description of the services to the networks .
how to apply quality of service
how to improve the networks
summary in personal point of view
please don't hesitate if you have further question
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
ISO is an organization which is established in 1947.
AN ISO standard that covers all aspects of network communication.
Network communication model is defined in OSI.
It was first introduced in the late 1970s, 1983
OSI (open systems interconnection) ModelNetwax Lab
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and
standardizes the internal functions of a communication system by partitioning it into abstraction layers.
The OSI Model is a conceptual, seven-layered model of how networks work. It tells us that how data is
going through one computer to another computer, and also it simplifies to troubleshoot the network
issues.
description of the services to the networks .
how to apply quality of service
how to improve the networks
summary in personal point of view
please don't hesitate if you have further question
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
ISO is an organization which is established in 1947.
AN ISO standard that covers all aspects of network communication.
Network communication model is defined in OSI.
It was first introduced in the late 1970s, 1983
OSI (open systems interconnection) ModelNetwax Lab
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and
standardizes the internal functions of a communication system by partitioning it into abstraction layers.
The OSI Model is a conceptual, seven-layered model of how networks work. It tells us that how data is
going through one computer to another computer, and also it simplifies to troubleshoot the network
issues.
802.11r is the IEEE standard for fast roaming which is being aggresively implemented by WLAN vendors in their products.
The standard is quite involved, however, we have implemented and tested it extensively, and to help others, the presentation is a snapshot of our learning of the standard.
CCN notes for &th EC students, VTU, UNIT 1 Network MOdels explanation like OSI model ,TCP/IP model and tlepohone networks and cable network for data transmission
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol
Mature Packet Switching Protocols:ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and
Drawbacks
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol, Mature Packet Switching Protocols: ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and Drawbacks
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. OSI Model
Introduction
The Open Systems Interconnection (OSI) model is a
reference tool for understanding data communications
between any two networked systems.
Some Benefits of OSI Model
1.Less complex,More quality
2.Easier to learn and Develop
3.Multivendor interoperability
4.Standard interface
5.Troubleshooting.
4. Physical Layer
Purpose
Deals with the transmission of 0s and 1s over the physical media
Translation of bits into signals(Electrical,
Mechanical)
The Physical layer provides specifications for a variety of hardware:
• Cabling
• Connectors
• Network interface cards (NICs)
• Wireless radios
• Hubs
5. Ethernet
Ethernet is a family of technologies that provides datalink and physical specifications for controlling access to a
shared network medium.
Ethernet has several benefits over other LAN
technologies:
• Simple to install and manage
• Inexpensive
• Flexible and scalable
• Easy to interoperate between vendors
6. Cabling the LAN
Cabling is an integral part of building any network.
●
Cabling standards are a set of specifications for the installation
and testing of cables.
●
Standards specify types of cables to use in specific
environments, conductor materials, pin outs, wire sizes,
shielding, cable lengths, connector types and performance limits.
●
Media Characteristics:
Cable length
●
Ethernet Cabling Types
Coaxial
●
Fiber Optic
●
Cost
●
Ease of installation
●
Susceptibility to interference
●
Space
●
Category 5 unshielded twisted-pair
cable (Cat 5 UTP)
●
7. Twisted Pair Cable
●
Twisted pair cable is most
in network installations
commonly used
●
The TIA/EIA organization defines two different patterns, or
wiring schemes, called T568A and T568B.
●
Each wiring scheme defines the pin out, or order of wire
connections, on the end of the cable.
●
There are two types of twisted pair cable STP,UTP
●
(Cat 5 UTP) is mainly used in network installations.
8. Unshielded Twisted Pair (UTP)
Unshielded twisted-pair cable (UTP) is a four-pair wire medium
used in a variety of networks.
●
TIA/EIA-568-A contains specifications governing cable
performance.
●
RJ-45 connector
●
UTP Cable Types
Straight-Through
●
Crossover
●
Rollover
●
RJ-45 Connector
RJ-45 Connector
9. Straight-through Cable
A Straight-through cable is the most common cable type.
●
It maps a wire to the same pins on both ends of the cable.
●
Straight-through cables used for following connections,
Switch to router
●
Switch to PC or server
●
Hub to PC or server
●
10. Crossover Cable
A crossover cable uses both wiring schemes.
●
The wires on the cable are crossed over so that the receive
signal pins on the RJ-45 connector on one end are connected to
the transmit signal pins on the RJ-45 connector on the other end.
●
Crossover cables used for following connections,
Switch to switch
●
Switch to hub
●
Hub to hub
●
Router to router
●
PC to PC
●
Router to PC
●
11. Rollover Cable
Rollover cable (also known as Cisco console cable) is a type of
null-modem cable that is most commonly used to connect a
computer terminal to a router's console port.
●
Cisco routers and switches are normally configured over their
console ports.
●
The pin outs on one end are reversed from the other, as if the
wire had been rolled over and you were viewing it from the other
side.
●
Rollover cables used for following connections
Connect a terminal to a console port.
●
12. Wireless Network
802.11 standard specifies the operating parameters of
wireless local area networks (WLAN)
●
The 802.11 wireless networks operate in two basic modes:
1.Infrastructure mode
2.Ad-hoc mode
Infrastructure Mode
Infrastructure Mode
13. Wireless Network Security
Wired Equivalent Privacy (WEP): The original encryption protocol developed
for wireless networks.
WEP encryption is based on the RC4 stream cipher–operation
●
Wi-Fi Protected Access (WPA):Most current WPA implementations use a
preshared key (PSK), commonly referred to as WPA Personal, and the Temporal
Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption.
WPA Enterprise uses an authentication server to generate keys or certificates
●
Wi-Fi Protected Access version 2 (WPA2): Based on the 802.11i wireless
security standard.
The most significant enhancement to WPA2 over WPA is the use of the
Advanced Encryption Standard (AES) for encryption
●
14. WEP vs WPA vs WPA2
WEP WPA WPA2
ENCRYPTION
RC4
RC4
AES
KEY ROTATION
NONE
Dynamic
Session Keys
Dynamic
Session Keys
KEY
DISTRIBUTION
Manually typed
into each device
Automatic
distribution
available
Automatic
distribution
available
AUTHENTICATIO Uses WEP key as Can use 802.1x Can use 802.1x
Authentication
& EAP
& EAP
N
15. Data Link Layer
Switching-Providing MAC address
●
Framing-Send blocks of data (frames) between
physical devices
●
Dealing with transmission errors(Node-Node
Error Control)
●
Regulating data flow(Flow control)
●
It mainly uses the hardware device Switches.
●
16. Switches
Switches do following functions,
• Hardware address learning
• Intelligent forwarding of frames
• Loop avoidance
Switches support three methods of forwarding frames.
Store-and-Forward method
Cut-Through (Real Time) method
Fragment-Free (Modified Cut-Through) method
17. Spanning Tree Protocol(STP)
Switches (and bridges) needed a mechanism to prevent loops from forming.
Switches utilize the Spanning Tree Protocol (STP) to maintain a loop-free
environment.
STP Process
To maintain a loop-free environment, STP performs the following functions:
• A Root Bridge is elected
• Root Ports are identified
• Designated Ports are identified
• If a loop exists, a port is placed in Blocking state. If the loop is
removed the blocked port is activated again.
19. Point to Point protocol
PPP is a data-link layer protocol, PPP uses a stack of
other protocols to establish the link, to authenticate
the parties involved, and to carry the network layer
data.
Three sets of protocols are used by PPP:
●
Link control protocol
Authentication protocol
●
Network control protocol
●
20. Link Control Protocol (LCP)
It is responsible for establishing, maintaining, configuring, and
terminating links.
●
It also provides negotiation mechanisms to set options between
endpoints.
●
Both endpoints of the link must reach an agreement about the
options before the link can be established.
●
When PPP is carrying an LCP packet, it is either in the
establishing state or in the terminating state.
●
All LCP packets are carried in the data field of the PPP frame.
●
21. Authentication Protocols
Authentication plays a very important role in PPP
because PPP is designed for use over dial-up links
where verification of user identity is necessary.
●
Authentication means validating the identity of a
user who needs to access a set of resources.
●
PPP uses two protocols for authentication: Password
Authentication Protocol (PAP)
●
Challenge Handshake Authentication Protocol
(CHAP)
●
22. Password Authentication Protocol (PAP)
The user who wants to access a system sends an ID
(identification) and a password.
The system checks the validity of the identification and
password and either accepts or denies a connection.
23. Challenge Handshake Authentication Protocol (CHAP)
The CHAP protocol is a three-way handshaking
authentication protocol that provides greater security than
PAP.
In this method, the password is kept secret; it is never sent
on-line.
24. Network Control Protocol (NCP)
After the link is established and authentication (if
any) is successful, the connection goes on the
networking state.
●
NCP is a set of control protocols to allow the
encapsulation of data coming from network layer
protocols into the PPP frame.
●
The set of packets that establish and terminate a
network layer connection is called Internetwork
Protocol Control Protocol (IPCP).
●
26. Network Layer
Routing and Forwarding
●
Logical addressing
●
Transport packet from sending to receiving hosts
●
A logical address contains two components:
• Network ID – identifies which network a host belongs to.
• Host ID – uniquely identifies the host on that network.
Logical addressing protocols include
Internetwork Packet Exchange (IPX)
●
Internet Protocol (IP).
●
27. IPv4 address Classes
Class First
Octet Range
Default Subnet Mask
Class A
1 – 126
255.0.0.0
Class B
128 – 191
255.255.0.0
Class C
192 – 223
255.255.255.0
Class D
224 – 239
-
Class E
240 – 255
-
Ranges 127.x.x.x are reserved for the loopback or localhost.
●
127.0.0.1 is a comman Loopback address.
●
28. Routing And Forwarding
Routing algorithm determines
end-end-path through network
routing algorithm
Forwarding table determines
local forwarding at this router
local forwarding table
header value output link
0100
0101
0111
1001
3
2
2
1
value in arriving
packet’s header
0111
Routing-Determine
route taken by
packets from source
to destination
1
3 2
ForwardingMove packets from
router’s input to
appropriate router
output
29. Transport Layer
This layer is responsible for the reliable transfer of data, by ensuring that
data arrives at its destination error-free and in order.
It provides Port number to specifies the Application.
It is Host-to-Host layer.
Transport layer communication falls under two categories:
• Connection-oriented – requires that a connection with specific agreedupon parameters be established before data is sent.(TCP)
• Connectionless – requires no connection before data is sent.(UDP)
30. Some common Port numbers
Port Number
Transport Protocol
Application
20, 21
TCP
FTP
22
TCP
SSH
23
TCP
Telnet
25
TCP
SMTP
53
TCP/UDP
DNS
80
TCP
HTTP
110
TCP
POP3
443
TCP
SSL
666
TCP
Doom
31. Transmission Control Protocol(TCP)
Connection establishment – connections are established,
maintained, and ultimately terminated between devices.
●
Segmentation and sequencing – data is segmented into
smaller pieces for transport. Each segment is assigned a
sequence number, so that the receiving device can reassemble
the data on arrival.
●
Acknowledgments – receipt of data is confirmed through the
use of acknowledgments. If a segment is lost, data can be
retransmitted to guarantee delivery.
●
Flow control (or windowing) – data transfer rate is negotiated
to prevent congestion.
●
Connection Termination.
●
33. User Datagram Protocol(UDP)
The User Datagram Protocol (UDP) is a
connectionless,unreliable transport protocol.
●
UDP experiences less latency(High speed transmission)
●
It provides no three-way handshake, no flow-control, no
sequencing, and no acknowledgment of data receipt.
●
UDP essentially forwards the segment
●
UDP ideal for applications that require speed over
reliability. For example, DNS primarily uses UDP as its
transport protocol
●
34. Session Layer
The session layer is responsible for dialog
control and synchronization.
●
The session layer defines how to start, control and end
conversations (called sessions) between applications.
●
This includes starting, stopping, and re-synchronizing
communications between applications on two computers.
●
The session layer offers provisions for efficient data transfer.
●
Session layer Protocols,
Structured Query Language (SQL)
●
Remote Procedure Call (RPC)
●
Network File system(NFS)
●
35. Basic Functions for the Session Layer
Managing multiple sessions
A computer can establish multiple sessions with several other
computers
e.g., session 1: exchanging information over the World Wide Web with
www.yahoo.com
session 2: exchanging information over the World Wide Web with www.google.com
session 3: exchanging information over the World Wide Web with www.espn.com
Two computers can also establish multiple sessions,
e.g., function 1: exchanging information over the World Wide Web;
function 2: exchanging information over the FTP;
function 3: exchanging information over the email
37. Presentation Layer
The presentation layer is responsible for translation, compression,
and encryption.
This layer controls the formatting and syntax of user data for the
application layer.
This ensures that data from the sending application can be
understood by the receiving application.
Examples of Presentation layer formats include:
• Text - RTF, ASCII, EBCDIC
• Images - GIF, JPG, TIF
• Audio - MIDI, MP3, WAV
• Movies - MPEG, AVI, MOV
38. Presentation Layer Protocols
●This layer has two protocols for secure purpose of transmission
1.Transport layer Security Protocols(TLS)
●The primary goal of the TLS protocol is to provide privacy and
data integrity between two communicating applications”
●In practice, used to protect information transmitted between
browsers and Web servers
2.Secured Socket Layer protocols(SSL)
●SSL is an Internet security protocol used by Internet browsers
and Web servers to transmit sensitive information.
●Both protocols works on three features like Confidentiality,
integrity, and Availability.
40. Cryptography
Cryptography is the practice and study of hiding information.
It is the Art or Science of converting a plain intelligible data
into an unintelligible data and again retransforming that
message into its original form.
It provides Confidentiality, Integrity, Accuracy.
Encryption –The process of converting plain text into an
unintelligible format (cipher text) is called Encryption.
Decryption –The process of converting cipher text into a plain
text is called Decryption
41. Symmetric And Asymmetric Key Methods
Symmetric Key
Cryptography (Secret Key
Cryptography)
Asymmetric Key Cryptography
(Public Key Cryptography)
Same Key is used by both
parties
Users get the Key from an
Certificate Authority
Advantages
Advantages
Simpler and Faster
More Secured
Disadvantages
Authentication
Less Secured
2 different keys are used
Disadvantages
Relatively Complex
42. Application Layer
It mainly provides user interface
●
Everything at this layer is application-specific.
●
This layer provides application services for file transfers, email, and other network software services
●
This layer handles issues like network transparency,
resource allocation and problem partitioning.
●
43. Application Layer Protocols
DNS- Domain Name system
HTTP - Hyper Text Transfer Protocol
FTP - File Transfer Protocol
POP 3-Post Office Protocol
IMAP- Internet Message Access protocol
SMTP - Simple Mail Transfer Protocol
Telnet - Remote Access
44. Domain Name system(DNS)
DNS is a host name to IP address translation service.
●
DNS is a distributed database implemented in a hierarchy of
name servers.
●
An application level protocol for message exchange between
clients and servers.
●
Root DNS Servers
com DNS servers
yahoo.com
amazon.com
DNS servers DNS servers
org DNS servers
edu DNS servers
pbs.org
poly.edu
umass.edu
DNS servers
DNS serversDNS servers
46. Hyper Text Transfer Protocol(HTTP)
HTTP is the protocol that supports communication between
web browsers and web servers
●
It provides web services.
●
HTTP can support multiple request-reply exchanges over a
single TCP connection.
●
The “well known” TCP port
●
for HTTP servers is port 80.
47. File Transfer Protocol(FTP)
File Transfer Protocol (FTP) is the standard mechanism
provided by TCP/IP for copying a file from one host to
another.
FTP uses the services of TCP. It needs two TCP connections.
The well-known port 21 is used for the control connection
and the well-known port 20 for the data connection.
48. Electronics Mail(SMTP,POP3,IMAP)
SMTP-Uses TCP to reliably transfer email
●
message from client to server, port 25.
It is a push protocol; it pushes the message from the client to
the server.
●
POP- Protocol used to retrieve email from a mail server.
●
It stores and forwards messages
●
IMAP- Keep all messages in one place(The server).
●
Allows user to organize messages in folders.
●
50. Telnet
It is the standard TCP/IP protocol
●
Telnet allows a user to log into a computer across an internet.
●
Telnet establishes a TCP connection and then passes keystrokes
from the users keyboard directly to the remote computer .
●
Telnet offers three basic services .
1. It defines a network virtual terminal that provides a standard
interface to remote systems.
2. Telnet includes a mechanism that allows the client and server to
negotiate options .
3. Telnet treats both ends of the connection symmetrically.