SlideShare a Scribd company logo
BASIC TO ADVANCE
PROTOCOLS
BY- VARINDER SINGH WALIA
WHAT IS PROTOCOLS
 A protocol is a set of rules and guidelines for communicating data or we can say it
is a type of programming language in which both sides are same.
 Rules are defined for each step and process during communication between two
or more Devices Networks have to follow these rules to successfully transmit
data. Such processes include:
 TYPE OF TASK
 PROCESS NATURE
 DATA FLOW RATE
 DATA TYPE
 DEVICE MANAGEMENT
TYPES OF
PROTOCOLS
TRANSMISSION CONTROL PROTOCOL
 The Transmission Control Protocol (TCP) is one of the main protocols of
the Internet protocol suite.
 TCP is a connection-oriented protocol in which the data can be transferred
bidirectionally after connection is being setuped.
 TCP is reliable and secure but comparatively slower as it keeps the data
smooth and checks error.
 The order of data at receiving end is same as on sending end. Header size
of TCP is 20 bytes.
USER DATAGRAM PROTOCOL
 UDP stands for “User Datagram Protocol. It is also called universal datagram
protocol.
 UDP is connection-less protocol in which data is needed to send in chunks.
 UDP don’t have error checking mechanism that is why it is less reliable but is
faster in data transferring than TCP.
 Header size of UDP is 8 bytes.
FILE TRANSFER PROTOCOL
 File Transfer Protocol
 Authentication is required in FTP for communication between client and
server.
 FTP uses TCP service which is a connection-oriented service.
 FTP software is larger than TFTP.
 FTP establishes two connections one for data(TCP port no. 21) and one
for control(TCP port no. 20)
 FTP is more complex
TRIVIAL FILE TRANSFER PROTOCOL
 Trivial File Transfer Protocol
 No authentication is required in TFTP
 TFTP uses UDP service which is connection-less service.
 TFTP software is smaller than FTP and fits into readonly memory of the
diskless workstation
 TFTP establishes a single connection for its file transfer (UDP port no. 69)
 TFTP have only five messages.
 TFTP is less complex.
INTERNET CONTROL MESSAGE
PROTOCOL
 ICMP (internet control message protocol) is an error-reporting protocol and
is used by routers in our network
 It is an extension to the internet protocol (IP)
 ICMP creates and sends messages to the source IP address indicating
that a gateway to the internet that a router, service or host cannot be
reached for packet delivery.
 Any IP network device has the capability to send, receive or process ICMP
messages.
HTTP Hypertext Transfer Protocol
 It is used for world wide web
 It is part of the Internet protocol suite and defines commands and services used
for transmitting webpage data.
 HTTP is the set of rules for transferring files from on device to another device
 HTTP is an application protocol for distributed, collaborative, and hypermedia
information systems
 Some common HTTP status codes include:
 200 - successful request (the webpage exists)
 301 - moved permanently (often forwarded to a new URL)
 401 - unauthorized request (authorization required)
 403 - forbidden (access is not allowed to the page or directory)
 500 - internal server error (often caused by an incorrect server
configuration)
Dynamic Host Configuration Protocol
 Dynamic Host Configuration Protocol
(DHCP) is a protocol for assigning dynamic
IP addresses to devices on your network
 The DHCP is controlled by a DHCP server
that dynamically distributes network config
its parameters
 In the absence of a DHCP you have to
assign IP address on the network statically
(i.e., manually)
 It works on UDP (67& 68 ) port number
AUTOMATIC PRIVATE IP ADDRESSING
 APIPA is short for Automatic Private IP Addressing, a feature of later
Windows operating systems. With APIPA, DHCP clients can automatically
self-configure an IP address and subnet mask when a DHCP server isn't
available.
 When a DHCP client boots up, it first looks for a DHCP server in order to
obtain an IP address and subnet mask.
 APIPA is meant for non-routed small business environments, usually less
than 25 clients.
 If the client is unable to find the information, it uses APIPA to automatically
configure itself with an IP address.
 The IP address range is 169.254.0.1 through 169.254.255.254. The client
also configures itself with a default class B subnet mask of 255.255.0.0.
 A client uses the self-configured IP address until a DHCP server becomes
available.
SECURE SHELL
 Secure Shell (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network.
 The best known example application is for remote login to computer systems by
users.
 SSH provides a secure channel over an unsecured network in a client-server
architecture, connecting an SSH client application with an SSH server.
 Common applications include remote command-line login and remote
command execution, but any network service can be secured with SSH.
TELNET
 It is an application layer protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communication facility using a virtual terminal
connection
IPX/SPX
 INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE
 Developed by Novell company for LAN and MAN
NETWORK BASIC INPUT / OUTPUT
SYSTEM
 NET- Bios - Network Basic Input / Output System
 It is a program that allows applications on different computers to communicate within a local
area network (LAN).
 It was created by IBM for its early PC Network, was adopted by Microsoft, and has since
become a de facto industry standard.
NWLINK IPX/ SPX
 NWLink packages data to be compatible with client/server services on
NetWare Networks.
 The SPX layer sits on top of the IPX layer and provides connection-
oriented services between two nodes on the network.
 SPX is used primarily by client–server applications.
SMTP
 SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is
delivered from an email client, such as Outlook Express, to an email server or
when email is delivered from one email server to another. SMTP uses port
25.
POP3
 POP3 stands for Post Office Protocol. POP3 allows an email client to download an
email from an email server. The POP3 protocol is simple and does not offer many
features except for download. Its design assumes that the email client downloads
all available email from the server, deletes them from the server and then
disconnects. POP3 normally uses port 110.
IMAP
 IMAP stands for Internet Message Access Protocol. IMAP shares many similar
features with POP3. It, too, is a protocol that an email client can use to download
email from an email server. However, IMAP includes many more features than
POP3. The IMAP protocol is designed to let users keep their email on the server.
IMAP requires more disk space on the server and more CPU resources than
POP3, as all emails are stored on the server. IMAP normally uses port 143. Here is
more information about IMAP.
MULTI-PURPOSE INTERNET MAIL EXTENSIONS
MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-
mail protocol that lets people use the protocol to exchange different kinds of data files
on the Internet: audio, video, images, application programs, and other kinds, as well as
the ASCII text handled in the original protocol, the Simple Mail Transport Protocol
(SMTP)
Basic to advance protocols

More Related Content

What's hot

Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
Mahmmoud Mahdi
 
Operations on Processes
Operations on ProcessesOperations on Processes
Operations on Processes
Navid Daneshvaran
 
Network architecture
Network architectureNetwork architecture
Network architecture
csk selva
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
AMIT GUPTA
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
itsvineeth209
 
Network layer
Network layerNetwork layer
Network layer
Hasib Shaikh
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
NetProtocol Xpert
 
Semi join
Semi joinSemi join
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
Windows server
Windows serverWindows server
Windows server
Hideo Amezawa
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 

What's hot (20)

Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
Operations on Processes
Operations on ProcessesOperations on Processes
Operations on Processes
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
 
Network layer
Network layerNetwork layer
Network layer
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
Semi join
Semi joinSemi join
Semi join
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Windows server
Windows serverWindows server
Windows server
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Application Layer
Application Layer Application Layer
Application Layer
 

Similar to Basic to advance protocols

Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Ports and services
Ports and servicesPorts and services
Ports and services
Ilan Mindel
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
Kailash Kumar
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Mcse question
Mcse questionMcse question
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
siva rama
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
abdulllam
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
kebeAman
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
AbenetAsmellash
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
SunilNirmal9
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
anjaniar7gallery
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 

Similar to Basic to advance protocols (20)

Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Mcse question
Mcse questionMcse question
Mcse question
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Ip
IpIp
Ip
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 

More from Varinder Singh Walia

Consumer perception towards business websites Mba project
Consumer perception towards business websites Mba project Consumer perception towards business websites Mba project
Consumer perception towards business websites Mba project
Varinder Singh Walia
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
Varinder Singh Walia
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
Varinder Singh Walia
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
Varinder Singh Walia
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
Varinder Singh Walia
 

More from Varinder Singh Walia (6)

Consumer perception towards business websites Mba project
Consumer perception towards business websites Mba project Consumer perception towards business websites Mba project
Consumer perception towards business websites Mba project
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 

Recently uploaded

F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
ArjunJain44
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
ThalapathyVijay15
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Amil baba
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
kywwoyk
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
eemet
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
kywwoyk
 

Recently uploaded (9)

F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 

Basic to advance protocols

  • 1. BASIC TO ADVANCE PROTOCOLS BY- VARINDER SINGH WALIA
  • 2. WHAT IS PROTOCOLS  A protocol is a set of rules and guidelines for communicating data or we can say it is a type of programming language in which both sides are same.  Rules are defined for each step and process during communication between two or more Devices Networks have to follow these rules to successfully transmit data. Such processes include:  TYPE OF TASK  PROCESS NATURE  DATA FLOW RATE  DATA TYPE  DEVICE MANAGEMENT
  • 4. TRANSMISSION CONTROL PROTOCOL  The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.  TCP is a connection-oriented protocol in which the data can be transferred bidirectionally after connection is being setuped.  TCP is reliable and secure but comparatively slower as it keeps the data smooth and checks error.  The order of data at receiving end is same as on sending end. Header size of TCP is 20 bytes.
  • 5. USER DATAGRAM PROTOCOL  UDP stands for “User Datagram Protocol. It is also called universal datagram protocol.  UDP is connection-less protocol in which data is needed to send in chunks.  UDP don’t have error checking mechanism that is why it is less reliable but is faster in data transferring than TCP.  Header size of UDP is 8 bytes.
  • 6. FILE TRANSFER PROTOCOL  File Transfer Protocol  Authentication is required in FTP for communication between client and server.  FTP uses TCP service which is a connection-oriented service.  FTP software is larger than TFTP.  FTP establishes two connections one for data(TCP port no. 21) and one for control(TCP port no. 20)  FTP is more complex
  • 7. TRIVIAL FILE TRANSFER PROTOCOL  Trivial File Transfer Protocol  No authentication is required in TFTP  TFTP uses UDP service which is connection-less service.  TFTP software is smaller than FTP and fits into readonly memory of the diskless workstation  TFTP establishes a single connection for its file transfer (UDP port no. 69)  TFTP have only five messages.  TFTP is less complex.
  • 8. INTERNET CONTROL MESSAGE PROTOCOL  ICMP (internet control message protocol) is an error-reporting protocol and is used by routers in our network  It is an extension to the internet protocol (IP)  ICMP creates and sends messages to the source IP address indicating that a gateway to the internet that a router, service or host cannot be reached for packet delivery.  Any IP network device has the capability to send, receive or process ICMP messages.
  • 9. HTTP Hypertext Transfer Protocol  It is used for world wide web  It is part of the Internet protocol suite and defines commands and services used for transmitting webpage data.  HTTP is the set of rules for transferring files from on device to another device  HTTP is an application protocol for distributed, collaborative, and hypermedia information systems  Some common HTTP status codes include:  200 - successful request (the webpage exists)  301 - moved permanently (often forwarded to a new URL)  401 - unauthorized request (authorization required)  403 - forbidden (access is not allowed to the page or directory)  500 - internal server error (often caused by an incorrect server configuration)
  • 10. Dynamic Host Configuration Protocol  Dynamic Host Configuration Protocol (DHCP) is a protocol for assigning dynamic IP addresses to devices on your network  The DHCP is controlled by a DHCP server that dynamically distributes network config its parameters  In the absence of a DHCP you have to assign IP address on the network statically (i.e., manually)  It works on UDP (67& 68 ) port number
  • 11. AUTOMATIC PRIVATE IP ADDRESSING  APIPA is short for Automatic Private IP Addressing, a feature of later Windows operating systems. With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available.  When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address and subnet mask.  APIPA is meant for non-routed small business environments, usually less than 25 clients.  If the client is unable to find the information, it uses APIPA to automatically configure itself with an IP address.  The IP address range is 169.254.0.1 through 169.254.255.254. The client also configures itself with a default class B subnet mask of 255.255.0.0.  A client uses the self-configured IP address until a DHCP server becomes available.
  • 12. SECURE SHELL  Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.  The best known example application is for remote login to computer systems by users.  SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server.  Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH.
  • 13. TELNET  It is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection
  • 14. IPX/SPX  INTERNET PACKET EXCHANGE / SEQUENCE PACKET EXCHANGE  Developed by Novell company for LAN and MAN
  • 15. NETWORK BASIC INPUT / OUTPUT SYSTEM  NET- Bios - Network Basic Input / Output System  It is a program that allows applications on different computers to communicate within a local area network (LAN).  It was created by IBM for its early PC Network, was adopted by Microsoft, and has since become a de facto industry standard.
  • 16. NWLINK IPX/ SPX  NWLink packages data to be compatible with client/server services on NetWare Networks.  The SPX layer sits on top of the IPX layer and provides connection- oriented services between two nodes on the network.  SPX is used primarily by client–server applications.
  • 17. SMTP  SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another. SMTP uses port 25.
  • 18. POP3  POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the email client downloads all available email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110.
  • 19. IMAP  IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. It, too, is a protocol that an email client can use to download email from an email server. However, IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are stored on the server. IMAP normally uses port 143. Here is more information about IMAP.
  • 20. MULTI-PURPOSE INTERNET MAIL EXTENSIONS MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e- mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP)