The document discusses several network protocols used at different layers of the OSI model. It introduces NetBIOS/NetBEUI which provides name registration and connection-oriented/connectionless communication over LANs. TCP/IP is described as a layered protocol suite used widely on the internet, with IP, TCP, UDP operating at the network and transport layers. ARP and RARP are discussed as protocols that resolve logical to physical addresses. ICMP and IGMP are control protocols that provide error reporting and multicast group management. IPX/SPX is presented as an alternative to TCP/IP used in Novell networks. HDLC and SDLC are synchronous data link protocols used for communication over WAN links.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.
File transfer protocol
• FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Internet.
• Transferring files from a client computer to a server computer is called uploading and transferring from a server to a client is downloading.
• To access an FTP server, users must be able to connect to the Internet or an intranet (via a modem or local area network) with an FTP client program.
Slide Contains:
1. Introduction
2. Objectives of FTP
3. Mechanism of FTP
4. types of connections in FTP
5. FTP Clients
6. Advantages of FTP
7. Disadvantages of FTP
Extras: Animations & meme :)
It consists of switches & their structures.
Space Division Switch, Time Division switch, Time Space Time Division switch, Cross Bar Switch, Multistage switch, Banyan switch, Batcher BAnyan Switch etc.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.
File transfer protocol
• FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Internet.
• Transferring files from a client computer to a server computer is called uploading and transferring from a server to a client is downloading.
• To access an FTP server, users must be able to connect to the Internet or an intranet (via a modem or local area network) with an FTP client program.
Slide Contains:
1. Introduction
2. Objectives of FTP
3. Mechanism of FTP
4. types of connections in FTP
5. FTP Clients
6. Advantages of FTP
7. Disadvantages of FTP
Extras: Animations & meme :)
It consists of switches & their structures.
Space Division Switch, Time Division switch, Time Space Time Division switch, Cross Bar Switch, Multistage switch, Banyan switch, Batcher BAnyan Switch etc.
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2. Introducing Protocols
• Set of predefined rules used by devices in network for
data transfer
• Network Protocols:
– NetBIOS/NetBEUI
– TCP/IP
– ARP/RARP
– ICMP/IGMP
– UDP
– IPX/SPX
– HDLC/SDLC
3. NetBIOS/NetBEUI
• Developed by IBM and later adopted by Microsoft
• Network Basic Input/Output System (NetBIOS) used for
communication within LAN
• Operates at Transport and Session layers of OSI model
• NetBIOS Extended User Interface (NetBEUI) adds
capabilities to NetBIOS and an advanced version of
NetBIOS used in MS Windows OS
• Widely used in Ethernet, Token Ring and Windows NT
networks
4. NetBIOS Services
• Supports three distinct services: Name service for name
registration and resolution, Session service for connection
oriented communication and datagram service for
connectionless communication
NetBIOS
Services
Session Datagram
Name Service
Service Service
5. Name Service
• Implemented in Microsoft Windows as Windows
Internet Name Service (WINS).
• Provides means to application to register its NetBIOS
name
• NetBIOS names are 16 bytes length
• Service uses UDP port 137
• Name Service functions include
– Add Name
– Add Group Name
– Delete Name
– Find Name
6. Session Service
Establishes session for data exchange between computers using
TCP port 139
Session Establishment Process Session Termination Process
7. Datagram Service
• Uses the UDP port 138 and provides a
connectionless and broadcast-oriented data
communication between two devices.
• Divides data in datagrams before sending
• Datagram service functions include:
– Send Datagram
– Send Broadcast Datagram
– Receive Datagram
– Receive Broadcast Datagram
8. NetBIOS Name Resolution
• Used to map NetBIOS names to IP addresses
• Methods used to resolve names:
– NetBIOS Name Cache
– NetBIOS Name Server (NBNS)
– Local Broadcast
9. NetBEUI
• Enhanced version of NetBIOS
• Used by LAN manager, LAN server, Windows
for workgroups, Windows 95 and Windows NT
• Adapted to other protocols such as IPX or
TCP/IP as it does not support routing of
messages to other networks
10. TCP/IP
• Two layer communication protocol used by Internet
• TCP provides connection-oriented reliable transport
service
• Divides the message into smaller packets called
segments
• IP is a connectionless and unreliable datagram protocol
and provides no error checking
• IP transfers data in the form of packets called datagrams
11. TCP/IP Protocol Suite
• Designed before OSI
model
• Consists of five layers
• Provides independent
protocols at each
layer
12. Description of each layer - I
• Physical and Data link layer – standard and
proprietary protocols are supported by these
layers.
• Network layer – 1. IP –
– 2. ARP –
– 3. RARP –
– 4. ICMP – used to send query and error reporting
messages to the sender and not to correct them
– 5. IGMP – Uses class D IP address
13. Description of each layer - II
• Transport layer – 1. UDP –
– 2. TCP – divides data into segments each having a
sequence number
– 3. Stream Control Transmission Protocol (SCTP) –
multiple streams of data can be transmitted
simultaneously. Used over wireless network and
transmission of multimedia data. Supports voice
over IP and combines the best features of TCP and
UDP
14. Description of each layer - III
• Application layer – 1. SMTP –
– 2. FTP –
– 3. DNS –
– 4. SNMP – Based on client-server model
– NFS – Allows different Operating systems to share
files and disk storage
– TFTP – Uses UDP to upload or download files and
does not provide security features
17. IP Datagram Fragmentation
• Fragmentation refers to breaking datagrams into pieces
• Maximum Transfer Unit (MTU) is maximum amount of
data that frame can carry
• Datagram is fragmented when its size exceeds MTU of
the network
• Fragments follow different paths to reach destination
18. ARP/RARP
• To deliver packet both physical and logical addresses are
necessary
• Address Resolution Protocol (ARP) provides physical
address when logical address is known
• Reverse Address Resolution Protocol (RARP) maps logical
address to physical address
• RARP is useful when device is booted for first time
19. ICMP/IGMP
• Internet Control Message Protocol (ICMP) provides
error reporting and query management mechanism
• ICMP handles problems occurring while packet
transmission
• Internet Group Message Protocol (IGMP) manages
multicasting and group membership of devices
20. ICMP Message Types
ICMP Messages
Error Reporting Query
Destination Echo request
Unreachable and reply
Source Quench Timestamp request
and reply
Time Exceeded Address Mask
Request and reply
Parameter Problem Router Solicitation
and Advertisement
Redirection
21. Error Reporting Messages
• ICMP is used for error reporting not for error correcting
1. Destination Unreachable –
2. Source Quench – used for flow control at network
layer
3. Time Exceeded -
4. Parameter Problem – if there is an ambiguity in the
header part
5. Redirection – if the host forwards datagram destined
for some other network to wrong router
22. Query Messages
• Echo Request and Reply – Ping command
• Timestamp request and reply –
• Address Mask request and reply – If a host
knows the IP address but does not know the
corresponding mask
• Router Solicitation and Advertisement – Used
to determine whether the routers in the
network are working properly
23. IGMP Message Types
IGMP Messages
Membership
Query Leave Report
Report
General Query Special Query
24. UDP
• User Datagram Protocol (UDP) provides connectionless
process-to-process communication
• UDP packets are called user datagrams.
• User Datagram Format:
27. IPX/SPX
• Novell NetWare system uses IPX/SPX as communication
protocol within networks
• IPX operates at Network layer for connectionless
communication
• SPX operates at Transport layer for connection-oriented
communication
• Together, IPX/SPX provides same services as TCP/IP
29. IPX/SPX Naming Conventions
• IPX/SPX/NetBIOS Compatible Transport Protocol
(NWLink) uses two types of IPX network numbers for
routing purposes:
– Internal network number – Mentioned as Internal network
number in NWLink IPX/SPX/NetBIOS Compatible Transport
Protocol Properties dialog box
It’s a hexadecimal number with 1 to 8 digits (1 to
FFFFFFFE)
– External network number – Mentioned as Network
number in Manual Frame Detection dialog box
30. HDLC/SDLC
• DLC protocols are two types: asynchronous and
synchronous
• High Level Data Link Control (HDLC) and Synchronous
Data Link Control (SDLC) are bit-oriented synchronous
protocols in which data frames are interpreted as series
of bits
• Both are useful for half-duplex and full-duplex
communication
• HP adopted DLC protocol for use by network printers
• Windows XP still support DLC
31. HDLC Nodes and Link Configurations
• Types of HDLC nodes are:
– Primary Station – transmits frames called commands to
secondary stations
– Secondary Station – send response frames to primary
station
– Combined Station
• Supported link configurations:
– Unbalanced
– Balanced
32. HDLC Data Transfer Modes
• Normal Response Mode (NRM) – Secondary station
requires permission from primary station before sending
data
• Asynchronous Response Mode (ARM) – Secondary
station can transfer without permission from primary
station
• Asynchronous Balanced Mode (ABM) – Either of the
combined station can initiate the transmission
33. SDLC
• Bit-oriented protocol invented by IBM and similar to
HDLC
• Only primary and secondary stations are used
Configurations
Point-to-Point Multipoint Loop Hub go-ahead
34. Protocols at Different Layers
OSI Layers Protocols
Physical Layer No protocols defined
Data Link Layer HDLC, SDLC
Network Layer IP, ICMP, IGMP, ARP, RARP, IPX
Transport Layer NetBEUI, TCP, UDP, SPX
Session Layer NetBIOS, SAP, SMTP, FTP, DNS, SNMP,
Presentation Layer NCP, RIP, NLSP, SMTP, FTP, DNS,
SNMP, NFS
Application Layer SMTP, DNS, SNMP, NFS, TFTP