The document discusses network protocols and protocol layering. It describes the seven layers of the OSI model and four layers of the TCP/IP model. It explains the functions of each layer, including physical addressing at layer 2, logical addressing and routing at layer 3, transport functions like segmentation and error checking at layer 4, and application functions at layer 7. Common protocols are assigned to each layer, such as IP, TCP, UDP, HTTP, and FTP. Protocol layering allows dividing network designs into functional layers and assigning protocols to perform each layer's tasks.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
contents
Protocol
Types of protocol
Transmission control protocol (TCP)
internet protocol (IP)
Hyper text transfer protocol (HTTP)
Simple mail transfer protocol (SMTP)
File transfer protocol (FTP)
Layers
protocol:-A protocol is a set of rules for the exchange of data between a terminal and computer or between two computers. Think of protocol as a sort of recommunication agreement about the form in which a message or data is to be sent and receipt is to be acknowledge.
transmission control protocol(TCP):-This protocol ensures the delivery of information packets across network.
internet protocol (IP):-This important protocol is responsible for providing logical addressing called IP address to route information between networks.
hyper text transfer protocol (HTTP):- This protocol is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet.
simple mail transfer protocol(SMTP):-This protocol is used for transferring email between computers.
file transfer protocol(FTP):-FTP is responsible for allowing file to be copied between devices.
layers:-In computer programming, layering is the organization of programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
thankyou.
Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control.
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
A document about TCP/IP and OSI would typically cover two major networking models: the TCP/IP model and the OSI model. These models are both conceptual frameworks that describe the layers of communication protocols that are necessary for data to be transmitted over a network.
The TCP/IP model is a four-layer model that is used by the Internet. It includes the Application layer, Transport layer, Internet layer, and Network Access layer. Each layer has a specific function, such as providing application-level services, ensuring reliable data transmission, routing packets over the Internet, and controlling the physical transmission of data over the network.
The OSI model, on the other hand, is a seven-layer model that was developed by the International Organization for Standardization (ISO). It includes the Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data Link layer, and Physical layer. Each layer in this model also has a specific function, such as formatting data for presentation, managing communication sessions between network nodes, and managing physical connections between network devices.
In a document about TCP/IP and OSI, you might find information on the similarities and differences between the two models, the advantages and disadvantages of each model, and examples of how each model is used in real-world networking scenarios. You might also find information on specific protocols that are used within each model, such as TCP, UDP, IP, and Ethernet, and how these protocols work together to facilitate communication between network devices.
Internet Technology Lectures
network protocols, TCP/IP Model
Lecturer: Saman M. Almufti / Kurdistan Region, Nawroz University
facebook: https://www.facebook.com/saman.malmufti
YouTube Link:https://youtu.be/JgbAWAc0fDs
This slide is design for communication and computer students. students can get help from this slide about TCP/IP and protocols of internet. this slide has basic knowledge about TCP and its layers.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
2. Network Protocols
A protocol is a set of rules that governs data communications
Is a language spoken between computers to exchange information
Is a formal description of message formats and the rules that two computers
must follow in order to exchange those messages.
A protocol defines what is communicated, how it is communicated, and
when it is communicated
To request any service or exchange any information between 2 devices there
must be an agreed set of commands and data formats
Example: The HTTP protocol defines the format for communication between
web browsers and web servers
3. Cont...
• For instance, for one computer to send a message to another computer, the first computer
must perform the following general steps
break the data into small sections called packets
add addressing information to the packets identifying the source and destination
computers
deliver the data to the network interface card for transmission over the network
• The receiving computer must perform the same steps, but in reverse order
accept the data from the NIC
remove transmitting information that was added by the transmitting computer
reassemble the packets of data into the original message
• The key elements of a protocol are syntax, semantics, and timing
syntax: refers to the structure or format of the data
Semantics: refers to the meaning of each section of bits
Timing: refers to when data should be sent and how fast they can be sent
4. Protocol layering
• Protocol layering is a common technique to simplify networking designs by
dividing them into functional layers, and assigning protocols to perform each
layer's task
• Specify how networks are implemented
• For example, it is common to separate the functions of data delivery and
connection management into separate layers
• Thus, one protocol is designed to perform data delivery, and another protocol,
layered above the first, performs connection management
• The data delivery protocol is fairly simple and knows nothing of connection
management
• The connection management protocol is also fairly simple, since it doesn't need
to concern itself with data delivery
5. Cont...
• The most important layered protocol designs are:
• One famous model is the Open Systems Interconnection (OSI) reference
model
• Another famous model is TCP/IP model
7. Cont.…
Sending system Receiving system
6
5
4
3
2
1
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
6
5
4
3
2
1
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
8. Layer 7: The Application Layer
• The application layer running on the sending system (COMPUTER) is
responsible for the actual request to be made
• This could be any type of networking request—a web request using a web
browser (HTTP), an e-mail delivery request using SMTP, or a file system request
using FTP protocols
• It represents the interface between the end-user and the network.
• Concerned with providing network service to applications like
• Email
• File transfer
• Web services
• Application layer protocols are:- HTTP, FTP, SMTP, SNMP, NFS
9. Layer 6: The Presentation Layer
• After the request is made, the application layer passes the data down to the
presentation layer
• The Presentation Layer handles data format for networked communications.
• This is done by converting data into a generic format that could be understood
by both sides.
• Performs three major functionalities:-
• Translation
• Data compression
• Encryption
10. Layer 5: The Session Layer
• Controls the connections between multiple computers
• The session layer manages the dialog between computers
• It does this by establishing, managing, and terminating
communications between two computers
• So it performs:
• Session management
• Authentication and
• Authorization
• On layers 5-7 the data package is in the form of data stream
11. Layer 4: The Transport Layer
• The transport layer handles transport functions such as reliable and unreliable
delivery of the data. For reliable transport protocols, the transport layer works
hard to ensure reliable delivery of data to its destinations.
• On the sending system, the transport layer is responsible for breaking the data
into smaller packets, so that if retransmission is required, only the packets
missing will be sent. Missing packets are determined by the fact that the
transport layer receives acknowledgments (ACKs) from the remote system, when
the remote system receives the packets.
• The transport layer is responsible for
• Segmentation
• Flow control
• Error correction
• Protocols:
• Transmission Control Protocol (TCP) – Connection Oriented
• User Datagram Protocol (UDP) – Connectionless.
12. TCP and UDP
• TCP is a connection-oriented protocol
• TCP provides the functions:
• Dividing a chunk of data into segments
• Reassembly segments into the original chunk
• Error checking and flow control through a virtual link that it
establishes and finally terminates.
• Offering a reliable data delivery service
• Examples include FTP and Email
13. UDP (User Datagram Protocol)
UDP (User Datagram Protocol): unreliable, connectionless protocol that not error
checks or offers any flow control.
Is faster than TCP because no feedback in UDP
Examples: online streaming movies , Voice over IP, game
14. Layer 3: The Network Layer
• The network layer is responsible for managing and routing of packets by using
information stored in a routing table
• The routing table is a list of available paths that are stored in memory on the
routers
• In front of the segments a network header is places, telling the sender's IP
address and the destination IP address.
• This header remains constant and will be just read and not changed by the
equipment's during the communication.
• The network layer is responsible for working with
• Logical addressing
• Routing
• Path determination
15. Cont.….
Which path should traffic take through networks is decided at this layer
Address - where something is
Route - how to get there
Only two devices which are directly connected by the same “wire” can
exchange data directly
Devices not on the same network must communicate via intermediate system
Router is an intermediate system
The network layer determines the best way to transfer data. It manages
device addressing and tracks the location of devices.
Hardware:
• The router operates at this layer.
16. Layer 2: The Data Link Layer
• The data link layer is responsible for physical addressing
• MAC addressing of the sender and receiver for each packet to form a frame
• Data unit used at data link layer is called a frame
• Is responsible for error correction functions
17. Layer 1: The Physical Layer
• The bottom layer of the OSI hierarchy is concerned only with moving bits of data
onto and off the network medium
• Responsible for converting the data frame to a pattern of signals that will be
used to send the data across the communication medium.
• On the receiving system, the signals will be converted to frame by the data link
layer and then passed up to the network layer for further processing
• Cable, connectors, repeaters, transmitters, receivers, are associated with physical
layer
18. TCP/IP Model
Is a standard that defines how to establish and maintain a network
conversation via which application programs can exchange data
TCP/IP is a set of protocols developed to allow cooperating computers
to share resources across a network
TCP works with the Internet Protocol (IP), which defines how
computers send packets of data to each other.
20. Cont.…
Application layer: concerned with
• Representation
• Encoding
• Dialogue control
• Transport layer: concerned with
• Reliabil and unreliable
• Flow control
• Error correction
• Internet layer: concerned with
• Logical addressing
• Best path determination
• Network access layer
• Concerned with physical addressing
• Transmission of data across media
21. OSI and TCP/IP
OSI and TCP/IP - similarities
• Both have layers
• Both assume packets are switched (called packet switched), i.e. that packets could
take different paths to reach to the same destination. Circuit switched is a case in
which all packets take the same path
• Both should be known by network professionals
OSI and TCP/IP - differences
• TCP/IP combines session, presentation and application layers into a single
layer
• TCP/IP combines physical and data link layer into a single layer
• TCP/IP is the standard in which the internet has grown
22. Categorizing protocols
• Application protocols work in
• Application layer
• Presentation layer
• Session layer
• Transport protocols work in
• Transport layer
• Network protocols work in
• Network layer
• Data link layer
• Physical layer
23. Application layer protocols
• Hypertext Transfer Protocol (HTTP)
• Used for exchanging files (text, graphic images, sound, video, and other
multimedia files) on the World Wide Web.
• File Transfer Protocol (FTP)
• Used for transferring files from one computer to another
• Simple Mail Transfer (SMTP)
• Used for transferring e-mail across the Internet.
• Network File System (NFS)
• Used to transfer files from one computer to another
• Simple Network Management Protocol (SNMP)
• Used to manage a network
24. Transport protocols
• Transmission Control Protocol (TCP)
• Enables two hosts to establish a connection and exchange streams of data. It
guarantees delivery of data and also guarantees that individual units of data
(called packets) will be delivered in the same order in which they were sent
• User datagram protocol (UDP)
• The other transport layer protocol, provides datagram delivery service. UDP
does not verify connections between receiving and sending hosts. Because
UDP eliminates the processes of establishing and verifying connections,
applications that send small amounts of data use UDP rather than TCP.
25. Network protocol
• Internet Protocol (IP)
• Specifies the format of packets and the addressing scheme.
• Most networks combine IP with a Transport Control Protocol (TCP), which
establishes a virtual connection between a destination and a source.
• IP by itself is something like the postal system.
• It allows you to address a package and drop it in the system, but there’s no direct
link between you and the recipient
• Address Resolution Protocol (ARP)
• The Address Resolution Protocol (ARP) conceptually exists between the data-link
and Internet layers. ARP assists IP in directing datagrams to the appropriate
receiving host by mapping Ethernet addresses (48 bits long) to known IP addresses
(32 bits long).
• Ethernet
• The most common local area network (LAN) protocol
• X.25
• Common wide area network (WAN) protocol
Editor's Notes
Syntax: It indicates how to read the data in the form of bits or fields. Example: A protocol might expect that the size of a data packet will be 16 bits. In which, the first 8 bits are address, the next 4 bits are the check-sum bits, and the last 4 bits will contain the message. So, every communication that is following that protocol should send 16-bit data.
Semantics: It specifies which field defines what action. It defines how a particular section of bits or pattern can be interpreted, and what action needs to be taken. Example: It interprets whether the bits of address identify the route to be taken or the final destination of the message or something else.
Timing: Example: A sender can send the data at a speed of 100 Mbps, but the receiver can consume it only at a speed of 20 Mbps, then there may be data losses or the packets might get dropped. So, proper synchronization must be there between a sender and a receiver.
Encryption using secure socket layer
Segmentation: each segement contain port number seq number
The routing table is a list of available destinations that are stored in memory on the routers.
OSPF, BGP