SlideShare a Scribd company logo
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
import re
pattern="sarath"
if re.search(pattern,"sarath you are good"):
print("matched")
else :
print("not matched")
Content
 Introduction
 Rules of Engagement
 Network Components
 Sockets
 Nodes
 Implications of the end of AppleTalk routing
 Security
 Advantages
 Disadvantages
 Conclusion
Introduction
 AppleTalk is a network operating system designed to
connect Apple computers. Its components are built on
Macintosh operating systems. There are two main
versions of AppleTalk depending on how many years in
the past the network was implemented, Phase 1 and
Phase 2.
Rules of Engagement
 AppleTalk networks make use of an addressing
scheme in which each computer
when it comes online.
 Looks for a stored address that it used in a
previous session.
 If one isn't available then it chooses an address
at random from those that are available .
 Then it broadcasts the address to make sure no
other computer is using it.
 If it is being used then it tries another .
Network Components
Sockets
 An AppleTalk socket is a unique, addressable location in
an AppleTalk node. It is the logical point at which upper-
layer AppleTalk software processes and the network
layer Datagram Delivery Protocol (DDP) interact.
Nodes
 An AppleTalk node is a device that is connected
to an AppleTalk network.
 This device might be a Macintosh computer, a
printer, an IBM PC, a router, or some other
similar device.
Networks
 It consists of a single logical cable and
multiple attached nodes.
 A single physical cable or multiple physical
cables interconnected by using bridges or
routers may be found.
Networks…
 Non extended Networks
It is a physical network segment that is assigned
only a single network number, which can range
between 1 and 1024.
 Extended Networks
Also known as a cable range. It is a physical
network segment that can be assigned multiple
network numbers.
Zones
 An AppleTalk zone is a logical group of nodes or
networks that is defined when the network
administrator configures the network.
 The nodes or networks need not be physically
contiguous to belong to the same AppleTalk
zone.
Implications of the end of
AppleTalk routing
 Legacy operating systems and devices that only support
AppleTalk should be replaced if at all possible. If they
cannot be replaced, they need to be placed on the RIT
network with forethought.
 As long as any two legacy AppleTalk devices are within
the same network segment, AppleTalk communications
between them will still work. However, after July 24,
2006, the addresses change because AppleTalk zones
will no longer be present.
 There will no longer be a way to use two AppleTalk-only
devices between campus buildings, and in many cases,
between hallways within buildings.
Security
 AppleTalk, like many network protocols, makes
no provisions for network security. The design of
the AppleTalk protocol architecture requires that
security measures be implemented at higher
application levels. Cisco supports AppleTalk
distribution lists, allowing control of routing
updates on a per-interface basis. This security
feature is similar to those that Cisco provides for
other protocols.
Advantages
 Apple automatically includes AppleTalk in
the Macintosh operating system.
 Easy to implement and configure
 Setting up a small workgroup is simple
and inexpensive
Disadvantages
 It is not suitable for very large networks
 It is very slow compared to other LAN
links at 230.4 Kbps
 It is unsuitable for bandwidth intensive
applications
Conclusion
AppleTalk includes an address-resolution
method much like TCP/IP's ARP. The
AppleTalk version is called AARP. AARP
uses broadcasts to discover the hardware
address of a node.
Reference
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks

More Related Content

Similar to Apple%20Talk%20ppt[1].pptx

006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
Jagadish Gurrala
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
EnumulaBhargava1
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
EnumulaBhargava1
 
Emmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuel impraim computer networks
Emmanuel impraim computer networks
EmmanuelImpraim1
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
Kanishk Raj
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
CSCJournals
 
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
NajmulIslam38
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
Naiyan Noor
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
sabanoor40
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptx
NanetteMaraonSansano1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Mina Riyahi
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
IT Tech
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
Ens
EnsEns

Similar to Apple%20Talk%20ppt[1].pptx (20)

006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Emmanuel impraim computer networks
Emmanuel impraim computer networksEmmanuel impraim computer networks
Emmanuel impraim computer networks
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Osi model
Osi modelOsi model
Osi model
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Ens
EnsEns
Ens
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Apple%20Talk%20ppt[1].pptx

  • 1. Submitted To: Submitted By: www.studymafia.org www.studymafia.org import re pattern="sarath" if re.search(pattern,"sarath you are good"): print("matched") else : print("not matched")
  • 2. Content  Introduction  Rules of Engagement  Network Components  Sockets  Nodes  Implications of the end of AppleTalk routing  Security  Advantages  Disadvantages  Conclusion
  • 3. Introduction  AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems. There are two main versions of AppleTalk depending on how many years in the past the network was implemented, Phase 1 and Phase 2.
  • 4. Rules of Engagement  AppleTalk networks make use of an addressing scheme in which each computer when it comes online.  Looks for a stored address that it used in a previous session.  If one isn't available then it chooses an address at random from those that are available .  Then it broadcasts the address to make sure no other computer is using it.  If it is being used then it tries another .
  • 6. Sockets  An AppleTalk socket is a unique, addressable location in an AppleTalk node. It is the logical point at which upper- layer AppleTalk software processes and the network layer Datagram Delivery Protocol (DDP) interact.
  • 7. Nodes  An AppleTalk node is a device that is connected to an AppleTalk network.  This device might be a Macintosh computer, a printer, an IBM PC, a router, or some other similar device.
  • 8. Networks  It consists of a single logical cable and multiple attached nodes.  A single physical cable or multiple physical cables interconnected by using bridges or routers may be found.
  • 9. Networks…  Non extended Networks It is a physical network segment that is assigned only a single network number, which can range between 1 and 1024.  Extended Networks Also known as a cable range. It is a physical network segment that can be assigned multiple network numbers.
  • 10. Zones  An AppleTalk zone is a logical group of nodes or networks that is defined when the network administrator configures the network.  The nodes or networks need not be physically contiguous to belong to the same AppleTalk zone.
  • 11. Implications of the end of AppleTalk routing  Legacy operating systems and devices that only support AppleTalk should be replaced if at all possible. If they cannot be replaced, they need to be placed on the RIT network with forethought.  As long as any two legacy AppleTalk devices are within the same network segment, AppleTalk communications between them will still work. However, after July 24, 2006, the addresses change because AppleTalk zones will no longer be present.  There will no longer be a way to use two AppleTalk-only devices between campus buildings, and in many cases, between hallways within buildings.
  • 12. Security  AppleTalk, like many network protocols, makes no provisions for network security. The design of the AppleTalk protocol architecture requires that security measures be implemented at higher application levels. Cisco supports AppleTalk distribution lists, allowing control of routing updates on a per-interface basis. This security feature is similar to those that Cisco provides for other protocols.
  • 13. Advantages  Apple automatically includes AppleTalk in the Macintosh operating system.  Easy to implement and configure  Setting up a small workgroup is simple and inexpensive
  • 14. Disadvantages  It is not suitable for very large networks  It is very slow compared to other LAN links at 230.4 Kbps  It is unsuitable for bandwidth intensive applications
  • 15. Conclusion AppleTalk includes an address-resolution method much like TCP/IP's ARP. The AppleTalk version is called AARP. AARP uses broadcasts to discover the hardware address of a node.