SlideShare a Scribd company logo
Presented By: ManishHacker1
NETWORKING
Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI
model. It is a connectionless model, meaning there is no
information regarding transaction state, which is used to route
packets on a network. Additionally, there is no method in place to
ensure that a packet is properly delivered to the destination.
Your Browser and Server use TCP/IP
Browsers and servers use TCP/IP to connect to the Internet.
A browser uses TCP/IP to access a server. A server uses TCP/IP
to send HTML back to a browser.
Your E-Mail uses TCP/IP
Your e-mail program uses TCP/IP to connect to the Internet for
sending and receiving e-mails.
Your Internet Address is TCP/IP
Your Internet address "192.168.10.14" is a part of the standard
TCP/IP protocol (and so is your domain name).
What is TCP/IP?
TCP/IP is the communication protocol for communication
between computers on the Internet.
TCP/IP stands for Transmission Control Protocol / Internet
Protocol.
TCP/IP defines how electronic devices (like computers) should
be connected to the Internet, and how data should be transmitted
between them.
Inside TCP/IP
Inside the TCP/IP standard there are several protocols for
handling data communication:
TCP (Transmission Control Protocol) communication between
applications
UDP (User Datagram Protocol) simple communication
between applications
IP (Internet Protocol) communication between computers
ICMP (Internet Control Message Protocol) for errors and
statistics
IP is Connection-Less
IP is for communication between computers.
IP is a "connection-less" communication protocol.
IP does not occupy the communication line between two
computers. IP reduces the need for network lines. Each line can be
used for communication between many different computers at the
same time.
With IP, messages (or other data) are broken up into small
independent "packets" and sent between computers via the
Internet.
IP is responsible for "routing" each packet to the correct
destination.
TCP/IP
TCP/IP is TCP and IP working together.
TCP takes care of the communication between your application
software (i.e. your browser) and your network software.
IP takes care of the communication with other computers.
TCP is responsible for breaking data down into IP packets before
they are sent, and for assembling the packets when they arrive.
IP is responsible for sending the packets to the correct destination.
IP Addresses
Each computer must have an IP address before it can connect to
the Internet.
Each IP packet must have an address before it can be sent to
another computer.
IP address is the identity of computer or website.
Domain Names
A name is much easier to remember than a 12 digit number.
Names used for TCP/IP addresses are called domain names.
google.com is a domain name.
When you address a web site, like http://www.google.com, the
name is translated to a number by a Domain Name Server
(DNS).
All over the world, DNS servers are connected to the Internet.
DNS servers are responsible for translating domain names into
TCP/IP addresses.
When a new domain name is registered together with a TCP/IP
address, DNS servers all over the world are updated with this
information.
TCP - Transmission Control Protocol
TCP is used for transmission of data from an application to the
network.
TCP is responsible for breaking data down into IP packets before
they are sent, and for assembling the packets when they arrive.
IP - Internet Protocol
IP takes care of the communication with other computers.
IP is responsible for the sending and receiving data packets over
the Internet
HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server
and a web browser.
HTTP is used for sending requests from a web client (a browser)
to a web server, returning web content (web pages) from the
server back to the client.
HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server
and a web browser.
HTTPS typically handles credit card transactions and other
sensitive data.
SSL - Secure Sockets Layer
The SSL protocol is used for encryption of data for secure data
transmission.
SMTP - Simple Mail Transfer Protocol
SMTP is used for transmission of e-mails.
MIME - Multipurpose Internet Mail Extensions
The MIME protocol lets SMTP transmit multimedia files
including voice, audio, and binary data across TCP/IP networks.
IMAP - Internet Message Access Protocol
IMAP is used for storing and retrieving e-mails.
POP - Post Office Protocol
POP is used for downloading e-mails from an e-mail server to a
personal computer.
FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.
NTP - Network Time Protocol
NTP is used to synchronize the time (the clock) between
computers.
DHCP - Dynamic Host Configuration Protocol
DHCP is used for allocation of dynamic IP addresses to
computers in a network.
SNMP - Simple Network Management Protocol
SNMP is used for administration of computer networks.
LDAP - Lightweight Directory Access Protocol
LDAP is used for collecting information about users and e-mail
addresses from the internet.
ICMP - Internet Control Message Protocol
ICMP takes care of error-handling in the network.
ARP - Address Resolution Protocol
ARP is used by IP to find the hardware address of a computer
network card based on the IP address.
RARP - Reverse Address Resolution Protocol
RARP is used by IP to find the IP address based on the hardware
address of a computer network card.
BOOTP - Boot Protocol
BOOTP is used for booting (starting) computers from the
network.
PPTP - Point to Point Tunneling Protocol
PPTP is used for setting up a connection (tunnel) between private
networks.
Common ports:
Below is a list of some common ports and the respective services
running on the ports.
20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH
23 Telnet
25 SMTP (Simple Mail Transfer Protocol)
53 DNS (Domain Name Service)
68 DHCP (Dynamic host Configuration Protocol)
79 Finger
80 HTTP
110 POP3 (Post Office Protocol, version 3)
137 NetBIOS-ns
138 NetBIOS-dam
139 NetBIOS
143 IMAP (Internet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
389 LDAP
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
Your Email Program Does
Your email program uses different TCP/IP protocols:
It sends your emails using SMTP
It can download your emails from an email server using POP
It can connect to an email server using IMAP
THANK YOU

More Related Content

What's hot

Internet protocols
Internet protocolsInternet protocols
Internet protocols
thompsoncraig666
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
YonasBayu1
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
internet protocols
internet protocolsinternet protocols
internet protocols
CLIFFORD BRANDES
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
Bint Javed
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
Mohamed Daif
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Saikiran Panjala
 
TCP IP
TCP IPTCP IP
TCP IPhivasu
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
Saman M. Almufti
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Tech king news
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Frank Fang Kuo Yu
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol AnalysisKrishbathija
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
university of education,Lahore
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
Amol Gaikwad
 
Mcse question
Mcse questionMcse question

What's hot (20)

Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
TCP IP
TCP IPTCP IP
TCP IP
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Mcse question
Mcse questionMcse question
Mcse question
 
Chapter3
Chapter3Chapter3
Chapter3
 

Viewers also liked

The millennials updates 15.9.2014
The millennials updates   15.9.2014The millennials updates   15.9.2014
The millennials updates 15.9.2014
aiesechyderabad
 
Volcanoes on stage 07
Volcanoes on stage   07Volcanoes on stage   07
Volcanoes on stage 07ltanigawa
 
Signature magazine.22.08.2012
Signature  magazine.22.08.2012Signature  magazine.22.08.2012
Signature magazine.22.08.2012
Toastmaster
 
Basics of cloud and grid computing
Basics of cloud and grid computingBasics of cloud and grid computing
Basics of cloud and grid computing
Anup Nimje
 
Familo informacja 08_2012-1
Familo informacja 08_2012-1Familo informacja 08_2012-1
Familo informacja 08_2012-1Selwinka
 
BI session
BI sessionBI session
BI session
aiesechyderabad
 
Bit iit submission_form
Bit iit submission_formBit iit submission_form
Bit iit submission_formitsyousara
 
Culture driving Performance
Culture driving Performance Culture driving Performance
Culture driving Performance aiesechyderabad
 
Helping Students to construct Usable Knowledge
Helping Students to construct Usable KnowledgeHelping Students to construct Usable Knowledge
Helping Students to construct Usable KnowledgeElzhy Cabanillas
 
Bible study format test
Bible study format testBible study format test
Bible study format testDavid Miller
 
Six sigma
Six sigma Six sigma
Six sigma
nefhan
 
وحدة التكاثر في الانسان
وحدة التكاثر في الانسانوحدة التكاثر في الانسان
وحدة التكاثر في الانسانsms123321
 

Viewers also liked (20)

Yasuri
YasuriYasuri
Yasuri
 
The esprit updates
The esprit updatesThe esprit updates
The esprit updates
 
The millennials updates 15.9.2014
The millennials updates   15.9.2014The millennials updates   15.9.2014
The millennials updates 15.9.2014
 
Volcanoes on stage 07
Volcanoes on stage   07Volcanoes on stage   07
Volcanoes on stage 07
 
Signature magazine.22.08.2012
Signature  magazine.22.08.2012Signature  magazine.22.08.2012
Signature magazine.22.08.2012
 
Basics of cloud and grid computing
Basics of cloud and grid computingBasics of cloud and grid computing
Basics of cloud and grid computing
 
Familo informacja 08_2012-1
Familo informacja 08_2012-1Familo informacja 08_2012-1
Familo informacja 08_2012-1
 
BI session
BI sessionBI session
BI session
 
Palladium
PalladiumPalladium
Palladium
 
At in-on
At in-onAt in-on
At in-on
 
Assalamu’alaikum.pdf 2
Assalamu’alaikum.pdf 2Assalamu’alaikum.pdf 2
Assalamu’alaikum.pdf 2
 
Trajectory
TrajectoryTrajectory
Trajectory
 
Bit iit submission_form
Bit iit submission_formBit iit submission_form
Bit iit submission_form
 
Assessment4
Assessment4Assessment4
Assessment4
 
Culture driving Performance
Culture driving Performance Culture driving Performance
Culture driving Performance
 
Helping Students to construct Usable Knowledge
Helping Students to construct Usable KnowledgeHelping Students to construct Usable Knowledge
Helping Students to construct Usable Knowledge
 
Bible study format test
Bible study format testBible study format test
Bible study format test
 
Presentation1
Presentation1Presentation1
Presentation1
 
Six sigma
Six sigma Six sigma
Six sigma
 
وحدة التكاثر في الانسان
وحدة التكاثر في الانسانوحدة التكاثر في الانسان
وحدة التكاثر في الانسان
 

Similar to Networking:) Based on Ethical Hacking And Cyber Security

HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
AbenetAsmellash
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
anjanacottonmills
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
Raj Alam
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
Mohit Dhankher
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
Anushida1
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
maliksiddique1
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptxWEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
jwhuqyqtayaw
 

Similar to Networking:) Based on Ethical Hacking And Cyber Security (20)

Web tcp ip
Web tcp ipWeb tcp ip
Web tcp ip
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Ip
IpIp
Ip
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdfTCP - TCP breaks data into manageable packets and tracks information.pdf
TCP - TCP breaks data into manageable packets and tracks information.pdf
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Tcp protocols
Tcp protocolsTcp protocols
Tcp protocols
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptxWEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
WEB-SYSTEM-AND-TECHNOLOGIES-INTRODUCTION-1.pptx
 

Recently uploaded

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

Networking:) Based on Ethical Hacking And Cyber Security

  • 2. Internet Protocol (IP) : It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination. Your Browser and Server use TCP/IP Browsers and servers use TCP/IP to connect to the Internet. A browser uses TCP/IP to access a server. A server uses TCP/IP to send HTML back to a browser. Your E-Mail uses TCP/IP Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails. Your Internet Address is TCP/IP Your Internet address "192.168.10.14" is a part of the standard TCP/IP protocol (and so is your domain name).
  • 3. What is TCP/IP? TCP/IP is the communication protocol for communication between computers on the Internet. TCP/IP stands for Transmission Control Protocol / Internet Protocol. TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them. Inside TCP/IP Inside the TCP/IP standard there are several protocols for handling data communication: TCP (Transmission Control Protocol) communication between applications UDP (User Datagram Protocol) simple communication between applications IP (Internet Protocol) communication between computers ICMP (Internet Control Message Protocol) for errors and statistics
  • 4. IP is Connection-Less IP is for communication between computers. IP is a "connection-less" communication protocol. IP does not occupy the communication line between two computers. IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time. With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet. IP is responsible for "routing" each packet to the correct destination.
  • 5. TCP/IP TCP/IP is TCP and IP working together. TCP takes care of the communication between your application software (i.e. your browser) and your network software. IP takes care of the communication with other computers. TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive. IP is responsible for sending the packets to the correct destination.
  • 6. IP Addresses Each computer must have an IP address before it can connect to the Internet. Each IP packet must have an address before it can be sent to another computer. IP address is the identity of computer or website.
  • 7. Domain Names A name is much easier to remember than a 12 digit number. Names used for TCP/IP addresses are called domain names. google.com is a domain name. When you address a web site, like http://www.google.com, the name is translated to a number by a Domain Name Server (DNS). All over the world, DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses. When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information. TCP - Transmission Control Protocol TCP is used for transmission of data from an application to the network. TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.
  • 8. IP - Internet Protocol IP takes care of the communication with other computers. IP is responsible for the sending and receiving data packets over the Internet HTTP - Hyper Text Transfer Protocol HTTP takes care of the communication between a web server and a web browser. HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.
  • 9. HTTPS - Secure HTTP HTTPS takes care of secure communication between a web server and a web browser. HTTPS typically handles credit card transactions and other sensitive data. SSL - Secure Sockets Layer The SSL protocol is used for encryption of data for secure data transmission. SMTP - Simple Mail Transfer Protocol SMTP is used for transmission of e-mails. MIME - Multipurpose Internet Mail Extensions The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.
  • 10. IMAP - Internet Message Access Protocol IMAP is used for storing and retrieving e-mails. POP - Post Office Protocol POP is used for downloading e-mails from an e-mail server to a personal computer. FTP - File Transfer Protocol FTP takes care of transmission of files between computers. NTP - Network Time Protocol NTP is used to synchronize the time (the clock) between computers.
  • 11. DHCP - Dynamic Host Configuration Protocol DHCP is used for allocation of dynamic IP addresses to computers in a network. SNMP - Simple Network Management Protocol SNMP is used for administration of computer networks. LDAP - Lightweight Directory Access Protocol LDAP is used for collecting information about users and e-mail addresses from the internet. ICMP - Internet Control Message Protocol ICMP takes care of error-handling in the network.
  • 12. ARP - Address Resolution Protocol ARP is used by IP to find the hardware address of a computer network card based on the IP address. RARP - Reverse Address Resolution Protocol RARP is used by IP to find the IP address based on the hardware address of a computer network card. BOOTP - Boot Protocol BOOTP is used for booting (starting) computers from the network. PPTP - Point to Point Tunneling Protocol PPTP is used for setting up a connection (tunnel) between private networks.
  • 13. Common ports: Below is a list of some common ports and the respective services running on the ports. 20 FTP data (File Transfer Protocol) 21 FTP (File Transfer Protocol) 22 SSH 23 Telnet 25 SMTP (Simple Mail Transfer Protocol) 53 DNS (Domain Name Service) 68 DHCP (Dynamic host Configuration Protocol) 79 Finger 80 HTTP 110 POP3 (Post Office Protocol, version 3) 137 NetBIOS-ns 138 NetBIOS-dam 139 NetBIOS 143 IMAP (Internet Message Access Protocol) 161 SNMP (Simple Network Management Protocol) 194 IRC (Internet Relay Chat) 220 IMAP3 (Internet Message Access Protocol 3) 389 LDAP 443 SSL (Secure Socket Layer) 445 SMB (NetBIOS over TCP)
  • 14. Your Email Program Does Your email program uses different TCP/IP protocols: It sends your emails using SMTP It can download your emails from an email server using POP It can connect to an email server using IMAP