SlideShare a Scribd company logo
NETWORKING PROTOCOLS
BALAYOGI G
WHAT IS PROTOCOL?
 A Protocol is a set of rules and guidelines for communicating data.
 Rules are defined for each step and process during communication between two or more computers.
 Networks have to follow these rules to successfully transmit data.
TYPES OF PROTOCOLS
 Application layer protocols
 Transport layer protocols
 Internet layer protocols
 Link Layer protocols
APPLICATION LAYER PROTOCOLS
 Application layer is responsible for the user interaction between the network and the user.
 This layer is responsible fot,
 How you present the data to the user?
 To determine the resource availability
 Data translation and data encryption and compression
 Create, maintain, terminate the session for the transmission.
APPLICATION LAYER PROTOCOLS
 HTTP:
 Http is Hyper text transfer protocol. Which is used
to make communication between the web server
and clients.
 WWW is the combination of webservers and
clients.
 The communication between the web server and
the clients will be done with the help of HTTP
REQUEST and HTTP RESPONSE.
 Example for the HTTP protocols are, web
browsers.
APPLICATION LAYER PROTOCOLS
 FTP:
 FTP is File transfer protocol, which is used to transfer files
between the system to system with the help of TCP/IP
protocols.
 In this Protocol, end user will request for a file to local or
the FTP server. It will respond to that request.
 Example for the FTP protocol are Google drive, Drop box
and more.
APPLICATION LAYER PROTOCOLS
 DNS:
 DNS is Domain Name Server, used to resolve the human
readable form of URL(Uniform Resource locator) to the
numerical IP address.
 This Protocol is used by all the user and the network devices
when it needed to communicate with the website.
 This protocol works with the help of the query and response
method
 When ever we need to communicate with any website we
need DNS protocol.
APPLICATION LAYER PROTOCOLS
 DHCP:
 DHCP is Dynamic host configuration protocol, used to
configure many devices within a milliseconds.
 DHCP is mostly used in the enterprise networks which
contains many networking devices.
 DORA process is used in this protocol, D-Discover, O-
Offer, R-Request, and A- Acknowledgement.
APPLICATION LAYER PROTOCOLS
 IMAP:
 IMAP is Internet message access protocol, used to retrive
the email from the mail server to the mail clients(user).
 IMAP is designed to manage the email service for the
multiple clients(users).
 IMAP protocol worked with POP3 protocol in olden days for
email retrival.
 Example for IMAP protocols are Gmail, Yahoo Mail, Outlook
, Proton Mail.
APPLICATION LAYER PROTOCOLS
 SMTP:
 SMTP is Simple mail transfer protocol, used to send
and receive the mails from Mail server.
 SMTP are used in mostly by the proprietary systems
like Microsoft exchange , Webmail use SMTP for
sending emails.
 Example for SMTP are Gmail, Outlook, and more.
APPLICATION LAYER PROTOCOLS
 SNMP:
 SNMP is simple network management protocol, used to
manager the networking devices , networking device
status and more,
 SNMP protocol will collect the information about the
Network devices present in the devices, this information
includes behaviour change in the network devices.
 We can set alerts to identify the status of the networking
devices using SNMP protocol.
APPLICATION LAYER PROTOCOLS
 Telnet:
 Telnet is TELecommunication NETwork, used to connect
and communicate with the remote device.
 Telnet is one of the important protocol in the application
layer, with the help of this protocol we can able to
communicate with any networking device in the world
that are connected with the internet.
 Telnet is mostly used in all the foreign based companies,
we provide services to them by managing their
resources.
TRANSPORT LAYER PROTOCOLS
 TCP:
 TCP is transmission control protocol, used to establish
and manage the connection between the devices.
 TCP is a connection oriented protocol, provide the
services for the application layer to transmit data
completely to the other device.
 This protocol ensures the reliability of the transmission
in the network.
 This protocol establish connection before sending data
to the other device
 This protocol wait for the acknowledgement for the
transmitted data.
TRANSPORT LAYER PROTOCOLS
 UDP:
 UDP is User datagram protocol, used to establish and manage the connection between the devices.
 UDP is a connection-less protocol, provide the services for the application layer to transmit data completely to
the other device.
 This protocol doesn’t provide reliability like TCP, but this contains built in reliability.
 This protocol establish conncetion before sending data to the other device.
 This protocol doesn’t wait for acknowledgemet for the transmitted data.
THANK YOU
SOMEONE@EXAMPLE.COM

More Related Content

What's hot

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
irenazd
 

What's hot (20)

UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
 
TCP / IP Services and Standards
TCP / IP Services and StandardsTCP / IP Services and Standards
TCP / IP Services and Standards
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Remote method invocation (RMI)
Remote method invocation (RMI)Remote method invocation (RMI)
Remote method invocation (RMI)
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
TCP/IP Models
TCP/IP ModelsTCP/IP Models
TCP/IP Models
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
Unit 1
Unit 1Unit 1
Unit 1
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Client server-wps office
Client   server-wps officeClient   server-wps office
Client server-wps office
 

Similar to Networking protocols

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
TadeseBeyene
 

Similar to Networking protocols (20)

What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Mcse question
Mcse questionMcse question
Mcse question
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
Master Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertMaster Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to Expert
 
CN PPT
CN PPTCN PPT
CN PPT
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Networking protocols

  • 2. WHAT IS PROTOCOL?  A Protocol is a set of rules and guidelines for communicating data.  Rules are defined for each step and process during communication between two or more computers.  Networks have to follow these rules to successfully transmit data.
  • 3. TYPES OF PROTOCOLS  Application layer protocols  Transport layer protocols  Internet layer protocols  Link Layer protocols
  • 4. APPLICATION LAYER PROTOCOLS  Application layer is responsible for the user interaction between the network and the user.  This layer is responsible fot,  How you present the data to the user?  To determine the resource availability  Data translation and data encryption and compression  Create, maintain, terminate the session for the transmission.
  • 5. APPLICATION LAYER PROTOCOLS  HTTP:  Http is Hyper text transfer protocol. Which is used to make communication between the web server and clients.  WWW is the combination of webservers and clients.  The communication between the web server and the clients will be done with the help of HTTP REQUEST and HTTP RESPONSE.  Example for the HTTP protocols are, web browsers.
  • 6. APPLICATION LAYER PROTOCOLS  FTP:  FTP is File transfer protocol, which is used to transfer files between the system to system with the help of TCP/IP protocols.  In this Protocol, end user will request for a file to local or the FTP server. It will respond to that request.  Example for the FTP protocol are Google drive, Drop box and more.
  • 7. APPLICATION LAYER PROTOCOLS  DNS:  DNS is Domain Name Server, used to resolve the human readable form of URL(Uniform Resource locator) to the numerical IP address.  This Protocol is used by all the user and the network devices when it needed to communicate with the website.  This protocol works with the help of the query and response method  When ever we need to communicate with any website we need DNS protocol.
  • 8. APPLICATION LAYER PROTOCOLS  DHCP:  DHCP is Dynamic host configuration protocol, used to configure many devices within a milliseconds.  DHCP is mostly used in the enterprise networks which contains many networking devices.  DORA process is used in this protocol, D-Discover, O- Offer, R-Request, and A- Acknowledgement.
  • 9. APPLICATION LAYER PROTOCOLS  IMAP:  IMAP is Internet message access protocol, used to retrive the email from the mail server to the mail clients(user).  IMAP is designed to manage the email service for the multiple clients(users).  IMAP protocol worked with POP3 protocol in olden days for email retrival.  Example for IMAP protocols are Gmail, Yahoo Mail, Outlook , Proton Mail.
  • 10. APPLICATION LAYER PROTOCOLS  SMTP:  SMTP is Simple mail transfer protocol, used to send and receive the mails from Mail server.  SMTP are used in mostly by the proprietary systems like Microsoft exchange , Webmail use SMTP for sending emails.  Example for SMTP are Gmail, Outlook, and more.
  • 11. APPLICATION LAYER PROTOCOLS  SNMP:  SNMP is simple network management protocol, used to manager the networking devices , networking device status and more,  SNMP protocol will collect the information about the Network devices present in the devices, this information includes behaviour change in the network devices.  We can set alerts to identify the status of the networking devices using SNMP protocol.
  • 12. APPLICATION LAYER PROTOCOLS  Telnet:  Telnet is TELecommunication NETwork, used to connect and communicate with the remote device.  Telnet is one of the important protocol in the application layer, with the help of this protocol we can able to communicate with any networking device in the world that are connected with the internet.  Telnet is mostly used in all the foreign based companies, we provide services to them by managing their resources.
  • 13. TRANSPORT LAYER PROTOCOLS  TCP:  TCP is transmission control protocol, used to establish and manage the connection between the devices.  TCP is a connection oriented protocol, provide the services for the application layer to transmit data completely to the other device.  This protocol ensures the reliability of the transmission in the network.  This protocol establish connection before sending data to the other device  This protocol wait for the acknowledgement for the transmitted data.
  • 14. TRANSPORT LAYER PROTOCOLS  UDP:  UDP is User datagram protocol, used to establish and manage the connection between the devices.  UDP is a connection-less protocol, provide the services for the application layer to transmit data completely to the other device.  This protocol doesn’t provide reliability like TCP, but this contains built in reliability.  This protocol establish conncetion before sending data to the other device.  This protocol doesn’t wait for acknowledgemet for the transmitted data.