SlideShare a Scribd company logo
Chapter 1
Chapter 1
Differentiate between internet and network?
The Internet is a massive network of networks,
a networking infrastructure. It connects millions
of computers together globally, forming a
network in which any computer can
communicate with any other computer as long
as they are both connected to the Internet.
• What do you mean by internetworking?
• Internetworking is the practice of connecting
a computer network with other networks
through the use of gateways that provide a
common method of routing information
packets between the networks. The resulting
system of interconnected networks are called
an internetwork, or simply an internet.
• What is functioning of Internet?
• The Internet Protocol (IP) is the principal
communications protocol in the Internet
protocol suite for relaying datagrams across
network boundaries. Its routing function
enables internetworking, and essentially
establishes the Internet.
• What is functioning of Internet?
• The Internet Protocol (IP) is the principal
communications protocol in the Internet
protocol suite for relaying datagrams across
network boundaries. Its routing function
enables internetworking, and essentially
establishes the Internet.
• What is internet architecture?
• The Internet's architecture is described in its
name, a short from of the compound word
"inter-networking". This architecture is based
in the very specification of the standard TCP/IP
protocol, designed to connect any two
networks which may be very different in
internal hardware, software, and technical
design.
What is TCP/IP model?
• What is the TCP IP suite of protocols?
• The Internet protocol suite is the conceptual
model and set of communications protocols
used on the Internet and similar computer
networks. It is commonly known as TCP/IP
because the original protocols in the suite are
the Transmission Control Protocol (TCP) and
the Internet Protocol (IP).
• What is ICMP?
• The Internet Control Message Protocol
(ICMP) is a supporting protocol in the Internet
protocol suite. It is used by network devices,
including routers, to send error messages and
operational information indicating, for
example, that a requested service is not
available or that a host or router could not be
reached.
• How broadcast and point-to-point networks are different?
•
• Broadcast: A method of sending a signal where multiple parties
may hear a single sender.
• Radio stations are a good example of everyday life "Broadcast
Network".
• Point-to-point: A method of communication where one "point"
(person or entity) speaks to another entity.
• An example is a telephone call, in which one telephone is
connected with one other, and what is said by one caller can only
be heard by the other.
• Another example of a simplex point-to-point communication could
be a laser used to signal a message from one point to another
• What is a point to point protocol?
• In computer networking, Point-to-Point Protocol
(PPP) is a data link (layer 2) protocol used to
establish a direct connection between two nodes.
• What is the point to point topology?
• The simplest topology is a permanent link
between two endpoints. Switched point-to-point
topologies are the basic model of conventional
telephony. The value of a permanent point-to-
point network is unimpeded communications
between the two endpoints
• What is peer-to-peer model in network, give
example?
•
• Peer-to-peer architecture (P2P architecture) is a
commonly used computer networking
architecture in which each workstation, or node,
has the same capabilities and responsibilities. It is
often compared and contrasted to the classic
client/server architecture, in which some
computers are dedicated to serving others
• 12.Why internet architecture is based on
tiers?(Important)
• Multitier architecture (often referred to as n-tier
architecture) or multilayered architecture is a
client–server architecture in which presentation,
application processing, and data management
functions are physically separated. The most
widespread use of multitier architecture is the
three-tier architecture.
• What is internetworking ?give example
• Internetworking is the practice of connecting
a computer network with other networks
through the use of gateways that provide a
common method of routing information
packets between the networks. The resulting
system of interconnected networks are called
an internetwork, or simply an internet
• Although there are many types of routing
protocols, three major classes are in widespread
use on IP networks:
• Interior gateway protocols type
• 1, link-state routing protocols, such as OSPF and
IS-IS.
•
• Interior gateway protocols type
• 2, distance-vector routing protocols, such as
Routing Information Protocol, RIPv2, IGRP
•
• Address Mapping (Address Resolution)
•
• Q no.1 what is address mapping? Which
protocols are used for this purpose?
• Address mapping is a process to correlate or
translate one address to another.
• These operations are performed by variety of i.e. ARP,
RARP, Proxy ARP, BOOTP and DHCP.
• The most common operations performed with address
resolution protocols are: the (a) correlation of a MAC
address to an IP, and (b) the correlation of an IP
address to a MAC.
• Q no.2 ARP (Address Resolution Protocol)
• This protocol is used for address mapping Logical (IP) to
Physical (MAC).
• IP packets use logical (host-to-host) addresses. These
packets however need to be encapsulated in a frame,
which needs physical address (node-to-node).
• Working:
• This means that the sender needs the physical address of
the receiver. The host or the router sends an ARP query
packet. The Packet includes the Physical and IP address of
the sender and IP address of the receiver, because the
sender does not know the physical address of the receiver,
the query is broadcast over the network.
• Every host or router receive the ARP query packet but only
the intended recipient recognizes its IP address and sends
back an ARP response packet.
• ARP query packet will be broadcast and ARP response
packet will be unicast
• Q no.3 RARP (Reverse Address Resolution Protocol)
• We sometimes need reverse mapping i.e. mapping a
physical address to a logical address.
• Working:
• A RARP request is created and broadcast on the local
network. Another machine on the local network that
knows all the IP addresses will respond with a RARP
reply.
• The requesting machine must be running a ARP client
program and the responding machine must be running
a RARP server program.
• Q no. 4 what is Proxy ARP?
• Proxy ARP is the technique in which one host,
usually a router, answers ARP requests
intended for another machine. By "faking" its
identity, the router accepts responsibility for
routing packets to the "real" destination
• Q no. 5 what is the use of proxy ARP?
•
• Proxy ARP is used to create subnetting effect.
• It is a technique by which a device (router) on
a given network answers the ARP queries for
announcing its own physical MAC address.
After router receive the actual packet, it sends
it to the appropriate router or host
• Q no.6 what is the purpose of the Dynamic
Host Configuration Protocol?
•
• Dynamic Host Configuration Protocol (DHCP)
is a network protocol that enables a server to
automatically assign an IP address to a
computer from a defined range of numbers
(i.e., a scope) configured for a given network.
• Q no.7 what is BOOTP?
• The Bootstrap Protocol (BOOTP) is a client
/server protocol designed to provide physical
to logical address mapping. It is a static
configuration protocol.
• Working:
• As BOOTP is an application layer protocol, BOOTP
messages first encapsulate in UDP packet and
UDP packet already in format of IP address.
• Why protocols are required for exchange of
data?
• Network protocols made the modernization of
the Internet possible. Such protocols allow
computers to communicate with other computers
without users having to know what is happening
in the background
• 16.What is the role of DS bits in IP datagram?
•
• The third and fourth fields of the IPv4 header (second
and third fields of the IPv6 header) are the
Differentiated Services (called DS Field) and ECN fields,
formerly called the ToS Byte or IPv6 Traffic Class.
• Type of Service (TOS): A field designed to carry
information to provide quality of service features, such
as prioritized delivery, for IP datagrams. It was never
widely used as originally defined, and its meaning has
been subsequently redefined for use by a technique
called Differentiated Services (DS).
•
• An address space has a total of 1024 addresses, how
many bits are needed te represent an address?
• Log21,024 =10
• What is the DNS server?
• A DNS server is any computer registered to join the
Domain Name System. A DNS server runs special-
purpose networking software, features a public IP
address, and contains a database of network names
and addresses for other Internet hosts
• What are DNS settings Windows 10?
• Changing your DNS in Windows 10
• Firstly, open the Network and Sharing Centre
by right-clicking on your network connections
symbol in the bottom-right corner of the
screen, then click on Open Network and
Sharing Center.
• Click on the connection type
•
• What is the purpose of DNS?
• Solution:
• The Domain Name System (aka DNS) is used to resolve
human-readable hostnames like www.Dyn.com into
machine-readable IP addresses like 204.13.248.115. DNS
also provides other information about domain names, such
as mail services
• What is CIDR?
• CIDR (Classless Inter-Domain Routing, sometimes called
supernetting) is a way to allow more flexible allocation of
Internet Protocol (IP) addresses than was possible with the
original system of IP address classes.
• What is the difference between Supernetting
and subnetting?
• When a large network is subnetted, the
network is divided into at least two smaller
subnetworks, with each subnetwork (subnet)
having its own subnetwork address (subnetid).
When supernetting is performed, several
small Class C networks are combined to create
one large network, or supernetwork.

More Related Content

What's hot

Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
Kongu Engineering College, Perundurai, Erode
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
Akhil .B
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
Rubal Sagwal
 
What is Ping
What is PingWhat is Ping
What is Ping
Disha Dudhal
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
Trinity Dwarka
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
TCP/ IP
TCP/ IP TCP/ IP
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Cn ppt
Cn  pptCn  ppt
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
Farhan Galib
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 

What's hot (20)

Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
What is Ping
What is PingWhat is Ping
What is Ping
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Cn ppt
Cn  pptCn  ppt
Cn ppt
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

Similar to Internet architecture protocol

Iap final
Iap finalIap final
Iap final
GLIM Digital
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
BiplabaSamantaray
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
junaidahmedsaba
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
Naman Rastogi
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
sahilraturi
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Unit III
Unit IIIUnit III
Unit III
APARNA P
 
How the internet works
How the internet worksHow the internet works
How the internet worksftcim
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
apel7
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
rajasekarsankar
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
Tuan Yang
 
Networking
Networking Networking
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
Universidad De Manila
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
PrarthanaModak1
 

Similar to Internet architecture protocol (20)

Iap final
Iap finalIap final
Iap final
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Unit III
Unit IIIUnit III
Unit III
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Networking
Networking Networking
Networking
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Internet architecture protocol

  • 1. Chapter 1 Chapter 1 Differentiate between internet and network? The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.
  • 2. • What do you mean by internetworking? • Internetworking is the practice of connecting a computer network with other networks through the use of gateways that provide a common method of routing information packets between the networks. The resulting system of interconnected networks are called an internetwork, or simply an internet.
  • 3. • What is functioning of Internet? • The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
  • 4. • What is functioning of Internet? • The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
  • 5. • What is internet architecture? • The Internet's architecture is described in its name, a short from of the compound word "inter-networking". This architecture is based in the very specification of the standard TCP/IP protocol, designed to connect any two networks which may be very different in internal hardware, software, and technical design.
  • 6.
  • 7.
  • 8. What is TCP/IP model?
  • 9. • What is the TCP IP suite of protocols? • The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP because the original protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
  • 10. • What is ICMP? • The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating, for example, that a requested service is not available or that a host or router could not be reached.
  • 11. • How broadcast and point-to-point networks are different? • • Broadcast: A method of sending a signal where multiple parties may hear a single sender. • Radio stations are a good example of everyday life "Broadcast Network". • Point-to-point: A method of communication where one "point" (person or entity) speaks to another entity. • An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. • Another example of a simplex point-to-point communication could be a laser used to signal a message from one point to another
  • 12. • What is a point to point protocol? • In computer networking, Point-to-Point Protocol (PPP) is a data link (layer 2) protocol used to establish a direct connection between two nodes. • What is the point to point topology? • The simplest topology is a permanent link between two endpoints. Switched point-to-point topologies are the basic model of conventional telephony. The value of a permanent point-to- point network is unimpeded communications between the two endpoints
  • 13. • What is peer-to-peer model in network, give example? • • Peer-to-peer architecture (P2P architecture) is a commonly used computer networking architecture in which each workstation, or node, has the same capabilities and responsibilities. It is often compared and contrasted to the classic client/server architecture, in which some computers are dedicated to serving others
  • 14.
  • 15. • 12.Why internet architecture is based on tiers?(Important) • Multitier architecture (often referred to as n-tier architecture) or multilayered architecture is a client–server architecture in which presentation, application processing, and data management functions are physically separated. The most widespread use of multitier architecture is the three-tier architecture.
  • 16.
  • 17. • What is internetworking ?give example • Internetworking is the practice of connecting a computer network with other networks through the use of gateways that provide a common method of routing information packets between the networks. The resulting system of interconnected networks are called an internetwork, or simply an internet
  • 18. • Although there are many types of routing protocols, three major classes are in widespread use on IP networks: • Interior gateway protocols type • 1, link-state routing protocols, such as OSPF and IS-IS. • • Interior gateway protocols type • 2, distance-vector routing protocols, such as Routing Information Protocol, RIPv2, IGRP
  • 19. • • Address Mapping (Address Resolution) • • Q no.1 what is address mapping? Which protocols are used for this purpose? • Address mapping is a process to correlate or translate one address to another.
  • 20. • These operations are performed by variety of i.e. ARP, RARP, Proxy ARP, BOOTP and DHCP. • The most common operations performed with address resolution protocols are: the (a) correlation of a MAC address to an IP, and (b) the correlation of an IP address to a MAC. • Q no.2 ARP (Address Resolution Protocol) • This protocol is used for address mapping Logical (IP) to Physical (MAC). • IP packets use logical (host-to-host) addresses. These packets however need to be encapsulated in a frame, which needs physical address (node-to-node).
  • 21. • Working: • This means that the sender needs the physical address of the receiver. The host or the router sends an ARP query packet. The Packet includes the Physical and IP address of the sender and IP address of the receiver, because the sender does not know the physical address of the receiver, the query is broadcast over the network. • Every host or router receive the ARP query packet but only the intended recipient recognizes its IP address and sends back an ARP response packet. • ARP query packet will be broadcast and ARP response packet will be unicast
  • 22. • Q no.3 RARP (Reverse Address Resolution Protocol) • We sometimes need reverse mapping i.e. mapping a physical address to a logical address. • Working: • A RARP request is created and broadcast on the local network. Another machine on the local network that knows all the IP addresses will respond with a RARP reply. • The requesting machine must be running a ARP client program and the responding machine must be running a RARP server program.
  • 23. • Q no. 4 what is Proxy ARP? • Proxy ARP is the technique in which one host, usually a router, answers ARP requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination
  • 24. • Q no. 5 what is the use of proxy ARP? • • Proxy ARP is used to create subnetting effect. • It is a technique by which a device (router) on a given network answers the ARP queries for announcing its own physical MAC address. After router receive the actual packet, it sends it to the appropriate router or host
  • 25. • Q no.6 what is the purpose of the Dynamic Host Configuration Protocol? • • Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.
  • 26. • Q no.7 what is BOOTP? • The Bootstrap Protocol (BOOTP) is a client /server protocol designed to provide physical to logical address mapping. It is a static configuration protocol.
  • 27. • Working: • As BOOTP is an application layer protocol, BOOTP messages first encapsulate in UDP packet and UDP packet already in format of IP address. • Why protocols are required for exchange of data? • Network protocols made the modernization of the Internet possible. Such protocols allow computers to communicate with other computers without users having to know what is happening in the background
  • 28. • 16.What is the role of DS bits in IP datagram? • • The third and fourth fields of the IPv4 header (second and third fields of the IPv6 header) are the Differentiated Services (called DS Field) and ECN fields, formerly called the ToS Byte or IPv6 Traffic Class. • Type of Service (TOS): A field designed to carry information to provide quality of service features, such as prioritized delivery, for IP datagrams. It was never widely used as originally defined, and its meaning has been subsequently redefined for use by a technique called Differentiated Services (DS).
  • 29. • • An address space has a total of 1024 addresses, how many bits are needed te represent an address? • Log21,024 =10 • What is the DNS server? • A DNS server is any computer registered to join the Domain Name System. A DNS server runs special- purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts
  • 30. • What are DNS settings Windows 10? • Changing your DNS in Windows 10 • Firstly, open the Network and Sharing Centre by right-clicking on your network connections symbol in the bottom-right corner of the screen, then click on Open Network and Sharing Center. • Click on the connection type
  • 31. • • What is the purpose of DNS? • Solution: • The Domain Name System (aka DNS) is used to resolve human-readable hostnames like www.Dyn.com into machine-readable IP addresses like 204.13.248.115. DNS also provides other information about domain names, such as mail services • What is CIDR? • CIDR (Classless Inter-Domain Routing, sometimes called supernetting) is a way to allow more flexible allocation of Internet Protocol (IP) addresses than was possible with the original system of IP address classes.
  • 32. • What is the difference between Supernetting and subnetting? • When a large network is subnetted, the network is divided into at least two smaller subnetworks, with each subnetwork (subnet) having its own subnetwork address (subnetid). When supernetting is performed, several small Class C networks are combined to create one large network, or supernetwork.