SlideShare a Scribd company logo
Common
networking
protocols I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– TCP and UDP.
– Common ports and protocols.
PACE-IT.
Page 4
Common networking protocols I.
Page 5
– TCP and UDP common factors.
» Transport layer or Layer 4 protocols.
• Responsible for the delivery of network data between nodes.
– Transmission Control Protocol (TCP).
» Reliable delivery method.
» Ensures that all packets are received.
» Uses acknowledgements as a means of error correction.
» Establishes flow control to reduce error rate and ensure proper
delivery.
– User Datagram Protocol (UDP).
» Best effort delivery method.
» Sends data, but doesn’t care if the packets are all received.
» No error correction.
» Speed and low network overhead is what concerns UDP.
Common networking protocols I.
Page 6
Common networking protocols I.
Page 7
– HTTP (Hypertext Transfer Protocol).
» The primary protocol used to transfer data over the Internet.
• Assigned to port 80.
– HTTPS (Hypertext Transfer Protocol
Secure).
» The primary protocol to securely transfer data over the Internet
using SSL (Secure Socket Layer) or TLS (Transport Layer
Security) technology. In actuality, SSL should no longer be
used.
• Assigned to port 443.
– NetBIOS (Network Basic Input/Output
System).
» Originally developed to allow hosts to be able to communicate
with servers.
• Assigned to ports 137-139.
Common networking protocols I.
Page 8
– SMTP (Simple Mail Transfer Protocol).
» The protocol used to transfer email from a client to an email
server; it is also used to transfer email between servers.
• Assigned to port 25.
– POP3 (Post Office Protocol v3).
» The protocol used by clients to retrieve email from servers.
Once engaged, POP3 downloads all messages from the
servers. The user cannot access email messages until they
have been downloaded.
• Assigned to port 110.
– IMAP (Internet Message Access Protocol).
» A protocol used by clients to access email on email servers.
Allows the client to administer and organize email on the server
into folders.
• Assigned to port 143.
Common networking protocols I.
Page 9
– SIP (Session Initiation Protocol)
» A protocol that is most commonly used to set up and tear down
multimedia communication sessions (e.g., a VoIP session uses
SIP to establish and terminate the session).
• Assigned to ports 5060 and 5061.
– RTP (Real-time Transport Protocol).
» The protocol that is commonly used to format and deliver
multimedia or streaming content (e.g., RTP handles the flow of
packets in a VoIP session after SIP has established the
connection).
• Assigned to ports 5004 and 5005.
Common networking protocols I.
Page 10
– MGCP (Media Gateway Control Protocol).
» A protocol that defines a means of communication between a
packet switched network and circuit switched network (e.g., the
PSTN). It can be used to set up, maintain, and terminate calls
between multiple endpoints (e.g., teleconferencing).
• Assigned to ports 2427 and 2727.
– H.323.
» A protocol that provides a standard for delivering video over IP
networks. It defines how real-time audio, video, and data are to
be transmitted. It provides signaling and bandwidth control.
• Assigned to port 1720.
Common networking protocols I.
Page 11
Common networking protocols I.
TCP uses reliable delivery methods, while UDP uses best effort delivery
methods. UDP has less overhead, but it also has no mechanism for error
correction.
Topic
TCP and UDP.
Summary
Common ports and protocols include: HTTP (80), HTTPS (443), NetBIOS
(137-139), SMTP (25), POP3 (110), IMAP (143), SIP (5060 and 5061), RTP
(5004 and 5005), MGCP (2427 and 2727), and H.323 (1720).
Common ports and protocols.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006 PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
Pace IT at Edmonds Community College
 
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006 PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006 PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006 PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006 PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006
Pace IT at Edmonds Community College
 
Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)
Pace IT at Edmonds Community College
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
Pace IT at Edmonds Community College
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Basic Network Connections
Pace IT - Basic Network ConnectionsPace IT - Basic Network Connections
Pace IT - Basic Network Connections
Pace IT at Edmonds Community College
 
PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Types of Networks
Pace IT - Types of NetworksPace IT - Types of Networks
Pace IT - Types of Networks
Pace IT at Edmonds Community College
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
Pace IT at Edmonds Community College
 

What's hot (20)

PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006 PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006
 
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006 PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006 PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
 
PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006 PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006
 
PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006 PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006
 
Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)Pace IT - Alternative Internet Connections (part 2)
Pace IT - Alternative Internet Connections (part 2)
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
Pace IT - Basic Network Connections
Pace IT - Basic Network ConnectionsPace IT - Basic Network Connections
Pace IT - Basic Network Connections
 
PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006PACE-IT: Virtualization Technology - N10 006
PACE-IT: Virtualization Technology - N10 006
 
Pace IT - Types of Networks
Pace IT - Types of NetworksPace IT - Types of Networks
Pace IT - Types of Networks
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 

Viewers also liked

PACE-IT: Rack and Power Management
PACE-IT: Rack and Power ManagementPACE-IT: Rack and Power Management
PACE-IT: Rack and Power Management
Pace IT at Edmonds Community College
 
PACE-IT: Basics of Change Management
PACE-IT: Basics of Change ManagementPACE-IT: Basics of Change Management
PACE-IT: Basics of Change Management
Pace IT at Edmonds Community College
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
Pace IT at Edmonds Community College
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
Pace IT at Edmonds Community College
 
PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)
Pace IT at Edmonds Community College
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
Pace IT at Edmonds Community College
 
PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)
Pace IT at Edmonds Community College
 
PACE-IT: Basic Network Concepts (part 2)
PACE-IT: Basic Network Concepts (part 2)PACE-IT: Basic Network Concepts (part 2)
PACE-IT: Basic Network Concepts (part 2)
Pace IT at Edmonds Community College
 
PACE-IT: The Transport Layer Plus ICMP
PACE-IT: The Transport Layer Plus ICMPPACE-IT: The Transport Layer Plus ICMP
PACE-IT: The Transport Layer Plus ICMP
Pace IT at Edmonds Community College
 
PACE-IT: Cable Management
PACE-IT: Cable ManagementPACE-IT: Cable Management
PACE-IT: Cable Management
Pace IT at Edmonds Community College
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
Pace IT at Edmonds Community College
 
PACE-IT: Introduction to Safety Practices (part 1)
PACE-IT: Introduction to Safety Practices (part 1)PACE-IT: Introduction to Safety Practices (part 1)
PACE-IT: Introduction to Safety Practices (part 1)
Pace IT at Edmonds Community College
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
Pace IT at Edmonds Community College
 

Viewers also liked (13)

PACE-IT: Rack and Power Management
PACE-IT: Rack and Power ManagementPACE-IT: Rack and Power Management
PACE-IT: Rack and Power Management
 
PACE-IT: Basics of Change Management
PACE-IT: Basics of Change ManagementPACE-IT: Basics of Change Management
PACE-IT: Basics of Change Management
 
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting MethodologyPACE-IT: Network Troubleshooting Methodology
PACE-IT: Network Troubleshooting Methodology
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
 
PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)
 
PACE-IT: Basic Network Concepts (part 2)
PACE-IT: Basic Network Concepts (part 2)PACE-IT: Basic Network Concepts (part 2)
PACE-IT: Basic Network Concepts (part 2)
 
PACE-IT: The Transport Layer Plus ICMP
PACE-IT: The Transport Layer Plus ICMPPACE-IT: The Transport Layer Plus ICMP
PACE-IT: The Transport Layer Plus ICMP
 
PACE-IT: Cable Management
PACE-IT: Cable ManagementPACE-IT: Cable Management
PACE-IT: Cable Management
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
 
PACE-IT: Introduction to Safety Practices (part 1)
PACE-IT: Introduction to Safety Practices (part 1)PACE-IT: Introduction to Safety Practices (part 1)
PACE-IT: Introduction to Safety Practices (part 1)
 
PACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related ConceptsPACE-IT: Risk and Security Related Concepts
PACE-IT: Risk and Security Related Concepts
 

Similar to PACE-IT: Common Networking Potocols (part 1)

PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)
Pace IT at Edmonds Community College
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
Pace IT at Edmonds Community College
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
Jim Kaplan CIA CFE
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
La3 Tcp Ip
La3 Tcp IpLa3 Tcp Ip
La3 Tcp Ip
Cma Mohd
 
CN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptxCN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptx
shamkevin
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Abiud Orina
 
client server protocol
client server protocolclient server protocol
client server protocol
bmuhire
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
Abdelkhalik Mosa
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
NguyenLe340487
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
Sarah R. Dowlath
 
Computer Network and commpunitcation 1.pptx
Computer Network  and commpunitcation 1.pptxComputer Network  and commpunitcation 1.pptx
Computer Network and commpunitcation 1.pptx
lamobokro
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
Irsandi Hasan
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
Muhammad Tahir Mehmood
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
university of education,Lahore
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
Kongu Engineering College, Perundurai, Erode
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
argost1003
 
Transport layer
Transport layerTransport layer
Transport layer
SreeRamTech
 

Similar to PACE-IT: Common Networking Potocols (part 1) (20)

PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)
 
Pace IT - Common Ports and Protocols
Pace IT - Common Ports and ProtocolsPace IT - Common Ports and Protocols
Pace IT - Common Ports and Protocols
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
La3 Tcp Ip
La3 Tcp IpLa3 Tcp Ip
La3 Tcp Ip
 
CN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptxCN Unit 4 - cs8591.pptx
CN Unit 4 - cs8591.pptx
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Computer Network and commpunitcation 1.pptx
Computer Network  and commpunitcation 1.pptxComputer Network  and commpunitcation 1.pptx
Computer Network and commpunitcation 1.pptx
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 

Recently uploaded (20)

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 

PACE-IT: Common Networking Potocols (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – TCP and UDP. – Common ports and protocols. PACE-IT.
  • 5. Page 5 – TCP and UDP common factors. » Transport layer or Layer 4 protocols. • Responsible for the delivery of network data between nodes. – Transmission Control Protocol (TCP). » Reliable delivery method. » Ensures that all packets are received. » Uses acknowledgements as a means of error correction. » Establishes flow control to reduce error rate and ensure proper delivery. – User Datagram Protocol (UDP). » Best effort delivery method. » Sends data, but doesn’t care if the packets are all received. » No error correction. » Speed and low network overhead is what concerns UDP. Common networking protocols I.
  • 7. Page 7 – HTTP (Hypertext Transfer Protocol). » The primary protocol used to transfer data over the Internet. • Assigned to port 80. – HTTPS (Hypertext Transfer Protocol Secure). » The primary protocol to securely transfer data over the Internet using SSL (Secure Socket Layer) or TLS (Transport Layer Security) technology. In actuality, SSL should no longer be used. • Assigned to port 443. – NetBIOS (Network Basic Input/Output System). » Originally developed to allow hosts to be able to communicate with servers. • Assigned to ports 137-139. Common networking protocols I.
  • 8. Page 8 – SMTP (Simple Mail Transfer Protocol). » The protocol used to transfer email from a client to an email server; it is also used to transfer email between servers. • Assigned to port 25. – POP3 (Post Office Protocol v3). » The protocol used by clients to retrieve email from servers. Once engaged, POP3 downloads all messages from the servers. The user cannot access email messages until they have been downloaded. • Assigned to port 110. – IMAP (Internet Message Access Protocol). » A protocol used by clients to access email on email servers. Allows the client to administer and organize email on the server into folders. • Assigned to port 143. Common networking protocols I.
  • 9. Page 9 – SIP (Session Initiation Protocol) » A protocol that is most commonly used to set up and tear down multimedia communication sessions (e.g., a VoIP session uses SIP to establish and terminate the session). • Assigned to ports 5060 and 5061. – RTP (Real-time Transport Protocol). » The protocol that is commonly used to format and deliver multimedia or streaming content (e.g., RTP handles the flow of packets in a VoIP session after SIP has established the connection). • Assigned to ports 5004 and 5005. Common networking protocols I.
  • 10. Page 10 – MGCP (Media Gateway Control Protocol). » A protocol that defines a means of communication between a packet switched network and circuit switched network (e.g., the PSTN). It can be used to set up, maintain, and terminate calls between multiple endpoints (e.g., teleconferencing). • Assigned to ports 2427 and 2727. – H.323. » A protocol that provides a standard for delivering video over IP networks. It defines how real-time audio, video, and data are to be transmitted. It provides signaling and bandwidth control. • Assigned to port 1720. Common networking protocols I.
  • 11. Page 11 Common networking protocols I. TCP uses reliable delivery methods, while UDP uses best effort delivery methods. UDP has less overhead, but it also has no mechanism for error correction. Topic TCP and UDP. Summary Common ports and protocols include: HTTP (80), HTTPS (443), NetBIOS (137-139), SMTP (25), POP3 (110), IMAP (143), SIP (5060 and 5061), RTP (5004 and 5005), MGCP (2427 and 2727), and H.323 (1720). Common ports and protocols.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.