SlideShare a Scribd company logo
SUB: Computer System Security
Presented By
Mr. VIVEK TTRIATHI
ASSISTANT PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
KCNIT,BANDA
What is TCP/IP Model?
 TCP/IP helps you to determine how a specific computer should be
connected to the internet and how data should be transmitted between them. It
helps you to create a virtual network when multiple computer networks are
connected together.
 TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is
specifically designed as a model to offer highly reliable and end-to-end byte
stream over an unreliable internetwork.
TCP Characteristics
Here, are the essential characteristics of TCP/IP protocol
 Support for a flexible architecture
 Adding more system to a network is easy.
 In TCP/IP, the network remains intact until the source, and
destination machines were functioning properly.
 TCP is a connection-oriented protocol.
 TCP offers reliability and ensures that data which arrives
out of sequence should put back into order.
 TCP allows you to implement flow control, so sender never
overpowers a receiver with data.
Four Layers of TCP/IP
TCP/IP Conceptual Layers
 The functionality of the TCP/IP model is divided into
four layers, and each includes specific protocols.
 TCP/IP is a layered server architecture system in which
each layer is defined according to a specific function
to perform. All these four layers work collaboratively to
transmit the data from one layer to another.
Differences between the OSI and
TCP/IP model:
Differences:
 OSI Model is developed by ISO
(International Standard Organization).
 TCP/IP model is developed by ARPANET (Advanced
Research Project Agency Network).
 OSI model provides a clear distinction between
interfaces, between services, interfaces, and protocols.
 TCP/IP doesn't have any clear distinguishing points
services, and protocols.
OSI refers to Open Systems Interconnection.
TCP refers to Transmission Control Protocol.
OSI uses the network layer to define routing standards
and protocols.
 TCP/IP uses only the Internet layer.
OSI follows a vertical approach.
TCP/IP follows a horizontal approach.
OSI is defined after the advent of the Internet.
It is defined before the advent of the internet.
In OSI The minimum size of the OSI header is 5 bytes.
In TCP/IP Minimum header size is 20 bytes.
Most Common TCP/IP Protocols
 Some widely used most common TCP/IP protocol are:
TCP:
 Transmission Control Protocol is an internet protocol
suite which breaks up the message into TCP Segments
and reassembling them at the receiving side.
IP:
 An Internet Protocol address that is also known as an IP
address is a numerical label. It is assigned to each device
that is connected to a computer network which uses the IP
for communication. Its routing function allows
internetworking and essentially establishes the Internet.
Combination of IP with a TCP allows developing a virtual
connection between a destination and a source.
HTTP:
 The Hypertext Transfer Protocol is a foundation of the
World Wide Web. It is used for transferring web pages and
other such resources from the HTTP server or web server to
the web client or the HTTP client. Whenever you use a web
browser like Google Chrome or Firefox, you are using a
web client. It helps HTTP to transfer web pages that you
request from the remote servers.
SMTP:
 SMTP stands for Simple mail transfer protocol. This
protocol supports the e-mail is known as a simple
mail transfer protocol. This protocol helps you to send
the data to another e-mail address.
SNMP:
 SNMP stands for Simple Network Management
Protocol. It is a framework which is used for managing
the devices on the internet by using the TCP/IP
protocol.
DNS:
 DNS stands for Domain Name System. An IP address
that is used to identify the connection of a host to the
internet uniquely. However, users prefer to use names
instead of addresses for that DNS.
TELNET:
 TELNET stands for Terminal Network. It establishes the
connection between the local and remote computer. It
established connection in such a manner that you can
simulate your local system at the remote system.
FTP:
 FTP stands for File Transfer Protocol. It is a mostly
used standard protocol for transmitting the files from
one machine to another.
Advantages of TCP/IP
Here, are pros/benefits of using the TCP/IP model:
 It helps you to establish/set up a connection between
different types of computers.
 It operates independently of the operating system.
 It supports many routing-protocols.
 It enables the internetworking between the organizations.
 TCP/IP model has a highly scalable client-server
architecture.
 It can be operated independently.
 Supports a number of routing protocols.
 It can be used to establish a connection between two
computers.
Disadvantages of TCP/IP
Here, are few drawbacks of using the TCP/IP model:
 TCP/IP is a complicated model to set up and manage.
 The shallow/overhead of TCP/IP is higher-than IPX
(Internetwork Packet Exchange).
 In this, model the transport layer does not guarantee
delivery of packets.
 Replacing protocol in TCP/IP is not easy.
 It has no clear separation from its services, interfaces,
and protocols.
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx

More Related Content

Similar to CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx

Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
Varinder Singh Walia
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
Anushida1
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
TCP_IP.pptx
TCP_IP.pptxTCP_IP.pptx
TCP_IP.pptx
SujayGhosh17
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
Vikas Gupta
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
Serious_SamSoul
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
Mcse question
Mcse questionMcse question
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Tech king news
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
AliHamza410
 

Similar to CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx (20)

Network protocals
Network protocalsNetwork protocals
Network protocals
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Tcp
TcpTcp
Tcp
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
TCP_IP.pptx
TCP_IP.pptxTCP_IP.pptx
TCP_IP.pptx
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
Mcse question
Mcse questionMcse question
Mcse question
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Deeps
DeepsDeeps
Deeps
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx

  • 1. SUB: Computer System Security Presented By Mr. VIVEK TTRIATHI ASSISTANT PROFESSOR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING KCNIT,BANDA
  • 2.
  • 3. What is TCP/IP Model?  TCP/IP helps you to determine how a specific computer should be connected to the internet and how data should be transmitted between them. It helps you to create a virtual network when multiple computer networks are connected together.  TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is specifically designed as a model to offer highly reliable and end-to-end byte stream over an unreliable internetwork.
  • 4. TCP Characteristics Here, are the essential characteristics of TCP/IP protocol  Support for a flexible architecture  Adding more system to a network is easy.  In TCP/IP, the network remains intact until the source, and destination machines were functioning properly.  TCP is a connection-oriented protocol.  TCP offers reliability and ensures that data which arrives out of sequence should put back into order.  TCP allows you to implement flow control, so sender never overpowers a receiver with data.
  • 5. Four Layers of TCP/IP
  • 6. TCP/IP Conceptual Layers  The functionality of the TCP/IP model is divided into four layers, and each includes specific protocols.  TCP/IP is a layered server architecture system in which each layer is defined according to a specific function to perform. All these four layers work collaboratively to transmit the data from one layer to another.
  • 7. Differences between the OSI and TCP/IP model:
  • 8. Differences:  OSI Model is developed by ISO (International Standard Organization).  TCP/IP model is developed by ARPANET (Advanced Research Project Agency Network).  OSI model provides a clear distinction between interfaces, between services, interfaces, and protocols.  TCP/IP doesn't have any clear distinguishing points services, and protocols.
  • 9. OSI refers to Open Systems Interconnection. TCP refers to Transmission Control Protocol. OSI uses the network layer to define routing standards and protocols.  TCP/IP uses only the Internet layer. OSI follows a vertical approach. TCP/IP follows a horizontal approach. OSI is defined after the advent of the Internet. It is defined before the advent of the internet. In OSI The minimum size of the OSI header is 5 bytes. In TCP/IP Minimum header size is 20 bytes.
  • 10. Most Common TCP/IP Protocols  Some widely used most common TCP/IP protocol are: TCP:  Transmission Control Protocol is an internet protocol suite which breaks up the message into TCP Segments and reassembling them at the receiving side.
  • 11. IP:  An Internet Protocol address that is also known as an IP address is a numerical label. It is assigned to each device that is connected to a computer network which uses the IP for communication. Its routing function allows internetworking and essentially establishes the Internet. Combination of IP with a TCP allows developing a virtual connection between a destination and a source.
  • 12. HTTP:  The Hypertext Transfer Protocol is a foundation of the World Wide Web. It is used for transferring web pages and other such resources from the HTTP server or web server to the web client or the HTTP client. Whenever you use a web browser like Google Chrome or Firefox, you are using a web client. It helps HTTP to transfer web pages that you request from the remote servers.
  • 13. SMTP:  SMTP stands for Simple mail transfer protocol. This protocol supports the e-mail is known as a simple mail transfer protocol. This protocol helps you to send the data to another e-mail address.
  • 14. SNMP:  SNMP stands for Simple Network Management Protocol. It is a framework which is used for managing the devices on the internet by using the TCP/IP protocol.
  • 15. DNS:  DNS stands for Domain Name System. An IP address that is used to identify the connection of a host to the internet uniquely. However, users prefer to use names instead of addresses for that DNS.
  • 16. TELNET:  TELNET stands for Terminal Network. It establishes the connection between the local and remote computer. It established connection in such a manner that you can simulate your local system at the remote system.
  • 17. FTP:  FTP stands for File Transfer Protocol. It is a mostly used standard protocol for transmitting the files from one machine to another.
  • 18. Advantages of TCP/IP Here, are pros/benefits of using the TCP/IP model:  It helps you to establish/set up a connection between different types of computers.  It operates independently of the operating system.  It supports many routing-protocols.  It enables the internetworking between the organizations.  TCP/IP model has a highly scalable client-server architecture.  It can be operated independently.  Supports a number of routing protocols.  It can be used to establish a connection between two computers.
  • 19. Disadvantages of TCP/IP Here, are few drawbacks of using the TCP/IP model:  TCP/IP is a complicated model to set up and manage.  The shallow/overhead of TCP/IP is higher-than IPX (Internetwork Packet Exchange).  In this, model the transport layer does not guarantee delivery of packets.  Replacing protocol in TCP/IP is not easy.  It has no clear separation from its services, interfaces, and protocols.