SlideShare a Scribd company logo
1 of 38
Download to read offline
Addis ababa medical and business college
Department of information technology ITNS
Level III
unit of competence install and manage network protocols
Email:- jaletosunkemo2019@gmail.com
At the end of this module the trianee will able to know:-
• basic concept of protocol
• network protocol and their function
• how protocol is work
• protocols and port number
• purpose of network protocol
• HTTP,HTTPS,FTP,IP,ICMP,POP3 and etc
by jaleto S. 2
LO1 INTRODUCTION TO NETWORK PROTOCOL
basic concept of network protocol
• A network protocol is an established set of
rules that determine how data is
transmitted between different devices in the
same network.
• Essentially, it allows connected devices to
communicate with each other, regardless of
any differences in their internal processes,
structure or design.
by jaleto S. 3
LO1 INTRODUCTION TO NETWORK PROTOCOL
CONT...
• a protocol is a standardized set of rules for formatting and
processing data. Protocols enable computers to communicate
with one another.
• Network protocols are a set of rules, conventions, and data
structures that dictate how devices exchange data across
networks.
• Network Protocols are a set of rules governing exchange of
information in an easy, reliable and secure way.
• In order for two computers to talk to each other, they must be
speaking the same language.
by jaleto S. 4
List of Network Protocols
• There are thousands of different network
protocols, but they all perform one of three
primary actions:
– Communication
– Network Management
– Security
by jaleto S. 5
Communication
• Communication protocols allow different network devices to communicate with
each other. They are used in both analog and digital communications and can be
used for important processes, ranging from transferring files between devices to
accessing the internet.
• Common types of communication protocols include the following:
• Automation: These protocols are used to automate different processes in both
commercial and personal settings, such as in smart buildings, cloud technology or
self-driving vehicles.
• Instant messaging: Instantaneous, text-based communications on smartphones and
computers occur because of a number of different instant messaging network
protocols.
• Routing: Routing protocols permit communication between routers and other
network devices. There are also routing protocols specifically for ad hoc networks.
• Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and
computers — work due to a variety of different Bluetooth protocols.
• File transfer: If you have ever moved files from one device to another, either via a
physical or digital medium, you’ve used file transfer protocols (FTP).
• Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via
the internet. The internet could not operate as it currently does without IP.
by jaleto S. 6
Network management
• protocols define and describe the various procedures needed to effectively
operate a computer network. These protocols affect various devices on a
single network — including computers, routers and servers — to ensure
each one, and the network as a whole, perform optimally.
• The functions of network management protocols include the following:
• Connection: These protocols establish and maintain stable connections
between different devices on the same network.
• Link aggregation: Link aggregation protocols allow you to combine
multiple network connections into one link between two devices. This
works to increase the strength of the connection and helps sustain the
connection should one of the links fail.
• Troubleshooting: Troubleshooting protocols allow network administrators
to identify errors affecting the network, evaluate the quality of the network
connection, and determine how administrators can fix any issues.
by jaleto S. 7
Security
• Security protocols, also called cryptographic protocols, work to
ensure that the network and the data sent over it are protected from
unauthorized users.
• Common functions of security network protocols include the
following:
• Encryption: Encryption protocols protect data and secure areas by
requiring users to input a secret key or password in order to access
that information.
• Entity Authentication: Entity authentication protocols create a
system that requires different devices or users on a network to verify
their identity before accessing secure areas.
• Transportation: Transportation security protocols protect data
while it is transported from one network device to another.
by jaleto S. 8
Here are a few examples of the most commonly used network
protocols:
• Hypertext Transfer Protocol (HTTP): This Internet Protocol
defines how data is transmitted over the internet and
determines how web servers and browsers should respond to
commands. This protocol (or its secure counterpart, HTTPS)
appears at the beginning of various URLs or web addresses
online.
• Secure Socket Shell (SSH): This protocol provides secure
access to a computer, even if it’s on an unsecured network.
SSH is particularly useful for network administrators who
need to manage different systems remotely.
• Short Message Service (SMS): This communications
protocol was created to send and receive text messages over
cellular networks. SMS refers exclusively to text-based
messages. Pictures, videos or other media require Multimedia
Messaging Service (MMS), an extension of the SMS protocol.
by jaleto S. 9
Cont…
• Protocols
• Protocols are a fundamental aspect of digital
communication as they dictate how to format, transmit
and receive data. They are a set of rules that determines
how the data will be transmitted over the network.
• It can also be defined as a communication standard
followed by the two key parties(sender and receiver) in
a computer network to communicate with each other.
• It specifies what type of data can be transmitted, what
commands are used to send and receive data, and how
data transfers are confirmed.
by jaleto S. 10
How to implement network protocols
• In order for network protocols to work, they must be coded within
software -- either as part of the computer's operating system (OS) or
as an application -- or implemented within the computer's hardware.
Most modern OSes possess built-in software services that are
prepared to implement some network protocols. Other applications,
such as web browsers, are designed with software libraries that
support the protocols necessary for the application to function. In
addition, TCP/IP and routing protocol support is implemented in
direct hardware for enhanced performance.
• Whenever a new protocol is implemented, it is added to the protocol
suite. The organization of protocol suites is considered to be
monolithic since all protocols are stored in the same address and
build on top of one another.
by jaleto S. 11
Levels of a Protocol
• There are mainly three levels of a protocol, they are as
follows:
• Hardware Level: In this level, the protocol enables the
hardware devices to connect and communicate with
each other for various purposes.
• Software Level: In the software level, the protocol
enables different software to connect and communicate
with each other to work collaboratively.
• Application Level: In this level, the protocol enables
the application programs to connect and communicate
with each other for various purposes.
by jaleto S. 12
Types of Protocols
• Protocols can be broadly divided into the
following two types:
– Standard Protocols
– Proprietary Protocols
by jaleto S. 13
Standard Protocols
• A standard protocol is a mandated protocol for all
devices. It supports multiple devices and acts as a
standard.
• Standard protocols are not vendor-specific i.e.
they are not specific to a particular company or
organization. They are developed by a group of
experts from different organizations​ .
• These protocols are publicly available, and we
need not pay for them.
• Some of the examples of Standard Protocols
are FTP, DNS, DHCP, SMTP, TELNET, TFTP, etc.
by jaleto S. 14
Proprietary Protocols
• Proprietary protocols are developed by an
individual organization for their specific
devices. We have to take permission from the
organization if we want to use their protocols.
• It is not a standard protocol and it supports
only specific devices. We may have to pay for
these protocols.
• Some of the examples of Proprietary Protocols
are IMessage, Apple Talk, etc.
by jaleto S. 15
Key Elements of protocols
• The key elements of the protocol determine
what to be communicated, how it is
communicated, and when it is communicated.
• There are mainly three key elements of a
protocol, they are as follows:
– Syntax
– Semantics
– Timing
by jaleto S. 16
Syntax
• Syntax refers to the structure or format of data and
signal levels. It indicates how to read the data in the
form of bits or fields. It also decides the order in which
the data is presented to the receiver.
• Example: A protocol might expect that the size of a
data packet will be 16 bits. In which, the first 4 bits are
the sender’s address, the next 4 bits are the receiver’s
address, the next 4 bits are the check-sum bits, and the
last 4 bits will contain the message. So, every
communication that is following that protocol should
send 16-bit data.
by jaleto S. 17
Semantics​
• Semantics refers to the interpretation or meaning
of each section of bits or fields. It specifies which
field defines what action. It defines how a
particular section of bits or pattern can be
interpreted, and what action needs to be taken. It
includes control information for coordination and
error handling.
• Example: It interprets whether the bits of address
identify the route to be taken or the final
destination of the message or something else.
by jaleto S. 18
Timing
• Timing refers to two characteristics:
– when the data should be sent?
– what will be the speed of sending and receiving the data?
• It performs speed matching, sequencing and flow
control of the data items.
• Example: A sender can send the data at a speed of 100
Mbps, but the receiver can consume it only at a speed
of 20 Mbps, then there may be data losses or the
packets might get dropped. So, proper synchronization
must be there between a sender and a receiver.
by jaleto S. 19
Functions of protocols
• The Following are the main functionalities of a
protocol:
• Data Sequencing​: It mainly refers to dive data into
packets i.e. it divided the whole data into some packets.
• Data Flow​: It mainly deals with sending data to the
correct destination i.e. the flow of the data is correct or
not.
• Data Routing​: It refers to select the best path for data
transmission between a sender and a receiver because
there can be many routes from sender to receiver and
you should select the best possible route.
by jaleto S. 20
Cont…
• Encapsulation​: It refers to the process of taking one
protocol and transferring it to some other another
protocol.
• Segmentation & Reassembly​: It deals with
segmenting the data message i.e. diving the data into
packets when data flows from the upper protocol layer
to lower, and reassembly is vice-versa of segmentation
i.e. all the segmented packets are recollected in the
correct order at the receiver side.
• Connection Control​: It ensures connection oriented
data transfer for lengthy data items.
by jaleto S. 21
cont...
• Multiplexing​:​ It allows combining multiple transmission unit
signals or channels of higher-level protocols in one transmission unit
of a lower-level protocol. Multiplexing can be upward or downward.
• Ordered Delivery​:​ Protocol facilitates ordered delivery of data, by
providing a unique sequence number to each data packet. It is the
function of the sender to maintain ordered delivery. By doing so, the
receiver will receive the data in the same order as sent by the sender.
• Transmission Services​: ​It mainly deals with priority, Quality of
Service (QoS), and security of data packets.
• Addressing​:​ It mainly deals with addressing levels, addressing
scope, communication identifiers, and addressing modes.
• Flow Control​:​ It facilitates to limit the flow of data. It is the
function of the receiver's end to maintain flow control of data.
by jaleto S. 22
cont...
• Error Control​: It deals with error
detection (using the checksum bits) and
its control. If any error is detected during
the transmission of the data, a request for
retransmission of data is sent to the
sender by the receiver, and the corrupt
data packet is discarded.
by jaleto S. 23
There are various types of protocols that support a major and compassionate
role in communicating with different devices across the network. These are:
• Transmission Control Protocol (TCP)
• Internet Protocol (IP)
• User Datagram Protocol (UDP)
• Post office Protocol (POP)
• Simple mail transport Protocol (SMTP)
• File Transfer Protocol (FTP)
• Hyper Text Transfer Protocol (HTTP)
• Hyper Text Transfer Protocol Secure (HTTPS)
• Telnet
• Gopher
• NAT
by jaleto S. 24
Cont…
• Transmission Control Protocol (TCP): TCP is a popular
communication protocol which is used for communicating
over a network. It divides any message into series of packets
that are sent from source to destination and there it gets
reassembled at the destination.
• Internet Protocol (IP): An IP is an internet protocol address.
Essentially, it is a numeric value assigned to a network device,
and it is used for the identification and location of a network
device. IP addresses are assigned to every type of network
device.
• IP is designed explicitly as addressing protocol. It is mostly
used with TCP. The IP addresses in packets help in routing
them through different nodes in a network until it reaches the
destination system.
• TCP/IP is the most popular protocol connecting the networks.
by jaleto S. 25
Cont..
• User Datagram Protocol (UDP): UDP is a substitute
communication protocol to Transmission Control
Protocol implemented primarily for creating loss-
tolerating and low-latency linking between different
applications.
• Post office Protocol (POP): POP3 is designed for
receiving incoming E-mails.
• Simple mail transport Protocol (SMTP): SMTP is
designed to send and distribute outgoing E-Mail.
• File Transfer Protocol (FTP): FTP allows users to
transfer files from one machine to another. Types of
files may include program files, multimedia files, text
files, and documents, etc.
by jaleto S. 26
Cont…
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating links.
These links may be in any form like text or images.
– HTTP is designed on Client-server principles which allow a client system for
establishing a connection with the server machine for making a request.
– The server acknowledges the request initiated by the client and responds
accordingly.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as
Hyper Text Transfer Protocol Secure is a standard protocol to secure the
communication among two computers one using the browser and other fetching
data from web server.
– HTTP is used for transferring data between the client browser (request) and the web
server (response) in the hypertext format, same in case of HTTPS except that the
transferring of data is done in an encrypted format.
– So it can be said that https thwart hackers from interpretation or modification of
data throughout the transfer of packets.
by jaleto S. 27
Cont…
• Telnet: Telnet is a set of rules designed for
connecting one system with another. The
connecting process here is termed as remote
login.
– The system which requests for connection is the local
computer, and the system which accepts the
connection is the remote computer.
• Gopher: Gopher is a collection of rules
implemented for searching, retrieving as well as
displaying documents from isolated sites.
– Gopher also works on the client/server principle.
by jaleto S. 28
cont...
• NAT (network adress translation)is a
method that enables hosts on private networks
to communicate with hosts on the Internet
• NAT is run on routers that connect private
networks to the public Internet, to replace the
IP address-port pair of an IP packet with
another IP address-port pair.
by jaleto S. 29
Cont…
• some other popular protocols act as co-functioning protocols
associated with these primary protocols for core functioning.
These are:
• ARP (Address Resolution Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• IMAP4 (Internet Message Access Protocol)
• SIP (Session Initiation Protocol)
• RTP (Real-Time Transport Protocol)
• RLP (Resource Location Protocol)
• RAP (Route Access Protocol)
• L2TP (Layer Two Tunneling Protocol)
• PPTP (Point To Point Tunneling Protocol)
• SNMP (Simple Network Management Protocol)
by jaleto S. 30
cont...
• ARP (Address Resolution Protocol)
– is a procedure for mapping a dynamic IP address to a permanent physical
machine address in a local area network (LAN). Or IP into MAC
• (RARP) Reverse Address Resolution Protocol is a protocol a
physical machine in a local area network (LAN) can use to request
its IP address.
– It does this by sending the device's physical address to a specialized RARP
server that is on the same LAN and is actively listening for RARP requests.
• DHCP (Dynamic Host Configuration Protocol)
– dynamic Host Configuration Protocol (DHCP) is a client/server protocol
that automatically provides an Internet Protocol (IP) host with its IP
address and other related configuration information such as the subnet
mask and default gateway.
• NetBIOS (Network Basic Input/Output System) is a network
service that enables applications on different computers to
communicate with each other
by jaleto S. 31
Cont..
• IRC (Internet Relay Chat) is a protocol
for real-time text messaging between internet-
connected computers created in 1988.
• It is mainly used for group discussion in chat
rooms called “channels” although it supports
private messages between two users, data
transfer, and various server-side and client-side
commands.
by jaleto S. 32
Border Gateway Protocol (BGP)
• BGP:- version 4 is widely used on the public internet
and by Internet Service Providers (ISP) to maintain
very large routing tables and traffic processing. BGP
is one of the few protocols that have been designed to
deal with the astronomically large routing tables that
must exist on the public Internet.
• User Datagram Protocol (UDP) is a Transport Layer
protocol. UDP is a part of the Internet Protocol suite,
referred to as UDP/IP suite. Unlike TCP, it is
an unreliable and connectionless protocol.
• RDP:-
– It enables you to establish a connection with a remote
computer.
by jaleto S. 33
SSL
• The Secure Sockets Layer (SSL) protocol was
developed by Netscape Communications
Corporation.
• SSL ensures the data that is transferred
between a client and a server remains private.
This protocol enables the client to authenticate
the identity of the server
by jaleto S. 34
What is protocol port
• A port in networking is a software-defined
number associated to a network protocol that
receives or transmits communication for a
specific service.
• A port in computer hardware is a jack or
socket that peripheral hardware plugs into
by jaleto S. 35
Some protocols within their ports
Protocol service name Port
numbers
File Transfer Protocol (FTP 20 and 21
Secure Shell (SSH) 22
Telnet 23
Simple Mail Transfer Protocol
(SMTP)
25
Domain Name System (DNS) 53
Trivial File Transfer Protocol
(TFTP)
69
Dynamic Host Configuration
Protocol (DHCP)
67 and 68
IRC 194
by jaleto S. 36
cont...
Protocol service name Port numbers
HTTPS 443
POP3 110
Network Time Protocol (NTP) 123
NetBIOS 137/138/139
Internet Message Access Protocol
(IMAP)
143
by jaleto S. 37
THE END OF LO1
ANY QUESTION
by jaleto S. 38

More Related Content

Similar to installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf

architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommercepreetikapri1
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxbmit1
 
Communication Protocol - Arindam Samanta
Communication Protocol - Arindam SamantaCommunication Protocol - Arindam Samanta
Communication Protocol - Arindam Samantasankhadeep
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docxkndnewguade
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adiAdiseshaK
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxEdJulleza
 

Similar to installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf (20)

Network architecture (protocols) by lanz lowen jay o. bognot
Network architecture (protocols) by lanz lowen jay o. bognotNetwork architecture (protocols) by lanz lowen jay o. bognot
Network architecture (protocols) by lanz lowen jay o. bognot
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
CN PPT
CN PPTCN PPT
CN PPT
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Communication Protocol - Arindam Samanta
Communication Protocol - Arindam SamantaCommunication Protocol - Arindam Samanta
Communication Protocol - Arindam Samanta
 
2_iot.pptx
2_iot.pptx2_iot.pptx
2_iot.pptx
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
Chapters1&2.pdf
Chapters1&2.pdfChapters1&2.pdf
Chapters1&2.pdf
 
Giuzio angela
Giuzio angelaGiuzio angela
Giuzio angela
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Ferro
FerroFerro
Ferro
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 

More from TadeseBeyene

micro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjjmicro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjjTadeseBeyene
 
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhhChapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhhTadeseBeyene
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptxTadeseBeyene
 
Moniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptxMoniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptxTadeseBeyene
 
monitor and Admin Network .pptx
monitor and Admin Network .pptxmonitor and Admin Network .pptx
monitor and Admin Network .pptxTadeseBeyene
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptxTadeseBeyene
 
Chapter 3 And 4.pptx
Chapter 3 And 4.pptxChapter 3 And 4.pptx
Chapter 3 And 4.pptxTadeseBeyene
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxTadeseBeyene
 
Chap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptxChap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptxTadeseBeyene
 
Chap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptxChap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptxTadeseBeyene
 
Chap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptxChap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptxTadeseBeyene
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
Chapter 2 Architecture (updated).pptx
Chapter 2  Architecture (updated).pptxChapter 2  Architecture (updated).pptx
Chapter 2 Architecture (updated).pptxTadeseBeyene
 
Chapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxChapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxTadeseBeyene
 

More from TadeseBeyene (20)

micro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjjmicro chapter 3jjgffffyeyhhuyerfftfgggffgjj
micro chapter 3jjgffffyeyhhuyerfftfgggffgjj
 
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhhChapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
Chapter fourvvvvvvvbbhhgggghhhhhhheryuuuhh
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
Chapter four.pptx
Chapter four.pptxChapter four.pptx
Chapter four.pptx
 
Moniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptxMoniter & Administrator Network & System Security.pptx
Moniter & Administrator Network & System Security.pptx
 
monitor and Admin Network .pptx
monitor and Admin Network .pptxmonitor and Admin Network .pptx
monitor and Admin Network .pptx
 
provide1923.pptx
provide1923.pptxprovide1923.pptx
provide1923.pptx
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptx
 
Chapter 3 And 4.pptx
Chapter 3 And 4.pptxChapter 3 And 4.pptx
Chapter 3 And 4.pptx
 
chapter2.pptx
chapter2.pptxchapter2.pptx
chapter2.pptx
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
 
Chap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptxChap 1 - Introduction GUI.pptx
Chap 1 - Introduction GUI.pptx
 
CHP 1 Apply.pptx
CHP 1 Apply.pptxCHP 1 Apply.pptx
CHP 1 Apply.pptx
 
Chap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptxChap 1 - mobile Introduction.pptx
Chap 1 - mobile Introduction.pptx
 
Chap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptxChap - 2 - Event Handling.pptx
Chap - 2 - Event Handling.pptx
 
chapter 1.pptx
chapter 1.pptxchapter 1.pptx
chapter 1.pptx
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Chapter 2 Architecture (updated).pptx
Chapter 2  Architecture (updated).pptxChapter 2  Architecture (updated).pptx
Chapter 2 Architecture (updated).pptx
 
Chapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptxChapter 1 Introduction- DS.pptx
Chapter 1 Introduction- DS.pptx
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf

  • 1. Addis ababa medical and business college Department of information technology ITNS Level III unit of competence install and manage network protocols Email:- jaletosunkemo2019@gmail.com
  • 2. At the end of this module the trianee will able to know:- • basic concept of protocol • network protocol and their function • how protocol is work • protocols and port number • purpose of network protocol • HTTP,HTTPS,FTP,IP,ICMP,POP3 and etc by jaleto S. 2 LO1 INTRODUCTION TO NETWORK PROTOCOL
  • 3. basic concept of network protocol • A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. • Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. by jaleto S. 3 LO1 INTRODUCTION TO NETWORK PROTOCOL
  • 4. CONT... • a protocol is a standardized set of rules for formatting and processing data. Protocols enable computers to communicate with one another. • Network protocols are a set of rules, conventions, and data structures that dictate how devices exchange data across networks. • Network Protocols are a set of rules governing exchange of information in an easy, reliable and secure way. • In order for two computers to talk to each other, they must be speaking the same language. by jaleto S. 4
  • 5. List of Network Protocols • There are thousands of different network protocols, but they all perform one of three primary actions: – Communication – Network Management – Security by jaleto S. 5
  • 6. Communication • Communication protocols allow different network devices to communicate with each other. They are used in both analog and digital communications and can be used for important processes, ranging from transferring files between devices to accessing the internet. • Common types of communication protocols include the following: • Automation: These protocols are used to automate different processes in both commercial and personal settings, such as in smart buildings, cloud technology or self-driving vehicles. • Instant messaging: Instantaneous, text-based communications on smartphones and computers occur because of a number of different instant messaging network protocols. • Routing: Routing protocols permit communication between routers and other network devices. There are also routing protocols specifically for ad hoc networks. • Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and computers — work due to a variety of different Bluetooth protocols. • File transfer: If you have ever moved files from one device to another, either via a physical or digital medium, you’ve used file transfer protocols (FTP). • Internet Protocol: Internet Protocol (IP) allows data to be sent between devices via the internet. The internet could not operate as it currently does without IP. by jaleto S. 6
  • 7. Network management • protocols define and describe the various procedures needed to effectively operate a computer network. These protocols affect various devices on a single network — including computers, routers and servers — to ensure each one, and the network as a whole, perform optimally. • The functions of network management protocols include the following: • Connection: These protocols establish and maintain stable connections between different devices on the same network. • Link aggregation: Link aggregation protocols allow you to combine multiple network connections into one link between two devices. This works to increase the strength of the connection and helps sustain the connection should one of the links fail. • Troubleshooting: Troubleshooting protocols allow network administrators to identify errors affecting the network, evaluate the quality of the network connection, and determine how administrators can fix any issues. by jaleto S. 7
  • 8. Security • Security protocols, also called cryptographic protocols, work to ensure that the network and the data sent over it are protected from unauthorized users. • Common functions of security network protocols include the following: • Encryption: Encryption protocols protect data and secure areas by requiring users to input a secret key or password in order to access that information. • Entity Authentication: Entity authentication protocols create a system that requires different devices or users on a network to verify their identity before accessing secure areas. • Transportation: Transportation security protocols protect data while it is transported from one network device to another. by jaleto S. 8
  • 9. Here are a few examples of the most commonly used network protocols: • Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is transmitted over the internet and determines how web servers and browsers should respond to commands. This protocol (or its secure counterpart, HTTPS) appears at the beginning of various URLs or web addresses online. • Secure Socket Shell (SSH): This protocol provides secure access to a computer, even if it’s on an unsecured network. SSH is particularly useful for network administrators who need to manage different systems remotely. • Short Message Service (SMS): This communications protocol was created to send and receive text messages over cellular networks. SMS refers exclusively to text-based messages. Pictures, videos or other media require Multimedia Messaging Service (MMS), an extension of the SMS protocol. by jaleto S. 9
  • 10. Cont… • Protocols • Protocols are a fundamental aspect of digital communication as they dictate how to format, transmit and receive data. They are a set of rules that determines how the data will be transmitted over the network. • It can also be defined as a communication standard followed by the two key parties(sender and receiver) in a computer network to communicate with each other. • It specifies what type of data can be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. by jaleto S. 10
  • 11. How to implement network protocols • In order for network protocols to work, they must be coded within software -- either as part of the computer's operating system (OS) or as an application -- or implemented within the computer's hardware. Most modern OSes possess built-in software services that are prepared to implement some network protocols. Other applications, such as web browsers, are designed with software libraries that support the protocols necessary for the application to function. In addition, TCP/IP and routing protocol support is implemented in direct hardware for enhanced performance. • Whenever a new protocol is implemented, it is added to the protocol suite. The organization of protocol suites is considered to be monolithic since all protocols are stored in the same address and build on top of one another. by jaleto S. 11
  • 12. Levels of a Protocol • There are mainly three levels of a protocol, they are as follows: • Hardware Level: In this level, the protocol enables the hardware devices to connect and communicate with each other for various purposes. • Software Level: In the software level, the protocol enables different software to connect and communicate with each other to work collaboratively. • Application Level: In this level, the protocol enables the application programs to connect and communicate with each other for various purposes. by jaleto S. 12
  • 13. Types of Protocols • Protocols can be broadly divided into the following two types: – Standard Protocols – Proprietary Protocols by jaleto S. 13
  • 14. Standard Protocols • A standard protocol is a mandated protocol for all devices. It supports multiple devices and acts as a standard. • Standard protocols are not vendor-specific i.e. they are not specific to a particular company or organization. They are developed by a group of experts from different organizations​ . • These protocols are publicly available, and we need not pay for them. • Some of the examples of Standard Protocols are FTP, DNS, DHCP, SMTP, TELNET, TFTP, etc. by jaleto S. 14
  • 15. Proprietary Protocols • Proprietary protocols are developed by an individual organization for their specific devices. We have to take permission from the organization if we want to use their protocols. • It is not a standard protocol and it supports only specific devices. We may have to pay for these protocols. • Some of the examples of Proprietary Protocols are IMessage, Apple Talk, etc. by jaleto S. 15
  • 16. Key Elements of protocols • The key elements of the protocol determine what to be communicated, how it is communicated, and when it is communicated. • There are mainly three key elements of a protocol, they are as follows: – Syntax – Semantics – Timing by jaleto S. 16
  • 17. Syntax • Syntax refers to the structure or format of data and signal levels. It indicates how to read the data in the form of bits or fields. It also decides the order in which the data is presented to the receiver. • Example: A protocol might expect that the size of a data packet will be 16 bits. In which, the first 4 bits are the sender’s address, the next 4 bits are the receiver’s address, the next 4 bits are the check-sum bits, and the last 4 bits will contain the message. So, every communication that is following that protocol should send 16-bit data. by jaleto S. 17
  • 18. Semantics​ • Semantics refers to the interpretation or meaning of each section of bits or fields. It specifies which field defines what action. It defines how a particular section of bits or pattern can be interpreted, and what action needs to be taken. It includes control information for coordination and error handling. • Example: It interprets whether the bits of address identify the route to be taken or the final destination of the message or something else. by jaleto S. 18
  • 19. Timing • Timing refers to two characteristics: – when the data should be sent? – what will be the speed of sending and receiving the data? • It performs speed matching, sequencing and flow control of the data items. • Example: A sender can send the data at a speed of 100 Mbps, but the receiver can consume it only at a speed of 20 Mbps, then there may be data losses or the packets might get dropped. So, proper synchronization must be there between a sender and a receiver. by jaleto S. 19
  • 20. Functions of protocols • The Following are the main functionalities of a protocol: • Data Sequencing​: It mainly refers to dive data into packets i.e. it divided the whole data into some packets. • Data Flow​: It mainly deals with sending data to the correct destination i.e. the flow of the data is correct or not. • Data Routing​: It refers to select the best path for data transmission between a sender and a receiver because there can be many routes from sender to receiver and you should select the best possible route. by jaleto S. 20
  • 21. Cont… • Encapsulation​: It refers to the process of taking one protocol and transferring it to some other another protocol. • Segmentation & Reassembly​: It deals with segmenting the data message i.e. diving the data into packets when data flows from the upper protocol layer to lower, and reassembly is vice-versa of segmentation i.e. all the segmented packets are recollected in the correct order at the receiver side. • Connection Control​: It ensures connection oriented data transfer for lengthy data items. by jaleto S. 21
  • 22. cont... • Multiplexing​:​ It allows combining multiple transmission unit signals or channels of higher-level protocols in one transmission unit of a lower-level protocol. Multiplexing can be upward or downward. • Ordered Delivery​:​ Protocol facilitates ordered delivery of data, by providing a unique sequence number to each data packet. It is the function of the sender to maintain ordered delivery. By doing so, the receiver will receive the data in the same order as sent by the sender. • Transmission Services​: ​It mainly deals with priority, Quality of Service (QoS), and security of data packets. • Addressing​:​ It mainly deals with addressing levels, addressing scope, communication identifiers, and addressing modes. • Flow Control​:​ It facilitates to limit the flow of data. It is the function of the receiver's end to maintain flow control of data. by jaleto S. 22
  • 23. cont... • Error Control​: It deals with error detection (using the checksum bits) and its control. If any error is detected during the transmission of the data, a request for retransmission of data is sent to the sender by the receiver, and the corrupt data packet is discarded. by jaleto S. 23
  • 24. There are various types of protocols that support a major and compassionate role in communicating with different devices across the network. These are: • Transmission Control Protocol (TCP) • Internet Protocol (IP) • User Datagram Protocol (UDP) • Post office Protocol (POP) • Simple mail transport Protocol (SMTP) • File Transfer Protocol (FTP) • Hyper Text Transfer Protocol (HTTP) • Hyper Text Transfer Protocol Secure (HTTPS) • Telnet • Gopher • NAT by jaleto S. 24
  • 25. Cont… • Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. • Internet Protocol (IP): An IP is an internet protocol address. Essentially, it is a numeric value assigned to a network device, and it is used for the identification and location of a network device. IP addresses are assigned to every type of network device. • IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. • TCP/IP is the most popular protocol connecting the networks. by jaleto S. 25
  • 26. Cont.. • User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss- tolerating and low-latency linking between different applications. • Post office Protocol (POP): POP3 is designed for receiving incoming E-mails. • Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail. • File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc. by jaleto S. 26
  • 27. Cont… • Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. – HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. – The server acknowledges the request initiated by the client and responds accordingly. • Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. – HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. – So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets. by jaleto S. 27
  • 28. Cont… • Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. – The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer. • Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. – Gopher also works on the client/server principle. by jaleto S. 28
  • 29. cont... • NAT (network adress translation)is a method that enables hosts on private networks to communicate with hosts on the Internet • NAT is run on routers that connect private networks to the public Internet, to replace the IP address-port pair of an IP packet with another IP address-port pair. by jaleto S. 29
  • 30. Cont… • some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning. These are: • ARP (Address Resolution Protocol) • DHCP (Dynamic Host Configuration Protocol) • IMAP4 (Internet Message Access Protocol) • SIP (Session Initiation Protocol) • RTP (Real-Time Transport Protocol) • RLP (Resource Location Protocol) • RAP (Route Access Protocol) • L2TP (Layer Two Tunneling Protocol) • PPTP (Point To Point Tunneling Protocol) • SNMP (Simple Network Management Protocol) by jaleto S. 30
  • 31. cont... • ARP (Address Resolution Protocol) – is a procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN). Or IP into MAC • (RARP) Reverse Address Resolution Protocol is a protocol a physical machine in a local area network (LAN) can use to request its IP address. – It does this by sending the device's physical address to a specialized RARP server that is on the same LAN and is actively listening for RARP requests. • DHCP (Dynamic Host Configuration Protocol) – dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. • NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other by jaleto S. 31
  • 32. Cont.. • IRC (Internet Relay Chat) is a protocol for real-time text messaging between internet- connected computers created in 1988. • It is mainly used for group discussion in chat rooms called “channels” although it supports private messages between two users, data transfer, and various server-side and client-side commands. by jaleto S. 32
  • 33. Border Gateway Protocol (BGP) • BGP:- version 4 is widely used on the public internet and by Internet Service Providers (ISP) to maintain very large routing tables and traffic processing. BGP is one of the few protocols that have been designed to deal with the astronomically large routing tables that must exist on the public Internet. • User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. • RDP:- – It enables you to establish a connection with a remote computer. by jaleto S. 33
  • 34. SSL • The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications Corporation. • SSL ensures the data that is transferred between a client and a server remains private. This protocol enables the client to authenticate the identity of the server by jaleto S. 34
  • 35. What is protocol port • A port in networking is a software-defined number associated to a network protocol that receives or transmits communication for a specific service. • A port in computer hardware is a jack or socket that peripheral hardware plugs into by jaleto S. 35
  • 36. Some protocols within their ports Protocol service name Port numbers File Transfer Protocol (FTP 20 and 21 Secure Shell (SSH) 22 Telnet 23 Simple Mail Transfer Protocol (SMTP) 25 Domain Name System (DNS) 53 Trivial File Transfer Protocol (TFTP) 69 Dynamic Host Configuration Protocol (DHCP) 67 and 68 IRC 194 by jaleto S. 36
  • 37. cont... Protocol service name Port numbers HTTPS 443 POP3 110 Network Time Protocol (NTP) 123 NetBIOS 137/138/139 Internet Message Access Protocol (IMAP) 143 by jaleto S. 37
  • 38. THE END OF LO1 ANY QUESTION by jaleto S. 38