SlideShare a Scribd company logo
TCP / IP PROTOCOL PROTOCOL
TCP / IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP / IP
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP / IP
Benefits of TCP/IP: TCP/IP is commonly used as the Transport and Network  layer protocol for these reasons: 1. It support almost all network operating systems.    It is the required protocol for communicating over    the Internet. if you want to connect to the Internet    your computer has to use TCP/IP. 2. The protocol is designed to be fault tolerant and is    able to dynamically reroute packets if network links   become unavailable (assuming alternate paths exist). TCP / IP
Benefits of TCP/IP: 3. Protocol companions such as Dynamic Host    Configuration Protocol (DHCP) simplify IP    address management. 4. Domain Name System (DNS) is used with TCP/IP    to resolve a fully qualified domain name (FQDN),    such as sybex.com with its corresponding IP address. 5. TCP/IP is scalable to small and large networks. TCP / IP
Disadvantages of TCP/IP Although TCP/IP and the Internet have been wildly  successful, using this protocol has disadvantages.  1. Managing IP addresses is complicated and    cumbersome. IP address errors are usually    due to administrative error. 2. Troubleshooting TCP/IP problems on your    network requires an understanding of how    TCP/IP works and of the more than a dozen    protocols that are included in the suite. TCP / IP
Disadvantages of TCP/IP 3. Taking advantage of some of the best features    of the TCP/IP suite requires considerable skill    and knowledge.    Depending on your type of business, mastering    TCP/IP will require a significant amount of    education for you or necessitate the hiring of an    expert. TCP / IP
TCP / IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP / IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP / IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP / IP ,[object Object],[object Object],[object Object],[object Object],254 = (2 8  - 2) 2,097,152 = (2 21 ) d a.b.c 192 - 223 C 65,534 = (2 16  - 2) 16,384 = (2 14 ) c.d a.b 128 – 191 B 16,777,214 = (2 24  - 2) 128 = (2 7 ) b.c.d a 0 – 127 A Possible number of hosts Possible number of networks Host ID Network ID Range of first octet Class
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP / IP
TCP / IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP / IP 192.168.255.255 192.168.0.0 The 16-bit Block 172.31.255.255 172.16.0.0 The 20-bit Block 10.255.255.255 10.0.0.0 The 24-bit Block End of range Start of range IANA Reserved Private Network Ranges
TCP / IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP / IP IP ADDRESS Each network device needs a unique IP address. The system  administrator, or someone who coordinates IP address  assignment and configuration, should assign this address  from the pool of addresses assigned by Inter-NIC or your ISP.
TCP / IP SUBNET MASK A subnet mask defines which part of the IP address is the  network address and which is the host address. By defining  subnet masks, you specify which network your node belongs to. With this information and the destination address for your  data, TCP/IP can determine whether source and destination nodes are on the same network segment. If they are on  different segments, routing will be needed.
TCP / IP DEFAULT ROUTER OR GATEWAY You need a default router, or gateway, configured on your  workstations if you want your packets routed over an  internet-work.  The default router is the IP address of the local router that  you use to connect your network to the internet.  The workstation needs to have this information if it wants to  send packets out to the Internet. Without it, the workstation is  clueless about where to send packets destined for external  networks.
TCP/IP REFERENCE MODEL  TCP/IP reference model originates from the grandparent  of all computer networks, the ARPANET and now is used  in its successor, the worldwide Internet.  The name TCP/IP of the reference model is derived from two  primary protocols of the corresponding network architecture.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP REFERENCE MODEL
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP REFERENCE MODEL
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP REFERENCE MODEL
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP REFERENCE MODEL
HOST-TO-NETWORK LAYER Bellow the internet layer there is a great void. The TCP/IP  reference model does not really say much about what  happens here, except to point out that the host has to connect  to the network using some protocol so it can send IP packet  over it. This protocol is not defined and varies from host to  host and network to network.  TCP/IP REFERENCE MODEL
TCP/IP PROTOCOLS
 

More Related Content

What's hot

Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
Rishav Bhurtel
 
IP adress and routing(networking)
IP adress and routing(networking)IP adress and routing(networking)
IP adress and routing(networking)welcometofacebook
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
IP Address
IP AddressIP Address
IP Address
Rahul P
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overviewAGhaKhan01
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IPhunghanamhus
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
Manoj Kumar
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
sandeepjain
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
SMC Networks Europe
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
irenazd
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
Adeel Rasheed
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
mithilak
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
Hitesh Mohapatra
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
university of education,Lahore
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
Matt Bynum
 

What's hot (20)

Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
IP adress and routing(networking)
IP adress and routing(networking)IP adress and routing(networking)
IP adress and routing(networking)
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
IP Address
IP AddressIP Address
IP Address
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
 
Ipv4
Ipv4Ipv4
Ipv4
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Tcp
TcpTcp
Tcp
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 

Similar to Hardware9

C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
muslik1983
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
Hameda Hurmat
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Jeff Green
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
Networkershome
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
Emertxe Information Technologies Pvt Ltd
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 klAzhar Ali
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccnarobertoxe
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Kollins Lolong
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
Anwal Mirza
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Data link layer
Data link layerData link layer
Data link layer
Abdul MaTéèñ
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Internetworking
InternetworkingInternetworking
Internetworking
Mahendhirakumar C
 
Tcp
TcpTcp

Similar to Hardware9 (20)

C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
IP Address
IP AddressIP Address
IP Address
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 kl
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccna
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccna
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Data link layer
Data link layerData link layer
Data link layer
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Tcp
TcpTcp
Tcp
 

More from George Ranson

Processor2
Processor2Processor2
Processor2
George Ranson
 
Printer
PrinterPrinter
Printer
George Ranson
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
George Ranson
 
Getting familiar with pc
Getting familiar with pcGetting familiar with pc
Getting familiar with pc
George Ranson
 

More from George Ranson (16)

Day 1
Day   1Day   1
Day 1
 
Hardware8
Hardware8Hardware8
Hardware8
 
Hardware7
Hardware7Hardware7
Hardware7
 
Hardware5
Hardware5Hardware5
Hardware5
 
Hardware3
Hardware3Hardware3
Hardware3
 
Hardware5
Hardware5Hardware5
Hardware5
 
Hardware4
Hardware4Hardware4
Hardware4
 
Hardware3
Hardware3Hardware3
Hardware3
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Troubleshooting111
Troubleshooting111Troubleshooting111
Troubleshooting111
 
Processor2
Processor2Processor2
Processor2
 
Printer
PrinterPrinter
Printer
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Getting familiar with pc
Getting familiar with pcGetting familiar with pc
Getting familiar with pc
 
Networking basics
Networking basicsNetworking basics
Networking basics
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Hardware9

  • 1. TCP / IP PROTOCOL PROTOCOL
  • 2.
  • 3.
  • 4.
  • 5. Benefits of TCP/IP: TCP/IP is commonly used as the Transport and Network layer protocol for these reasons: 1. It support almost all network operating systems. It is the required protocol for communicating over the Internet. if you want to connect to the Internet your computer has to use TCP/IP. 2. The protocol is designed to be fault tolerant and is able to dynamically reroute packets if network links become unavailable (assuming alternate paths exist). TCP / IP
  • 6. Benefits of TCP/IP: 3. Protocol companions such as Dynamic Host Configuration Protocol (DHCP) simplify IP address management. 4. Domain Name System (DNS) is used with TCP/IP to resolve a fully qualified domain name (FQDN), such as sybex.com with its corresponding IP address. 5. TCP/IP is scalable to small and large networks. TCP / IP
  • 7. Disadvantages of TCP/IP Although TCP/IP and the Internet have been wildly successful, using this protocol has disadvantages. 1. Managing IP addresses is complicated and cumbersome. IP address errors are usually due to administrative error. 2. Troubleshooting TCP/IP problems on your network requires an understanding of how TCP/IP works and of the more than a dozen protocols that are included in the suite. TCP / IP
  • 8. Disadvantages of TCP/IP 3. Taking advantage of some of the best features of the TCP/IP suite requires considerable skill and knowledge. Depending on your type of business, mastering TCP/IP will require a significant amount of education for you or necessitate the hiring of an expert. TCP / IP
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. TCP / IP 192.168.255.255 192.168.0.0 The 16-bit Block 172.31.255.255 172.16.0.0 The 20-bit Block 10.255.255.255 10.0.0.0 The 24-bit Block End of range Start of range IANA Reserved Private Network Ranges
  • 16.
  • 17. TCP / IP IP ADDRESS Each network device needs a unique IP address. The system administrator, or someone who coordinates IP address assignment and configuration, should assign this address from the pool of addresses assigned by Inter-NIC or your ISP.
  • 18. TCP / IP SUBNET MASK A subnet mask defines which part of the IP address is the network address and which is the host address. By defining subnet masks, you specify which network your node belongs to. With this information and the destination address for your data, TCP/IP can determine whether source and destination nodes are on the same network segment. If they are on different segments, routing will be needed.
  • 19. TCP / IP DEFAULT ROUTER OR GATEWAY You need a default router, or gateway, configured on your workstations if you want your packets routed over an internet-work. The default router is the IP address of the local router that you use to connect your network to the internet. The workstation needs to have this information if it wants to send packets out to the Internet. Without it, the workstation is clueless about where to send packets destined for external networks.
  • 20. TCP/IP REFERENCE MODEL TCP/IP reference model originates from the grandparent of all computer networks, the ARPANET and now is used in its successor, the worldwide Internet. The name TCP/IP of the reference model is derived from two primary protocols of the corresponding network architecture.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. HOST-TO-NETWORK LAYER Bellow the internet layer there is a great void. The TCP/IP reference model does not really say much about what happens here, except to point out that the host has to connect to the network using some protocol so it can send IP packet over it. This protocol is not defined and varies from host to host and network to network. TCP/IP REFERENCE MODEL
  • 27.