SlideShare a Scribd company logo
Seminor on
Network protocols
 Introduction
 history
 What is network protocols
 Requirements of protocols
 Functions of protocols
 Need of protocols
 Types of protocols
 Benefits of protocols
 conclusion
 computers use network protocols to
communicate in computer networks. There are
many network protocols in existence; TCP/IP
is a family of network protocols that are used
for the Internet.
 A network protocol is a standard written
down on a piece of paper (or, more precisely,
with a text editor in a computer). The
standards that are used for the Internet are
called Requests For Comment (RFC).
 The Internet base protocols and systems were
mainly devised in the 1970s and 1980s.
 TCP/IP describes a protocol which will work
on any sort of computer and operating system
for transportation of data across the internet
between different systems
 TCP/IP has proven to be remarkably robust,
but is very basic.
 The word protocol comes from the
Greek protocollon, meaning a leaf of paper glued to
a manuscript volume that describes the contents.
 Network Protocol is a set of rules that governs the
communications between computers on a network.
Network protocols are formal standards and
policies comprised of rules, procedures and
formats that define communication between two
or more devices over a network.
 Network protocols govern the end-to-end
processes of timely, secure and managed data or
network communication.
 Data formats for data exchange
 Flow control
 Routing
 Acknowledgements
 Loss of information
 Sequence control
 Identifies errors
 Applies compression techniques
 Decides on:
How to announce sent data
How to announce receive data
How to address data
How data is to be sent
 Protocols are needed for predetermined
understandings for communications
 It helps the smooth functioning of a
system,such contribution to a system may
benefit or offend you from where you stand
 TCP : Transmission Control Protocol
 HTTP : Hypertext Transfer Protocol
 FTP : File Transfer Protocol
 SMTP: Simple Mail Transfer Protocol
 UDP : User Datagram Protocol
 ICMP : Internet Control Message Protocol
 SCTP : Stream Control Transmission Protocol
 ARP : Address Resolution Protocol
 TCP/IP:
TCP/IP is a set of rules (protocols) governing
communications among all computers on the Internet.
TCP/IP was developed in 1978 and driven by Bob
Kahn and Vint Cerf.
TCP/IP is a combination of two separate protocols:
Transmission Control Protocol (TCP) and Internet
Protocol (IP).
The Transmission Control Protocol is responsible for
ensuring the reliable transmission of data across
Internet-connected networks.
TCP checks packets for errors and submits requests for
re-transmissions if any are found.
HTTP:
The Hypertext Transfer Protocol (HTTP) is
an application protocol for distributed,
collaborative, hypermedia information
systems.HTTP is the foundation of data
communication for the World Wide Web.
Development of HTTP was initiated by Tim
Berners-Lee at CERN in 1989
HTTP is an application layer protocol designed
within the framework of the Internet protocol
suite.
 FTP:
 File Transfer Protocol (FTP) is a standard
Internet protocol for transmitting files between
computers on the Internet
over TCP/IP connections.
 FTP is a client-server protocol that relies on two
communications channels between client and
server: a command channel for controlling the
conversation and a data channel for
transmitting file content.
 SMTP:
 Simple Mail Transfer Protocol is used to transport
mail. Simple Mail Transport Protocol is used on
the internet, it is not a transport layer protocol but
is an application layer protocol.
 UDP:
 - An unreliable connection less protocol used to
control the management of application level
services between computers. It is used for
transport by some applications which must
provide their own reliability.
 ICMP:
 Internet control message protocol provides
management and error reporting to help
manage the process of sending data between
computers. (Management).
 ARP:
 Address Resolution Protocol enables the
packaging of IP data into ethernet packages. It
is the system and messaging protocol that is
used to find the ethernet (hardware) address
from a specific IP number
 POP:
 POP stands for Post Office Protocol. It is
generally used to support a single client. There
are several versions of POP but the POP 3 is the
current standard.
 POP is an application layer internet standard
protocol.
 POP does not allow search facility.
 It is not suitable for accessing non mail data.
 Some important benefits are;
 They provide the path to increase the network
connections
 Enhance the speed of the connection,
 Enhance the data transmission rate and
provide easy working to the users
 Computer Networks and Protocols have
forever changed the way humans will work,
play, and communicate.
 New protocols and standards will emerge, new
applications will be conceived, and our lives
will be further changed and enhanced.
Network protocals

More Related Content

What's hot

OSI Model
OSI ModelOSI Model
OSI Model
Rahul Bandhe
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
Akhil .B
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
Krishi Agrawal
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
Vipin Rai
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 

What's hot (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Application Layer
Application Layer Application Layer
Application Layer
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network switch
Network switchNetwork switch
Network switch
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Osi model
Osi modelOsi model
Osi model
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
IP Address
IP AddressIP Address
IP Address
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 

Similar to Network protocals

Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
Anushida1
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
Noor Khalid
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IPfarhan516
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
ParikshitTaksande1
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
Kumar Alok
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
KANNANKR12
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
IMEI
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
SunilNirmal9
 

Similar to Network protocals (20)

Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Protocols
ProtocolsProtocols
Protocols
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
Ip
IpIp
Ip
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Hardware8
Hardware8Hardware8
Hardware8
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Internet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptxInternet of Things Unit - 01 Part 3A.pptx
Internet of Things Unit - 01 Part 3A.pptx
 

More from reddivarihareesh

Jquery
JqueryJquery
Java script
Java scriptJava script
Java script
reddivarihareesh
 
J servlets
J servletsJ servlets
J servlets
reddivarihareesh
 
Internet of things
Internet of thingsInternet of things
Internet of things
reddivarihareesh
 
Hibernate
HibernateHibernate
Hibernate
reddivarihareesh
 
Hadoop
HadoopHadoop
Google glass
Google glassGoogle glass
Google glass
reddivarihareesh
 
Firewall
FirewallFirewall
Filezilla
FilezillaFilezilla
Filezilla
reddivarihareesh
 
Cashcading stylesheets
Cashcading stylesheetsCashcading stylesheets
Cashcading stylesheets
reddivarihareesh
 
Cluster computing
Cluster computingCluster computing
Cluster computing
reddivarihareesh
 
Blue brain
Blue brainBlue brain
Blue brain
reddivarihareesh
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
reddivarihareesh
 
Apache
ApacheApache
Ajax
AjaxAjax

More from reddivarihareesh (15)

Jquery
JqueryJquery
Jquery
 
Java script
Java scriptJava script
Java script
 
J servlets
J servletsJ servlets
J servlets
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Hibernate
HibernateHibernate
Hibernate
 
Hadoop
HadoopHadoop
Hadoop
 
Google glass
Google glassGoogle glass
Google glass
 
Firewall
FirewallFirewall
Firewall
 
Filezilla
FilezillaFilezilla
Filezilla
 
Cashcading stylesheets
Cashcading stylesheetsCashcading stylesheets
Cashcading stylesheets
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Blue brain
Blue brainBlue brain
Blue brain
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Apache
ApacheApache
Apache
 
Ajax
AjaxAjax
Ajax
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Network protocals

  • 2.  Introduction  history  What is network protocols  Requirements of protocols  Functions of protocols  Need of protocols  Types of protocols  Benefits of protocols  conclusion
  • 3.  computers use network protocols to communicate in computer networks. There are many network protocols in existence; TCP/IP is a family of network protocols that are used for the Internet.  A network protocol is a standard written down on a piece of paper (or, more precisely, with a text editor in a computer). The standards that are used for the Internet are called Requests For Comment (RFC).
  • 4.  The Internet base protocols and systems were mainly devised in the 1970s and 1980s.  TCP/IP describes a protocol which will work on any sort of computer and operating system for transportation of data across the internet between different systems  TCP/IP has proven to be remarkably robust, but is very basic.
  • 5.  The word protocol comes from the Greek protocollon, meaning a leaf of paper glued to a manuscript volume that describes the contents.  Network Protocol is a set of rules that governs the communications between computers on a network. Network protocols are formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network.  Network protocols govern the end-to-end processes of timely, secure and managed data or network communication.
  • 6.  Data formats for data exchange  Flow control  Routing  Acknowledgements  Loss of information  Sequence control
  • 7.  Identifies errors  Applies compression techniques  Decides on: How to announce sent data How to announce receive data How to address data How data is to be sent
  • 8.  Protocols are needed for predetermined understandings for communications  It helps the smooth functioning of a system,such contribution to a system may benefit or offend you from where you stand
  • 9.  TCP : Transmission Control Protocol  HTTP : Hypertext Transfer Protocol  FTP : File Transfer Protocol  SMTP: Simple Mail Transfer Protocol  UDP : User Datagram Protocol  ICMP : Internet Control Message Protocol  SCTP : Stream Control Transmission Protocol  ARP : Address Resolution Protocol
  • 10.  TCP/IP: TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet. TCP/IP was developed in 1978 and driven by Bob Kahn and Vint Cerf. TCP/IP is a combination of two separate protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). The Transmission Control Protocol is responsible for ensuring the reliable transmission of data across Internet-connected networks. TCP checks packets for errors and submits requests for re-transmissions if any are found.
  • 11. HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems.HTTP is the foundation of data communication for the World Wide Web. Development of HTTP was initiated by Tim Berners-Lee at CERN in 1989 HTTP is an application layer protocol designed within the framework of the Internet protocol suite.
  • 12.  FTP:  File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections.  FTP is a client-server protocol that relies on two communications channels between client and server: a command channel for controlling the conversation and a data channel for transmitting file content.
  • 13.  SMTP:  Simple Mail Transfer Protocol is used to transport mail. Simple Mail Transport Protocol is used on the internet, it is not a transport layer protocol but is an application layer protocol.  UDP:  - An unreliable connection less protocol used to control the management of application level services between computers. It is used for transport by some applications which must provide their own reliability.
  • 14.  ICMP:  Internet control message protocol provides management and error reporting to help manage the process of sending data between computers. (Management).  ARP:  Address Resolution Protocol enables the packaging of IP data into ethernet packages. It is the system and messaging protocol that is used to find the ethernet (hardware) address from a specific IP number
  • 15.  POP:  POP stands for Post Office Protocol. It is generally used to support a single client. There are several versions of POP but the POP 3 is the current standard.  POP is an application layer internet standard protocol.  POP does not allow search facility.  It is not suitable for accessing non mail data.
  • 16.  Some important benefits are;  They provide the path to increase the network connections  Enhance the speed of the connection,  Enhance the data transmission rate and provide easy working to the users
  • 17.  Computer Networks and Protocols have forever changed the way humans will work, play, and communicate.  New protocols and standards will emerge, new applications will be conceived, and our lives will be further changed and enhanced.