TCP/IP is a set of protocols that defines how data is transmitted and formatted so that networked systems can communicate. It originated from ARPAnet, which was developed by the Department of Defense to create a decentralized network resilient to attacks. TCP/IP provides logical addressing, routing between networks, name resolution from names to addresses, error checking and flow control for reliable data transmission, and support for multiple applications simultaneously through the use of ports. It is overseen by various standards organizations to ensure interoperability.
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Difference between OSI Layer & TCP/IP LayerNetwax Lab
Difference between OSI Layer & TCP/IP Layer
TCP/IP OSI
It has 4 layers. It has 7 layers.
TCP/IP Protocols are considered to be standards
around which the internet has developed.
OSI Model however is a "generic, protocolindependent standard."
Follows Vertical Approach Follows Horizontal Approach
In TCP/IP Model, Transport Layer does not
Guarantees delivery of packets.
In OSI Model, Transport Layer Guarantees
delivery of packets.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Difference between OSI Layer & TCP/IP LayerNetwax Lab
Difference between OSI Layer & TCP/IP Layer
TCP/IP OSI
It has 4 layers. It has 7 layers.
TCP/IP Protocols are considered to be standards
around which the internet has developed.
OSI Model however is a "generic, protocolindependent standard."
Follows Vertical Approach Follows Horizontal Approach
In TCP/IP Model, Transport Layer does not
Guarantees delivery of packets.
In OSI Model, Transport Layer Guarantees
delivery of packets.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Pricing Analytics: Segmenting Customers To Maximize RevenueMichael Lamont
Potential customers for a product or service can be segmented into valuation groups. High valuation groups are willing to pay more for the product or service, while low valuation groups are only willing to pay a lesser amount for the same product or service. This presentation provides a basic background on yield management through customer segmentation, and a hands-on example of modeling airline customer segmentation using Excel.
The “best” price for a product or service is one that maximizes profits, not necessarily the price that sells the most units. This presentation uses real-world examples to explore how Excel’s Solver functionality can be used to calculate the optimal price for any product or service.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Pricing Analytics: Segmenting Customers To Maximize RevenueMichael Lamont
Potential customers for a product or service can be segmented into valuation groups. High valuation groups are willing to pay more for the product or service, while low valuation groups are only willing to pay a lesser amount for the same product or service. This presentation provides a basic background on yield management through customer segmentation, and a hands-on example of modeling airline customer segmentation using Excel.
The “best” price for a product or service is one that maximizes profits, not necessarily the price that sells the most units. This presentation uses real-world examples to explore how Excel’s Solver functionality can be used to calculate the optimal price for any product or service.
Pricing Analytics: Estimating Demand Curves Without Price ElasticityMichael Lamont
Most techniques used to created demand curves depend on the product’s price elasticity. But what if you don’t have or can’t obtain the price elasticity figures for a particular product? If you can make reasonable estimates of demand for a product at a high, median, and low price point, then you can still construct a reasonable estimate of the demand curve over the range of those prices. This presentation shows how to use Excel’s line fitting and Solver functionality to construct a demand curve without knowing the product’s price elasticity, and determine the optimal price for the product that maximizes profit margin.
Pricing Analytics: Creating Linear & Power Demand CurvesMichael Lamont
An introduction to the two most common types of demand curves (linear and power), which can be used to estimate the price for a product or service that maximizes profit margins. Includes hands-on real-world examples using Excel.
Business Intelligence: Multidimensional AnalysisMichael Lamont
An introduction to multidimensional business intelligence and OnLine Analytical Processing (OLAP) suitable for both a technical and non-technical audience. Covers dimensions, attributes, measures, Key Performance Indicators (KPIs), aggregates, hierarchies, and data cubes.
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
Sales and promotional discounts let retailers reach pools of customers that value the same product differently. Modeling the pool of potential buyers, and how it changes over time, lets you optimize how and when sales and discounts are applies. This presentation provides a hands-on demonstration of modeling the pool of potential buyers, and using Excel’s Solver tool to optimize revenue from that shopper pool by manipulating price.
Here is the presentation I gave during Synergy 2012 in SFO on our performance tuning efforts in the AOL production network. The presentation gives details on the various tcpprofile options, examples of our custom profiles and the impact these had on the service.
At the end is a section on troubleshooting and what snmp oids we watch for early problem detection.
Feel free to ask questions or make comments.
The TCP/IP protocol suite has a number of vulnerability and security flaws inherent in the protocols. Those vulnerabilities are often used by crackers for Denial of Service (DOS) attacks, connection hijacking and other attacks. The following are the major TCP/IP security problems:
TCP SYN attacks (or SYN Flooding) ¡§CThe TCP uses sequence numbers to ensure data is given to the user in the correct order. The sequence numbers are initially established during the opening phase of a TCP connection in the three-way handshake. TCP SYN attacks take advantage of a flaw in how most hosts implement TCP three-way handshake. When Host B receives the SYN request from A, it must keep track of the partially opened connection in a "listen queue" for at least 75 seconds and a host can only keep track of a very limited number of connections. A malicious host can exploit the small size of the listen queue by sending multiple SYN requests to a host, but never replying to the SYN&ACK the other host sends back. By doing so, the other host's listen queue is quickly filled up, and it will stop accepting new connections, until a partially opened connection in the queue is completed or times out. This ability to effectively remove a host from the network for at least 75 seconds can be used as a denial-of-service attack, or it can be used to implement other attacks, like IP Spoofing.
IP Spoofing - IP spoofing is an attack used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. The IP layer assumes that the source address on any IP packet it receives is the same IP address as the system that actually sent the packet -- it does no authentication. Many higher level protocols and applications also make this assumption, so it seems that anyone able to forge the source address of an IP packet could get unauthorized privileges. There are few variations of IP Spoofing such as Blind and Non-blind spoofing, man-in-the-middle- attack (connection hijacking), etc. For details, please read the IP Spoofing section.
Routing attacks ¡§C This attack takes advantage of Routing Information Protocol (RIP), which is often an essential component in a TCP/IP network. RIP is used to distribute routing information within networks, such as shortest-paths, and advertising routes out from the local network. Like TCP/IP, RIP has no built in authentication, and the information provided
in a RIP packet is often used without verifying it. Attacks on RIP change where data goes to, not where it came from. For example, an attacker could forge a RIP packet, claiming his host "X" has the fastest path out of the network. All packets sent out from that network would then be routed through X, where they could be modified or examined. An attacker could also use RIP to effectively impersonate any host, by causing all traffic sent to that host to be sent to the attacker's machine
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...Dragon1 Inc.
This presentation sheds a light on 20 principles of Dragon1 how to effectively get the CIO to making decisions supported by Architecture Visualizations.
This presentation is all about the internet basics we need to know before making a website or some other internet related works . This will help you to have a clear idea on What Is Internet.
Thank you
feel free to ask any queries in comment box
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
This presentation explores the reasons why software projects are significantly more difficult to manage than other types of projects. Software-specific issues related to scope, resources, and time are explored, as well as how software projects differ from other projects in the physical world. An argument for why software constitutes a “Wicked Problem” is expanded, and numerous software development myths are attacked with real-world anecdotes and solutions.
The prices of several product classes – notably fashion and technology – tend to drop over time. One possible reason for the drop over time is different customers assigning a different value to the same product or service. Price skimming models can be used to maximize a product or service’s revenue by planning price reductions over time in a manner that slowly cuts tranches of higher-value customers out of the market. This presentation provides a hands-on demonstration of constructing a price skimming model in Excel, and optimizing planned price reductions.
HP Tech Forum 2009 presentation covering some of the ways spammers harvest email addresses on the Internet (and how you can prevent it), including an in-depth look at three commonly used software packages.
Slides from my wildly popular presentation at HP World 2005. Who knew? Grossly over-simplified signal processing methodology and sample photos of models in bikinis was a winning combo, even in San Francisco.
Evaluating and Implementing Anti-Spam SolutionsMichael Lamont
Presentation from HP World 2004 that explores common anti-spam technologies including how they work, how effective they are, their relative strengths/weaknesses, and how spammers try to circumvent them. Also has a section on evaluating anti-spam software packages.
Methodology for a technical evaluation of software-based spam filters - a hot topic back in 2005. It was originally going to be given at the HP Tech Forum in New Orleans in Sept 2005 - Katrina forced the conference to cancel while I was literally on the way to the Boston airport. Ended up giving this presentation at the rescheduled conference in Orlando in Oct 2005.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Introduction
TCP/IP is a set of data transfer protocols used by
modern data networks
Data network: a group of computers and other devices
that communicate over a shared medium
Data & requests for data are transmitted between
computers over the network
Physical transmission mediums can be copper cables,
fiber optics, or radio waves
3. Basic Network Functionality
BOS1 transmits data to BOS2
BOS2 receives and interprets data from BOS1
BOS2 transmits data back to BOS1
BOS1 BOS2
4. Applications
An application lets a computer interact with other
computers by performing a specific set of tasks
The application is responsible for managing the
transmitting and receiving of data required to perform
its tasks
The application has to be able to communicate with
applications on other networked computers for it to be
useful
6. Application Data Flow
Application
Application Layer
Transport Layer
Internet Layer
Net Access Layer
Network
Application
Application Layer
Transport Layer
Internet Layer
Net Access Layer
7. Applications
A network protocol is a set of rules for how
applications intercommunicate
Common applications include:
• SMTP, IMAP, and POP (email)
• HTTP (web)
• SSH (secure access)
• NFS and FTP (file transfer)
8. TCP/IP
The protocols that make up TCP/IP define:
• How data is transmitted across a network
• How data should be formatted so other networked systems
can understand it
TCP/IP provides a complete system for formatting,
transmitting, and receiving data on a network
9. TCP/IP
A TCP/IP implementation is a software package that
handles all of the formatting, transmitting, and
receiving of data
Process Software’s MultiNet and TCPware packages let
OpenVMS systems participate in data networks
10. The Internet
TCP/IP is the standard for modern data
communications across all networks
In the 1970s, two kinds of networks were being
developed:
• Local area networks (LANs)
• ARPAnet
11. ARPAnet
Dept of Defense grew
concerned that their
critical command-and-
control systems were
balkanized in late 1960s
12. ARPAnet
DoD had small groups of
networked systems, but
they used proprietary
protocols
Generally, only systems
from the same
manufacturer could be
networked together
13. ARPAnet
As the DoD became more reliant on computers, they
desperately needed everything on one big network
DoD knew this network would be a primary target for
the Soviets
Key requirement: the network had to be decentralized,
with no single point of failure
The network had to stay up in the face of a large-scale
nuclear attack
14. ARPAnet
Defense’s Advanced
Research Projects Agency
(ARPA) was tasked to
design and build this new
style of network
ARPAnet’s protocols
provided the basis for
TCP/IP
15. The Internet
In mid-1970s National Science Foundation wanted to
network universities and research institutions
NSF built off of ARPAnet’s design and protocols to
create the Internet
16. Decentralized Data Networking
TCP/IP’s decentralized nature is a key reason it’s still
ubiquitous today
Two key TCP/IP features support decentralization:
• End node verification: the two endpoints of any data transfer
are responsible for making sure it was successful – no
centralized control scheme
• Dynamic routing: End nodes can transfer data over multiple
paths, and the network chooses the best (fastest, most
reliable) path for each individual data transfer
17. Local Area Networks
LAN technology was being developed in parallel to
ARPAnet and the Internet
Early LANs were highly proprietary and didn’t support
the concept of a larger network (like the Internet)
Vendor lock-in was rampant
18. Local Area Networks
The wide adoption of open interconnectivity protocols
in the R&D community spilled over into corporations
TCP/IP was a proven solution that could make a
company’s disparate systems/networks all work
together
Growing popularity of the Internet also spilled over
into corporations
Email was the original “killer app”
19. Local Area Networks
Some LAN vendors started with a step in the right
direction: gateways between their proprietary
protocols and TCP/IP
Any LAN technology that survives today provides native
TCP/IP support
20. 5 Core Networking Problems
Addressing
Routing
Name resolution
Flow control
Interoperability
21. Physical Addressing
Every network-connected
hardware device has a
unique ID
This physical ID is
“burned” into the device
when it’s fabricated
Physical
Address
22. Physical Addressing
Guaranteed to be unique from the beginning to the
end of the Internet’s existence
Referred to as a MAC (Machine Access Code)
Low-level TCP/IP protocols use MAC addresses to move
data across the physical network to the right device
23. Physical Addressing
You can think of MAC addresses like phone numbers
On very small networks, nodes can just blindly dump
data onto the physical network
Every node has to examine every transmission and
figure out which data is meant for it
24. Physical Addressing
“Dump and parse” quickly exceeds hardware
capabilities as network size increases
Trying that scheme on the Internet would exceed
physics-imposed limits
Most addressing schemes that work with physical
addresses can’t scale beyond very small networks
25. Logical Addressing
Routers are special network devices that let you divide
large networks into smaller subnets
A well-designed network uses routers to create a tree-
like structure
The hierarchy of routers lets data travel between
nodes without hitting every other node on the network
26. Logical Addressing
TCP/IP provides native support for logical addressing
IP Address: logical address configured in a node’s
TCP/IP implementation
IP addresses can be broken down into network, subnet,
and host ID numbers:
143.192. 168. 227
27. Routing
Routers are specialized devices that move data across
networks
Routers use the logical address information in a data
packet to send it to its destination
Routers isolate a subnet’s traffic from the entire
network
Data transmitted between systems on the same subnet
isn’t transmitted across the larger network
28. Routing
Keeps unnecessary traffic
from cluttering up the
entire network
Data traffic destined for a
system outside the
subnet is transmitted as
far up the network as it
needs to go
Larger
Network
29. Routing
Large networks have lots
of routers and multiple
possible paths between
nodes
TCP/IP specifies how
routers should pick the
best path across a
network
RoutersRouters
30. Name Resolution
Logical IP addresses are “friendlier” than physical MAC
addresses, but still aren’t really human readable
Domain Names: structured, user friendly system
names provided by TCP/IP
Examples of domain names:
• www.process.com
• mail.wku.edu
• travel.state.gov
31. Name Resolution
Name Resolution: the
process of mapping
logical addresses back
and forth into domain
names
32. Name Resolution
Special name servers store the mapping information in
databases
TCP/IP’s Domain Name Service (DNS) provides a
hierarchy of name servers that handle name resolution
for the Internet
33. Error Checking & Flow Control
Several features integrated into TCP/IP guarantee
reliable data transfers:
• All data transmissions are checked for corruption and missing
data
• All data transmissions are positively acknowledged by the
receiving node
• In-band flow control so any system involved in a data
transmission can control the rate at which data is sent
34. Application Support
Key feature of modern networks is ability to run
multiple network apps simultaneously
Ports: logical channels provided by TCP/IP that allow
multiple applications to access the network
simultaneously
Ports identified by unique numbers
36. Standards Organizations
TCP/IP is based on open and complete standards
Standards guarantee interoperability of network
software and hardware
Several standards organizations are responsible for
developing and maintaining TCP/IP’s standards
37. Standards Organizations
Internet Architecture
Board (IAB)
Sets general policies for
the Internet
Manages development of
data protocols and
standards
38. Standards Organizations
Internet Engineering Task
Force (IETF)
R&D organization that
develops Internet
standards
Composed of working
groups that focus on a
particular area
39. Standards Organizations
Internet Corporation for
Assigned Names and
Numbers (ICANN)
Manages IP addresses,
domain names, and port
numbers
40. Standards Organizations
Requests for Comments (RFC): standards published by
the IETF
Every part of TCP/IP and the Internet has its own RFC
RFCs are the best way to get a complete understanding
of a standard, protocol, or practice
Freely available from www.ietf.org
41. Summary
Networking and protocol basics
The TCP/IP protocol family originated from the US
Department of Defense’s ARPAnet
ARPAnet’s resilient design architecture has been
carried forward to the Internet
TCP/IP is a completely decentralized protocol that’s
device agnostic
42. Summary
TCP/IP’s five key features:
• Logical addressing
• Routing
• Name resolution
• Flow control
• Simultaneous application support
Internet standards and oversight bodies