SlideShare a Scribd company logo
A Presentation Report
On
““ NETWORKNETWORK
PROTOCOLS ”PROTOCOLS ”
Electronics & Communication
Year 2012-13.
Submitted By:
Shah Nautami
NetworkNetwork :-:-
A network is a set of devices (often referred to as
nodes) connected by communication links. A
node can be a computer, printer, or any other
device capable of sending and/or receiving data
generated by other nodes on the network.
What is network protocol ?What is network protocol ?
The network protocol is a set of
very detailed rules, sequences, message
formats, and procedures that
computer systems use and understand
when exchanging data with each
other.
Overview :-Overview :-
Reverse Address Resolution Protocol
(RARP)
Internet protocolInternet protocol
( IP )( IP )
IP :-IP :-
 Unreliable & connectionless datagram protocol –
best-effort delievery service.
 Must be paired with a reliable protocol such as
TCP.
Ex. Post office service.
 It transports data in packets called datagram. It
consisting of two parts : (1) Header & (2) Data.
 Header contains information essential to routing
& delievery.
Version
(4 bits)
HLEN
(4 bits)
Service
type
(8 bits)
Total length
(16 bits)
Identification (16 bits) Flags
(3 bits)
Fragmentatio
n offset
(13 bits)
Time to live
(8 bits)
Protocol
(8 bits)
Header checksum
(16 bits)
Source IP address
Destination IP address
Option
Header Data
Address Resolution protocol
( ARP )
ARP :-
• ARP associates an IP address with its physical address. On aARP associates an IP address with its physical address. On a
typical physical network, such as a LAN, each device on atypical physical network, such as a LAN, each device on a
link is identified by a physical or station address that islink is identified by a physical or station address that is
usually imprinted on the NIC.usually imprinted on the NIC.
• ARP is used to find the physical address of the node whenARP is used to find the physical address of the node when
its internet address is known.its internet address is known.
• Anytime a host , or a router , needs to find the physicalAnytime a host , or a router , needs to find the physical
address of another host on its now , it format an ARP queryaddress of another host on its now , it format an ARP query
packet that includes the ip address and broadcast it over thepacket that includes the ip address and broadcast it over the
n/w .n/w .
REQUEST
Fig . ARP Request
Fig . ARP Responce
Looking for any MAC add. :
A46EF45983AB
•ARP and RARP :-
• Four cases using ARP :-
Reverse Address Resolution
Protocol
(RARP)
RARPRARP :-
• RARP finds the logical address for aRARP finds the logical address for a
machine that only knows its physicalmachine that only knows its physical
address.address.
• The host wishing to retrieve its IPThe host wishing to retrieve its IP
address broadcasts an RARP queryaddress broadcasts an RARP query
packet that contains its physical addresspacket that contains its physical address
to every host on its physical network. ato every host on its physical network. a
server on the network recognizes theserver on the network recognizes the
RARP packet & returns the host ‘ s IPRARP packet & returns the host ‘ s IP
address .address .
WHY DO WE NEED RARP ?
 A host to have its IP address store in its hard
disk .
 Now what if the host is a dioskless computer .
 OR what if computer is being connect to the n/w
for a first time .
 OR what if you get new computer but you
decide to keep old NIC .
RARP operation :-RARP operation :-
ARP and RARP :-
 RARP works much like ARP.
 The Internet is based on IP addresses .
 Protocols may have different (MAC)
addresses .
 The ARP and RARP protocols perform
the translation between IP addresses
and MAC layer addresses .
Internet Group MessageInternet Group Message
protocolprotocol
( IGMP )( IGMP )
IGMP :-
 Internet Group Management Protocol (IGMP) is a
communications protocol used by hosts and
adjacent routers on IP networks to establish
multicast group membership .
 IGMP is an integral part of the IP multicast
specification. IGMP can be used for online
streaming video and gaming, and allows more
efficient use of resources when supporting these
types of applications .
 IGMP is used on IPv4 networks.
Fig . : IGMP operation
IGMP OPERATION :-IGMP OPERATION :-
Host Operations
– To receive multicast datagram , a host
must join a group . To join a group , the
host sends an IGMP membership report
packet through an attached interface .
IGMP OPERATION :-
 Multicast Router Operations
– Multicast routers listen to all multicast
addresses to detect
membership reports .
• 1. receiver (host) signals to join a group ,
• 2. creates an entry in the local group database .
• 3. To verify group membership , multicast routers
regularly send an IGMP
Query message .
Fig. : Query & Report message
Internet Control MessageInternet Control Message
ProtocolProtocol
(ICMP)(ICMP)
ICMP :-ICMP :-
 ICMP is used by host and routers to send
notification of datagram problems back to the
sender .
 ICMP used for just error detection it will not correct
that error .
 If a datagram travels from router to router untill
it reaches it one that can deliever it to its final
destination . If a router is unable to deliever the
datagram because of unsual conditions , ICMP
allows it to inform original source .
ICMP messages :-
 ICMP messages are divided into
error-reporting messages and query
messages.
 The error-reporting messages report
problems that a router or a host
(destination) may encounter.
 The query messages get specific
information from a router or another
host.
Table :Table : ICMPICMP messagesmessages
Destination-unreachable messages with
codes 3 can be created only by the
destination host .
Other destination-unreachable
messages can be created only by
routers.
Note:Note:
Example of error-reporting
message :-
target host is reachebaltarget host is reachebal
or not ?or not ?
An echo-request message can
be sent by a host or router.
An echo-reply message is
sent by the host or router
which receives an echo-
request message.
Note:Note:
Example of query message :-
Nnnnnn

More Related Content

What's hot

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
Peter R. Egli
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
ARP
ARPARP
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
Subhash Kumar Singh
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Rarp
RarpRarp
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
Sonal Chandel
 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
liiramlkprov
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
Pramith P
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
mithilak
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
NetProtocol Xpert
 
Ch21 network layer final
Ch21 network layer finalCh21 network layer final
Ch21 network layer final
Faraz Humayun
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
Matt Bynum
 

What's hot (20)

Arp
ArpArp
Arp
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
ARP
ARPARP
ARP
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Rarp
RarpRarp
Rarp
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
I pv4 vs ipv6
I pv4 vs ipv6I pv4 vs ipv6
I pv4 vs ipv6
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
IPv4 to IPv6
IPv4 to IPv6IPv4 to IPv6
IPv4 to IPv6
 
IP Routing
IP RoutingIP Routing
IP Routing
 
IPv4 vs IPv6
IPv4 vs IPv6IPv4 vs IPv6
IPv4 vs IPv6
 
Ch21 network layer final
Ch21 network layer finalCh21 network layer final
Ch21 network layer final
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 

Viewers also liked

Asp.net basic
Asp.net basicAsp.net basic
Asp.net basic
Neelesh Shukla
 
C# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENTC# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENT
Dr. Awase Khirni Syed
 
Data controls ppt
Data controls pptData controls ppt
Data controls pptIblesoft
 
ASP.NET Presentation
ASP.NET PresentationASP.NET Presentation
ASP.NET Presentation
dimuthu22
 
The ASP.NET Web API for Beginners
The ASP.NET Web API for BeginnersThe ASP.NET Web API for Beginners
The ASP.NET Web API for Beginners
Kevin Hazzard
 
data controls in asp.net
data controls in asp.netdata controls in asp.net
data controls in asp.netsubakrish
 
ASP.NET Web API
ASP.NET Web APIASP.NET Web API
ASP.NET Web APIhabib_786
 
ASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP FundamentalsASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP Fundamentals
Ido Flatow
 
Server Controls of ASP.Net
Server Controls of ASP.NetServer Controls of ASP.Net
Server Controls of ASP.Net
Hitesh Santani
 
Concepts of Asp.Net
Concepts of Asp.NetConcepts of Asp.Net
Concepts of Asp.Netvidyamittal
 
Asp.NET Validation controls
Asp.NET Validation controlsAsp.NET Validation controls
Asp.NET Validation controls
Guddu gupta
 
ASP.NET 10 - Data Controls
ASP.NET 10 - Data ControlsASP.NET 10 - Data Controls
ASP.NET 10 - Data Controls
Randy Connolly
 
ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1
Kumar S
 

Viewers also liked (18)

Asp.net basic
Asp.net basicAsp.net basic
Asp.net basic
 
C# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENTC# ASP.NET WEB API APPLICATION DEVELOPMENT
C# ASP.NET WEB API APPLICATION DEVELOPMENT
 
ASP.NET Web form
ASP.NET Web formASP.NET Web form
ASP.NET Web form
 
Ch 7 data binding
Ch 7 data bindingCh 7 data binding
Ch 7 data binding
 
Data controls ppt
Data controls pptData controls ppt
Data controls ppt
 
ASP.NET Presentation
ASP.NET PresentationASP.NET Presentation
ASP.NET Presentation
 
Asp.net
 Asp.net Asp.net
Asp.net
 
The ASP.NET Web API for Beginners
The ASP.NET Web API for BeginnersThe ASP.NET Web API for Beginners
The ASP.NET Web API for Beginners
 
data controls in asp.net
data controls in asp.netdata controls in asp.net
data controls in asp.net
 
ASP.NET Web API
ASP.NET Web APIASP.NET Web API
ASP.NET Web API
 
ASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP FundamentalsASP.NET Web API and HTTP Fundamentals
ASP.NET Web API and HTTP Fundamentals
 
Server Controls of ASP.Net
Server Controls of ASP.NetServer Controls of ASP.Net
Server Controls of ASP.Net
 
Concepts of Asp.Net
Concepts of Asp.NetConcepts of Asp.Net
Concepts of Asp.Net
 
Asp.NET Validation controls
Asp.NET Validation controlsAsp.NET Validation controls
Asp.NET Validation controls
 
ASP.NET 10 - Data Controls
ASP.NET 10 - Data ControlsASP.NET 10 - Data Controls
ASP.NET 10 - Data Controls
 
Web forms in ASP.net
Web forms in ASP.netWeb forms in ASP.net
Web forms in ASP.net
 
ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1ASP.NET Tutorial - Presentation 1
ASP.NET Tutorial - Presentation 1
 
Introduction to asp.net
Introduction to asp.netIntroduction to asp.net
Introduction to asp.net
 

Similar to Nnnnnn

Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
arun0501
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
IUBAT
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
DarshaniKarunarathne
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
MuhammadMoosaPanhwar
 
ICMPV4
ICMPV4ICMPV4
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
hamsa nandhini
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
AimanFatima200140
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Dhani Ahmad
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Network layer protocols.pptx
Network layer protocols.pptxNetwork layer protocols.pptx
Network layer protocols.pptx
MNSUAM
 
Arpwatch
ArpwatchArpwatch
Arpwatch
Santosh Shah
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
Sweta Kumari Barnwal
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
Mansi Kansara
 

Similar to Nnnnnn (20)

Web technology and commerce unit 1
Web technology and commerce unit 1Web technology and commerce unit 1
Web technology and commerce unit 1
 
Presentation on network_protocols
Presentation on network_protocolsPresentation on network_protocols
Presentation on network_protocols
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Transport Layer, Network layer.pptx
Transport Layer, Network layer.pptxTransport Layer, Network layer.pptx
Transport Layer, Network layer.pptx
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4ICMP-IGMP protocols of Network Layer for ipv4
ICMP-IGMP protocols of Network Layer for ipv4
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Network layer protocols.pptx
Network layer protocols.pptxNetwork layer protocols.pptx
Network layer protocols.pptx
 
Tcp
TcpTcp
Tcp
 
Arpwatch
ArpwatchArpwatch
Arpwatch
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
Unit05
Unit05Unit05
Unit05
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Nnnnnn

  • 1. A Presentation Report On ““ NETWORKNETWORK PROTOCOLS ”PROTOCOLS ” Electronics & Communication Year 2012-13. Submitted By: Shah Nautami
  • 2. NetworkNetwork :-:- A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network.
  • 3. What is network protocol ?What is network protocol ? The network protocol is a set of very detailed rules, sequences, message formats, and procedures that computer systems use and understand when exchanging data with each other.
  • 4. Overview :-Overview :- Reverse Address Resolution Protocol (RARP)
  • 6. IP :-IP :-  Unreliable & connectionless datagram protocol – best-effort delievery service.  Must be paired with a reliable protocol such as TCP. Ex. Post office service.  It transports data in packets called datagram. It consisting of two parts : (1) Header & (2) Data.  Header contains information essential to routing & delievery.
  • 7. Version (4 bits) HLEN (4 bits) Service type (8 bits) Total length (16 bits) Identification (16 bits) Flags (3 bits) Fragmentatio n offset (13 bits) Time to live (8 bits) Protocol (8 bits) Header checksum (16 bits) Source IP address Destination IP address Option Header Data
  • 9. ARP :- • ARP associates an IP address with its physical address. On aARP associates an IP address with its physical address. On a typical physical network, such as a LAN, each device on atypical physical network, such as a LAN, each device on a link is identified by a physical or station address that islink is identified by a physical or station address that is usually imprinted on the NIC.usually imprinted on the NIC. • ARP is used to find the physical address of the node whenARP is used to find the physical address of the node when its internet address is known.its internet address is known. • Anytime a host , or a router , needs to find the physicalAnytime a host , or a router , needs to find the physical address of another host on its now , it format an ARP queryaddress of another host on its now , it format an ARP query packet that includes the ip address and broadcast it over thepacket that includes the ip address and broadcast it over the n/w .n/w .
  • 10. REQUEST Fig . ARP Request
  • 11. Fig . ARP Responce Looking for any MAC add. : A46EF45983AB
  • 13. • Four cases using ARP :-
  • 15. RARPRARP :- • RARP finds the logical address for aRARP finds the logical address for a machine that only knows its physicalmachine that only knows its physical address.address. • The host wishing to retrieve its IPThe host wishing to retrieve its IP address broadcasts an RARP queryaddress broadcasts an RARP query packet that contains its physical addresspacket that contains its physical address to every host on its physical network. ato every host on its physical network. a server on the network recognizes theserver on the network recognizes the RARP packet & returns the host ‘ s IPRARP packet & returns the host ‘ s IP address .address .
  • 16. WHY DO WE NEED RARP ?  A host to have its IP address store in its hard disk .  Now what if the host is a dioskless computer .  OR what if computer is being connect to the n/w for a first time .  OR what if you get new computer but you decide to keep old NIC .
  • 17. RARP operation :-RARP operation :-
  • 18. ARP and RARP :-  RARP works much like ARP.  The Internet is based on IP addresses .  Protocols may have different (MAC) addresses .  The ARP and RARP protocols perform the translation between IP addresses and MAC layer addresses .
  • 19. Internet Group MessageInternet Group Message protocolprotocol ( IGMP )( IGMP )
  • 20. IGMP :-  Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group membership .  IGMP is an integral part of the IP multicast specification. IGMP can be used for online streaming video and gaming, and allows more efficient use of resources when supporting these types of applications .  IGMP is used on IPv4 networks.
  • 21. Fig . : IGMP operation
  • 22. IGMP OPERATION :-IGMP OPERATION :- Host Operations – To receive multicast datagram , a host must join a group . To join a group , the host sends an IGMP membership report packet through an attached interface .
  • 23. IGMP OPERATION :-  Multicast Router Operations – Multicast routers listen to all multicast addresses to detect membership reports . • 1. receiver (host) signals to join a group , • 2. creates an entry in the local group database . • 3. To verify group membership , multicast routers regularly send an IGMP Query message .
  • 24. Fig. : Query & Report message
  • 25. Internet Control MessageInternet Control Message ProtocolProtocol (ICMP)(ICMP)
  • 26. ICMP :-ICMP :-  ICMP is used by host and routers to send notification of datagram problems back to the sender .  ICMP used for just error detection it will not correct that error .  If a datagram travels from router to router untill it reaches it one that can deliever it to its final destination . If a router is unable to deliever the datagram because of unsual conditions , ICMP allows it to inform original source .
  • 27.
  • 28. ICMP messages :-  ICMP messages are divided into error-reporting messages and query messages.  The error-reporting messages report problems that a router or a host (destination) may encounter.  The query messages get specific information from a router or another host.
  • 29. Table :Table : ICMPICMP messagesmessages
  • 30. Destination-unreachable messages with codes 3 can be created only by the destination host . Other destination-unreachable messages can be created only by routers. Note:Note:
  • 31. Example of error-reporting message :- target host is reachebaltarget host is reachebal or not ?or not ?
  • 32. An echo-request message can be sent by a host or router. An echo-reply message is sent by the host or router which receives an echo- request message. Note:Note:
  • 33. Example of query message :-