ,a
maximum distance of 1000 feet from end to
end , and only 32 nodes per LAN.
Design
AppleTalk was designed with a transparent network interface
-that is, the interaction between Client computers and
network servers requires little interaction from the user.
Two versions of AppleTalk exist :
AppleTalk Phase 1 and AppleTalk Phase 2.
Network Components
AppleTalk Internetwork consists of a Hierarchy of Components
Sockets
An AppleTalk socket is a unique, addressable
location in an AppleTalk node. It is the logical point
at which upper-layer AppleTalk software processes
and the network layer Datagram Delivery Protocol
(DDP) interact.
Socket Clients Use Socket to Send and Receive Datagrams
Nodes
An AppleTalk node is a device that is
connected to an AppleTalk network.
This device might be a Macintosh
computer, a printer, an IBM PC, a router,
or some other similar device.
Networks
It consists of a single logical cable and
multiple attached nodes.
A single physical cable or multiple physical
cables interconnected by using bridges or
routers may be found.
Networks…
Non extended Networks
It is a physical network segment that is
assigned only a single network number, which
can range between 1 and 1024.
Extended Networks
Also known as a cable range. It is a physical
network segment that can be assigned multiple
network numbers.
Zones
An AppleTalk zone is a logical group of
nodes or networks that is defined when the
network administrator configures the
network.
The nodes or networks need not be
physically contiguous to belong to the same
AppleTalk zone.
Addressing in AppleTalk
Network Number :- 16 bit number.
Node Id :- 8 bit number identifies node on an AppleTalk
network.
Socket Number :- unique 8 bit number that identifies a
socket. A maximum of 254 different socket number can be
assigned in a node.
Zone Name :- A name assigned to an arbitrary subset of
node within an AppleTalk Internet.
AppleTalk Manager
 Our Application accesses the Services of the
AppleTalk protocol through the AppleTalk manager.
 It is a collection of Application Programming Interface
to AppleTalk protocol.
Security
AppleTalk, like many network protocols, makes no
provisions for network security. The design of the
AppleTalk protocol architecture requires that
security measures be implemented at higher
application levels. Cisco supports AppleTalk
distribution lists, allowing control of routing
updates on a per-interface basis. This security
feature is similar to those that Cisco provides for
other protocols.
Advantages
Apple automatically includes AppleTalk in the
Macintosh operating system.
Easy to implement and configure.
Setting up a small workgroup is simple and
inexpensive.
Disadvantages
It is not suitable for very large networks.
It is very slow compared to other LAN links at
230.4 Kbps.
It is unsuitable for bandwidth intensive
applications.
Conclusion
AppleTalk includes an address-resolution
method much like TCP/IP's ARP. The
AppleTalk version is called AARP. AARP
uses broadcasts to discover the hardware
address of a node.
Reference
 [1]. Sidhu, Gursharan; Andrews, Richard; Oppenheimer, Alan (1989).
Inside AppleTalk, Second
 Edition (PDF). Addison-Wesley. ISBN 0-201-55021-0.
 [2].https://developer.apple.com/legacy/library/documentation/mac/pdf
/Networking/
 Introduction_to_AppleTalk.pdf
 [3]. Oppenheimer, Alan (January 2004). “A History of Macintosh
Networking”.
 [4]. S.H. Cooper and P.J. Teller ”Configure a large LAN for TCP/IP,
AppleTalk and IPX”,
 ‘Proceeding of 20th Conference on Local Computer
Networks’,Year:1995, pp.264-68.
Thank You

More Related Content

What's hot

5G technology documentation
5G technology documentation5G technology documentation
5G technology documentation
Sharon Moses
 
UTP and STP
UTP and STPUTP and STP
UTP and STP
Subrata Kumer Paul
 
Ethernet
EthernetEthernet
Ethernet
ArpiSaxena1
 
Google loon ppt
Google loon pptGoogle loon ppt
Google loon ppt
BRIJESH SINGH
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
Vivek Kumar Sinha
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
AMOGHA A K
 
5G seminar
5G seminar5G seminar
WiMAX
WiMAXWiMAX
Subnetting
SubnettingSubnetting
Subnetting
selvakumar_b1985
 
Introduction to 5g technology
Introduction to 5g technologyIntroduction to 5g technology
Introduction to 5g technology
Shambhu Ram
 
Proposal For M Sc Project Networks And Distributed Systems
Proposal For M Sc Project   Networks And Distributed SystemsProposal For M Sc Project   Networks And Distributed Systems
Proposal For M Sc Project Networks And Distributed Systems
Ken Ouma
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
priyadharshini murugan
 
Computer network
Computer networkComputer network
Computer network
Abdul Wahab
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
Bhavesh Goswami
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
5 g wireless_technology
5 g wireless_technology5 g wireless_technology
5 g wireless_technology
cswati
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari
 

What's hot (20)

5G technology documentation
5G technology documentation5G technology documentation
5G technology documentation
 
UTP and STP
UTP and STPUTP and STP
UTP and STP
 
Ethernet
EthernetEthernet
Ethernet
 
Google loon ppt
Google loon pptGoogle loon ppt
Google loon ppt
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
 
5G seminar
5G seminar5G seminar
5G seminar
 
WiMAX
WiMAXWiMAX
WiMAX
 
Subnetting
SubnettingSubnetting
Subnetting
 
Introduction to 5g technology
Introduction to 5g technologyIntroduction to 5g technology
Introduction to 5g technology
 
Proposal For M Sc Project Networks And Distributed Systems
Proposal For M Sc Project   Networks And Distributed SystemsProposal For M Sc Project   Networks And Distributed Systems
Proposal For M Sc Project Networks And Distributed Systems
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
Computer network
Computer networkComputer network
Computer network
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
4G technology
4G technology4G technology
4G technology
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
5 g wireless_technology
5 g wireless_technology5 g wireless_technology
5 g wireless_technology
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 

Similar to Apple talk ppt 2

Apple talk
Apple talkApple talk
Apple talk
Sagar Raravi
 
Apple talk-WPS Office.pptx
Apple talk-WPS Office.pptxApple talk-WPS Office.pptx
Apple talk-WPS Office.pptx
MOHAMMEDASHIK71
 
Apple%20Talk%20ppt[1].pptx
Apple%20Talk%20ppt[1].pptxApple%20Talk%20ppt[1].pptx
Apple%20Talk%20ppt[1].pptx
sarathraj60
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
Raj vardhan
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
Ens
EnsEns
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
Lisa Williams
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Living Online
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 
Tcp
TcpTcp
Data link layer
Data link layerData link layer
Data link layer
Abdul MaTéèñ
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptx
NanetteMaraonSansano1
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
IJCNCJournal
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
tazbeedrahman
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
sabanoor40
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
Tatheer Fatima
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 

Similar to Apple talk ppt 2 (20)

Apple talk
Apple talkApple talk
Apple talk
 
Apple talk-WPS Office.pptx
Apple talk-WPS Office.pptxApple talk-WPS Office.pptx
Apple talk-WPS Office.pptx
 
Apple%20Talk%20ppt[1].pptx
Apple%20Talk%20ppt[1].pptxApple%20Talk%20ppt[1].pptx
Apple%20Talk%20ppt[1].pptx
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Ens
EnsEns
Ens
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Tcp
TcpTcp
Tcp
 
Data link layer
Data link layerData link layer
Data link layer
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptx
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
 
Infiniband and Ethernet
Infiniband and EthernetInfiniband and Ethernet
Infiniband and Ethernet
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Apple talk ppt 2

  • 1. Submitted To: Submitted By: Mr. Santosh Pawar Gulshan Khara Miss. Savitha G. Roll No.-16CA32 Seminar On AppleTalk
  • 2. Content  Introduction  History  Design  Network Components • Sockets • Nodes • Networks • Zones  Addressing in AppleTalk  AppleTalk Manager  Security  Advantages  Disadvantages  Conclusion
  • 3. Introduction AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems. There are two main versions of AppleTalk depending on how many years in the past the network was implemented, Phase 1 and Phase 2.
  • 4. History Just prior to its release in early 1985,AppleBus was renamed AppleTalk. The system had a number of limitations, including a speed of only 230.4 Kbit/s ,a maximum distance of 1000 feet from end to end , and only 32 nodes per LAN.
  • 5. Design AppleTalk was designed with a transparent network interface -that is, the interaction between Client computers and network servers requires little interaction from the user. Two versions of AppleTalk exist : AppleTalk Phase 1 and AppleTalk Phase 2.
  • 6. Network Components AppleTalk Internetwork consists of a Hierarchy of Components
  • 7. Sockets An AppleTalk socket is a unique, addressable location in an AppleTalk node. It is the logical point at which upper-layer AppleTalk software processes and the network layer Datagram Delivery Protocol (DDP) interact. Socket Clients Use Socket to Send and Receive Datagrams
  • 8. Nodes An AppleTalk node is a device that is connected to an AppleTalk network. This device might be a Macintosh computer, a printer, an IBM PC, a router, or some other similar device.
  • 9. Networks It consists of a single logical cable and multiple attached nodes. A single physical cable or multiple physical cables interconnected by using bridges or routers may be found.
  • 10. Networks… Non extended Networks It is a physical network segment that is assigned only a single network number, which can range between 1 and 1024. Extended Networks Also known as a cable range. It is a physical network segment that can be assigned multiple network numbers.
  • 11. Zones An AppleTalk zone is a logical group of nodes or networks that is defined when the network administrator configures the network. The nodes or networks need not be physically contiguous to belong to the same AppleTalk zone.
  • 12. Addressing in AppleTalk Network Number :- 16 bit number. Node Id :- 8 bit number identifies node on an AppleTalk network. Socket Number :- unique 8 bit number that identifies a socket. A maximum of 254 different socket number can be assigned in a node. Zone Name :- A name assigned to an arbitrary subset of node within an AppleTalk Internet.
  • 13. AppleTalk Manager  Our Application accesses the Services of the AppleTalk protocol through the AppleTalk manager.  It is a collection of Application Programming Interface to AppleTalk protocol.
  • 14. Security AppleTalk, like many network protocols, makes no provisions for network security. The design of the AppleTalk protocol architecture requires that security measures be implemented at higher application levels. Cisco supports AppleTalk distribution lists, allowing control of routing updates on a per-interface basis. This security feature is similar to those that Cisco provides for other protocols.
  • 15. Advantages Apple automatically includes AppleTalk in the Macintosh operating system. Easy to implement and configure. Setting up a small workgroup is simple and inexpensive.
  • 16. Disadvantages It is not suitable for very large networks. It is very slow compared to other LAN links at 230.4 Kbps. It is unsuitable for bandwidth intensive applications.
  • 17. Conclusion AppleTalk includes an address-resolution method much like TCP/IP's ARP. The AppleTalk version is called AARP. AARP uses broadcasts to discover the hardware address of a node.
  • 18. Reference  [1]. Sidhu, Gursharan; Andrews, Richard; Oppenheimer, Alan (1989). Inside AppleTalk, Second  Edition (PDF). Addison-Wesley. ISBN 0-201-55021-0.  [2].https://developer.apple.com/legacy/library/documentation/mac/pdf /Networking/  Introduction_to_AppleTalk.pdf  [3]. Oppenheimer, Alan (January 2004). “A History of Macintosh Networking”.  [4]. S.H. Cooper and P.J. Teller ”Configure a large LAN for TCP/IP, AppleTalk and IPX”,  ‘Proceeding of 20th Conference on Local Computer Networks’,Year:1995, pp.264-68.