The document discusses networking concepts such as the difference between the internet and a network, internetworking, internet protocols, internet architecture, TCP/IP models, address mapping protocols, dynamic host configuration protocol, and domain name system servers. It provides definitions and explanations of these topics, describing for example that the internet is a global network of interconnected computer networks that uses common protocols like TCP/IP to connect devices, while a network is a set of devices connected locally.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
What is Computer Network? What is Networking? Application of Networks. Network criteria. Types of Network. LAN, MAN, WAN, Workstation, Workgroup, Domain.
This presentation will give you a basic understanding of what ping is, how it works, DoS attack, traceroute, bandwidth speed, upload and download speed, how to use ping in cmd etc.
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
What is Computer Network? What is Networking? Application of Networks. Network criteria. Types of Network. LAN, MAN, WAN, Workstation, Workgroup, Domain.
This presentation will give you a basic understanding of what ping is, how it works, DoS attack, traceroute, bandwidth speed, upload and download speed, how to use ping in cmd etc.
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This slide deck covers Networking Fundamentals, Various Penetration testing standards, OWASP TOP 10 Vulnerabilities of Web Application and the Lab Setup required for Penetration testing.
Unit-1 Introduction to WWW and Network.pptxsahilraturi
A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other. It can be established using cable or wireless media, and communication protocols such as TCP/IP, Simple Mail Transfer Protocol, and Hypertext Transfer Protocol are used to exchange data between the networked devices
A Deep Dive in the World of IT Networking (part 1)Tuan Yang
For a successful career in Information Technology, a strong foundation of basic networking concepts is a must. Networking technology allows for the exchange of data between large and small information systems used primarily by various businesses.
Learn more about:
» To be a Successful ICT Professional
» Running the IT projects successfully
» Benefit of networking
» Network Components
» Data Transfer
» IP Address
» Windows Commands
» Types of LANS
» Network Topology
» Centralized Computing Vs. Distributive Computing
» Client Server Model
» Peer to Peer Networks
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Instructions for Submissions thorugh G- Classroom.pptx
Internet architecture protocol
1. Chapter 1
Chapter 1
Differentiate between internet and network?
The Internet is a massive network of networks,
a networking infrastructure. It connects millions
of computers together globally, forming a
network in which any computer can
communicate with any other computer as long
as they are both connected to the Internet.
2. • What do you mean by internetworking?
• Internetworking is the practice of connecting
a computer network with other networks
through the use of gateways that provide a
common method of routing information
packets between the networks. The resulting
system of interconnected networks are called
an internetwork, or simply an internet.
3. • What is functioning of Internet?
• The Internet Protocol (IP) is the principal
communications protocol in the Internet
protocol suite for relaying datagrams across
network boundaries. Its routing function
enables internetworking, and essentially
establishes the Internet.
4. • What is functioning of Internet?
• The Internet Protocol (IP) is the principal
communications protocol in the Internet
protocol suite for relaying datagrams across
network boundaries. Its routing function
enables internetworking, and essentially
establishes the Internet.
5. • What is internet architecture?
• The Internet's architecture is described in its
name, a short from of the compound word
"inter-networking". This architecture is based
in the very specification of the standard TCP/IP
protocol, designed to connect any two
networks which may be very different in
internal hardware, software, and technical
design.
9. • What is the TCP IP suite of protocols?
• The Internet protocol suite is the conceptual
model and set of communications protocols
used on the Internet and similar computer
networks. It is commonly known as TCP/IP
because the original protocols in the suite are
the Transmission Control Protocol (TCP) and
the Internet Protocol (IP).
10. • What is ICMP?
• The Internet Control Message Protocol
(ICMP) is a supporting protocol in the Internet
protocol suite. It is used by network devices,
including routers, to send error messages and
operational information indicating, for
example, that a requested service is not
available or that a host or router could not be
reached.
11. • How broadcast and point-to-point networks are different?
•
• Broadcast: A method of sending a signal where multiple parties
may hear a single sender.
• Radio stations are a good example of everyday life "Broadcast
Network".
• Point-to-point: A method of communication where one "point"
(person or entity) speaks to another entity.
• An example is a telephone call, in which one telephone is
connected with one other, and what is said by one caller can only
be heard by the other.
• Another example of a simplex point-to-point communication could
be a laser used to signal a message from one point to another
12. • What is a point to point protocol?
• In computer networking, Point-to-Point Protocol
(PPP) is a data link (layer 2) protocol used to
establish a direct connection between two nodes.
• What is the point to point topology?
• The simplest topology is a permanent link
between two endpoints. Switched point-to-point
topologies are the basic model of conventional
telephony. The value of a permanent point-to-
point network is unimpeded communications
between the two endpoints
13. • What is peer-to-peer model in network, give
example?
•
• Peer-to-peer architecture (P2P architecture) is a
commonly used computer networking
architecture in which each workstation, or node,
has the same capabilities and responsibilities. It is
often compared and contrasted to the classic
client/server architecture, in which some
computers are dedicated to serving others
14.
15. • 12.Why internet architecture is based on
tiers?(Important)
• Multitier architecture (often referred to as n-tier
architecture) or multilayered architecture is a
client–server architecture in which presentation,
application processing, and data management
functions are physically separated. The most
widespread use of multitier architecture is the
three-tier architecture.
16.
17. • What is internetworking ?give example
• Internetworking is the practice of connecting
a computer network with other networks
through the use of gateways that provide a
common method of routing information
packets between the networks. The resulting
system of interconnected networks are called
an internetwork, or simply an internet
18. • Although there are many types of routing
protocols, three major classes are in widespread
use on IP networks:
• Interior gateway protocols type
• 1, link-state routing protocols, such as OSPF and
IS-IS.
•
• Interior gateway protocols type
• 2, distance-vector routing protocols, such as
Routing Information Protocol, RIPv2, IGRP
19. •
• Address Mapping (Address Resolution)
•
• Q no.1 what is address mapping? Which
protocols are used for this purpose?
• Address mapping is a process to correlate or
translate one address to another.
20. • These operations are performed by variety of i.e. ARP,
RARP, Proxy ARP, BOOTP and DHCP.
• The most common operations performed with address
resolution protocols are: the (a) correlation of a MAC
address to an IP, and (b) the correlation of an IP
address to a MAC.
• Q no.2 ARP (Address Resolution Protocol)
• This protocol is used for address mapping Logical (IP) to
Physical (MAC).
• IP packets use logical (host-to-host) addresses. These
packets however need to be encapsulated in a frame,
which needs physical address (node-to-node).
21. • Working:
• This means that the sender needs the physical address of
the receiver. The host or the router sends an ARP query
packet. The Packet includes the Physical and IP address of
the sender and IP address of the receiver, because the
sender does not know the physical address of the receiver,
the query is broadcast over the network.
• Every host or router receive the ARP query packet but only
the intended recipient recognizes its IP address and sends
back an ARP response packet.
• ARP query packet will be broadcast and ARP response
packet will be unicast
22. • Q no.3 RARP (Reverse Address Resolution Protocol)
• We sometimes need reverse mapping i.e. mapping a
physical address to a logical address.
• Working:
• A RARP request is created and broadcast on the local
network. Another machine on the local network that
knows all the IP addresses will respond with a RARP
reply.
• The requesting machine must be running a ARP client
program and the responding machine must be running
a RARP server program.
23. • Q no. 4 what is Proxy ARP?
• Proxy ARP is the technique in which one host,
usually a router, answers ARP requests
intended for another machine. By "faking" its
identity, the router accepts responsibility for
routing packets to the "real" destination
24. • Q no. 5 what is the use of proxy ARP?
•
• Proxy ARP is used to create subnetting effect.
• It is a technique by which a device (router) on
a given network answers the ARP queries for
announcing its own physical MAC address.
After router receive the actual packet, it sends
it to the appropriate router or host
25. • Q no.6 what is the purpose of the Dynamic
Host Configuration Protocol?
•
• Dynamic Host Configuration Protocol (DHCP)
is a network protocol that enables a server to
automatically assign an IP address to a
computer from a defined range of numbers
(i.e., a scope) configured for a given network.
26. • Q no.7 what is BOOTP?
• The Bootstrap Protocol (BOOTP) is a client
/server protocol designed to provide physical
to logical address mapping. It is a static
configuration protocol.
27. • Working:
• As BOOTP is an application layer protocol, BOOTP
messages first encapsulate in UDP packet and
UDP packet already in format of IP address.
• Why protocols are required for exchange of
data?
• Network protocols made the modernization of
the Internet possible. Such protocols allow
computers to communicate with other computers
without users having to know what is happening
in the background
28. • 16.What is the role of DS bits in IP datagram?
•
• The third and fourth fields of the IPv4 header (second
and third fields of the IPv6 header) are the
Differentiated Services (called DS Field) and ECN fields,
formerly called the ToS Byte or IPv6 Traffic Class.
• Type of Service (TOS): A field designed to carry
information to provide quality of service features, such
as prioritized delivery, for IP datagrams. It was never
widely used as originally defined, and its meaning has
been subsequently redefined for use by a technique
called Differentiated Services (DS).
29. •
• An address space has a total of 1024 addresses, how
many bits are needed te represent an address?
• Log21,024 =10
• What is the DNS server?
• A DNS server is any computer registered to join the
Domain Name System. A DNS server runs special-
purpose networking software, features a public IP
address, and contains a database of network names
and addresses for other Internet hosts
30. • What are DNS settings Windows 10?
• Changing your DNS in Windows 10
• Firstly, open the Network and Sharing Centre
by right-clicking on your network connections
symbol in the bottom-right corner of the
screen, then click on Open Network and
Sharing Center.
• Click on the connection type
31. •
• What is the purpose of DNS?
• Solution:
• The Domain Name System (aka DNS) is used to resolve
human-readable hostnames like www.Dyn.com into
machine-readable IP addresses like 204.13.248.115. DNS
also provides other information about domain names, such
as mail services
• What is CIDR?
• CIDR (Classless Inter-Domain Routing, sometimes called
supernetting) is a way to allow more flexible allocation of
Internet Protocol (IP) addresses than was possible with the
original system of IP address classes.
32. • What is the difference between Supernetting
and subnetting?
• When a large network is subnetted, the
network is divided into at least two smaller
subnetworks, with each subnetwork (subnet)
having its own subnetwork address (subnetid).
When supernetting is performed, several
small Class C networks are combined to create
one large network, or supernetwork.