- TCP and IP are core protocols of the Internet Protocol Suite, with TCP operating at the transport layer and providing reliable data transmission, and IP operating at the internet layer and routing packets between hosts.
- TCP establishes a virtual connection between hosts to send data reliably and in order using mechanisms like flow control, error checking, and acknowledgments.
- Common applications of TCP/IP include Telnet (port 23) for remote access, FTP (ports 20/21) for file transfer, and TFTP (port 69) for simple file transfer without authentication.
This presentation outlines the core functions of TCP - Transmission Control Protocol.
These comprise TCP Connection Control, TCP Flow Control, TCP Error Control, TCP Congestion Control, TCP Options and TCP Timers.
TCP/IP is the Internet core protocol that provides reliable, connection-oriented and stream-based communication service. Most of Internet traffic is carried in TCP connections, so scalability and reliability are crucial for a stable network on a global scale.
This presentation outlines the core functions of TCP - Transmission Control Protocol.
These comprise TCP Connection Control, TCP Flow Control, TCP Error Control, TCP Congestion Control, TCP Options and TCP Timers.
TCP/IP is the Internet core protocol that provides reliable, connection-oriented and stream-based communication service. Most of Internet traffic is carried in TCP connections, so scalability and reliability are crucial for a stable network on a global scale.
This presentation about Conjestion control will enrich your knowledge about this topic.and use this presentation for your reference this presentation with the Leaky bucket algorithm.
This presentation about Conjestion control will enrich your knowledge about this topic.and use this presentation for your reference this presentation with the Leaky bucket algorithm.
Transport layer is responsible for the overall end-to-end transfer of application data.
Because different applications have different requirements, there are multiple Transport layer protocols.
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
TCP and UDP headers.
Port Addressing, socket pair.
Types of port numbers: Well Known Ports (0 to 1023), Registered Ports (1024 to 49151) and Dynamic or Private ‘Ephemeral’ Ports (49152 to 65535).
Netstat command : examines the open connections on a host.
Transport Layer Functions.
TCP Connection Establishment (3-way handshake).
Connection Management - Flow Control through buffering, congestion avoidance, and windowing.
Flow Control – Reducing the window size .
TCP Connection Termination (4-way Handshake).
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Conflict is the outcome of behavioral interactions.
It consists of all kids of opposition or interactions.
It is interpersonal process.
It mainly arise from disagreements over goals or the methods to attain those goals.
Poor communication and personality differences also cause conflict.
Leaders spend about 20% of their time dealing with conflict.
Tutsmaster.org
Training methods in human resource managmentSatya P. Joshi
A large variety of methods of training are used in business.
Even within one organization different methods are used for training different people.
All the methods are divided into two classifications for:
On-the-job Training Methods
Off-the-Job Training Methods
For more visit tutsmaster.org
Selection tests in human resource managementSatya P. Joshi
Individuals differ in many respects including job-related abilities and skills.
In order to select a right person for the job, their abilities and skills need to be equally measured. That is done through selection tests.
A selection test is a device that uncovers the information about the candidate, which are not known through application blank.
They can measure certain abilities, aptitudes and skills that provide objective information how well the applicant can be expected to perform the job.
For more visit Tutsmaster.org
Interview and it’s types - human resource managmenetSatya P. Joshi
Basically an interview is a conversation between two people(the interviewer and the interviewee) where questions are asked by the interviewer to obtain information from interviewee.
Motivation, achievement theory, goal setting theorySatya P. Joshi
Motivation is derived from the Latin word MOVERE, which means “to move”.
Motivation is an inner state of our mind that activates, directs and sustain our behavior.
It is energetic force that derives people to behave in particular ways.
It is always internal to us and is externalized through behavior.
Motivation can be defined as the forces within the person that affect his or her direction, intensity, and persistence of voluntary behavior.
For more visit tutsmaster.org
Characteristics, objectives & challenges of human resource managerSatya P. Joshi
Organizations are human associations. Managing people is an important aspect of managing an organization.
Organization needs people and people needs organization. It is a people who staff, direct, control organization.
Human resource management is concerned with the people dimensions in organization. It Is an essential function of management.
For more visit www.tutsmaster.org
Human resource planning is the starting point of Human Resource Management. It is the essential part of acquisition function of HRM.
Human resource planning is the process of predetermining future human resource needs and choosing courses of actions needed to satisfy those needs.
It involves estimating the size and composition of future work force to ensure survival and growth of an organization it determines the specific number of jobs to be filled.
For more information visit www.tutsmaster.org
A subquery, also known as a nested query or subselect, is a SELECT query embedded within the WHERE or HAVING clause of another SQL query. The data returned by the subquery is used by the outer statement in the same way a literal value would be used. ... A subquery must return only one column.
For more information visit https://tutsmaster.org/
Technology and work design in Organizational RelationSatya P. Joshi
Technology and work design in Organizational Relation, Technology and work design in Organizational behavior, Technology and work design in Organizational Relation, Technology and work design in Organizational behavior,
Techniques of achieving google quality of serviceSatya P. Joshi
Techniques of achieving google quality of service in multimedia and communication, Techniques of achieving google quality of service, Techniques of achieving google quality of service,
Overview of digital communication in HSN and MultimediaSatya P. Joshi
Overview of digital communication in hsn, digital communication in multimedia and application, Overview of digital communication in high speeed networking, Overview of digital communication in hsn
Introduction to human resource management. human resource management,what is human resource management, Introduction to human resource management, how is important.
Security and control in Management Information SystemSatya P. Joshi
Security and control in Management Information System, software security, Security and control in Management Information System, malware, vulnerability, Security and control in Management Information System
Remote procedure call on client server computingSatya P. Joshi
Remote procedure call on client server computing, what is Remote procedure call on client server computing, Remote procedure call on java, Remote procedure call on client server computing
Physical and logical topologies in computer network and client server
Tcp ip presentation
1. Transport Layer Protocol:
Transmission Control Protocol
- Introduction to TCP
- Operation of TCP
- Characteristics of TCP
- TCP three-way handshake process
- Application of TCP
- Relationship between TCP and IP
- Standard TCP/IP services
- Port numbers and socket address
2. Introduction: Transport Layer Protocol
• The Transport layer is where sessions are established and data packets
are exchanged between hosts. Two core protocols are found at this
layer are, TCP, UDP
• A transport layer provides end-to-end or host-to-host communication
services.
• The transport layer provides services such as connection-oriented data
stream support, reliability, flow control, and multiplexing.
3. Introduction: TCP (Transmission Control Protocol)
• Second transport layer protocol, TCP.
• Connection oriented and reliable protocol.
• Creates virtual connection between two TCPs to send data.
• TCP uses flow control and error control mechanisms at the transport level.
• Heavy weight protocol, ensure that packet is delivered or not, if not TCP
resends that packet and packet must be delivered sequentially.
4. TCP Operations
• OPEN to open a connection
• CLOSE to close a connection
• SEND to send data to an open connection
• RECEIVE to receive data from an open connection
• STATUS to find information about a connection
5. TCP Message Format
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9
0 1 2 3
0 1
Source Port Destination Port
Sequence Number
Acknowledgement Number
Data
Offset
Reserved
U
R
G
A
C
K
P
S
H
R
S
T
S
Y
N
F
I
N
Window
Checksum Urgent Pointer
Options Padding
data
6. Source port: 16 bits The source port number
Destination port: 16 bits The destination port number
Sequence Number
(SEQ):
32 bits The sequence number of the first data octet in this segment (except when SYN is present) If
SYN is present the sequence number is the initial sequence number (ISN) and the first data
octet is ISN+1
Acknowledgement
Number (ACQ):
32 bits If the ACK control bit is set this field contains the value of the next sequence number the
sender of the segment is expecting to receive. Once a connection is established this is always
sent.
Data Offset: 4 bits The number of 32 bit words in the TCP header. This indicates where the data begins. The TCP
header (even one including options) is an integral number of 32 bits long.
Reserved: 6 bits Reserved for future use. Must be zero.
Control bits: 6 bits (from left to
right)
URG: Urgent Pointer field significant
ACK: Acknowledgement
PSH: Push function
RST: Reset the connection
SYN: Synchronize sequence numbers
FIN: No more data from sender
Window: 16 bits The number of data octets beginning with the one indicated in the acknowledgement field
which the sender of this segment is willing to accept.
Checksum: 16 bits Checksum field is calculated to verify the data correctness.
7. Characteristics of TCP
• Basic Data Transfer: Continuous transfer of octets in each direction
• Reliability: Must have to recover from data that is damaged, lost, duplicated or delivered or not.
• Flow Control: How much to send and how much to receive. (Acknowledgement)
• Multiplexing: Uses different ports and addresses to do simultaneously communication. (Many
Processes)
• Connection: Reliability and Flow Control mechanism requires TCPs initialize or connection status.
• Security: The users of TCP may indicate the security and precedence of their communication
8. TCP three-way handshake process
• It is usually a process that takes place when a computer is about to communicate
with a foreign device to establish rules for communication.
• To establish a connection, each device must send a SYN and receive an ACK for it
from the other device. Thus, conceptually, we need to have four control messages
pass between the devices. However, it's inefficient to send a SYN and an ACK in
separate messages when one could communicate both simultaneously. Thus, in the
normal sequence of events in connection establishment, one of the SYNs and one
of the ACKs is sent together by setting both of the relevant bits (a message
sometimes called a SYN+ACK). This makes a total of three messages, and for this
reason the connection procedure is called a three-way handshake.
9. • E.g. : SYN: The active open is performed by the client sending a SYN
to the server. The client sets the segment's sequence number to a
random value A.
• SYN-ACK: In response, the server replies with a SYN-ACK. The
acknowledgment number is set to one more than the received sequence
number i.e. A+1, and the sequence number that the server chooses for
the packet is another random number, B.
• ACK: Finally, the client sends an ACK back to the server. The
sequence number is set to the received acknowledgement value i.e.
A+1, and the acknowledgement number is set to one more than the
received sequence number i.e. B+1.
10. Host A sends a TCP SYNchronize packet to Host B
Host B receives A's SYN
Host B sends a SYNchronize-ACKnowledgement
Host A receives B's SYN-ACK
Host A sends ACKnowledge
Host B receives ACK.
TCP socket connection is ESTABLISHED
11. Applications of TCP
• Used to send large number of files.
• Used for traffic that you need all the data for. i.e. HTML,
pictures, etc.
• Reliable for use.
• In TCP the data will not be corrupted.
•
12. • TCP has a mechanism to control the errors.
• It is a connection oriented protocol, It establishes a path, or a virtual
connection all the way through switches routers proxies etc. and then
starts any communication.
• Used for security purposes.
E.g.: TCP is mailing a letter with a return receipt at the post office,
except that the post master will organize the letters in-order-of mailing
and only deliver them in-order.
13. Relationship between TCP and IP
• The Internet Protocol Suite (commonly known as TCP/IP) is the set
of communications protocols used for the Internet and other similar
networks.
• It is named from two of the most important protocols in it:
• the Transmission Control Protocol (TCP) and
• the Internet Protocol (IP), which were the first two networking
protocols defined in this standard.
14.
15. Transmission Control Protocol (TCP)
• Transmission Control Protocol (TCP) is the core protocol of the Internet
Protocol Suite.
• TCP provides the delivery of a stream of bytes from a program from
one computer to another computer.
• TCP provides reliable, ordered, and error-checked delivery of a stream of
octets between applications running on hosts communicating over an IP
network.
• TCP is the connection-oriented protocol.
16. Internet Protocol (IP)
• IP has the task of delivering packets from the source host to the
destination host solely based on the IP addresses in the packet headers.
• Internet Protocol is connectionless protocol.
17. Summary
• Both TCP and IP are the connection protocols from Internet Protocol Suite or
TCP/IP model.
• TCP is a core operating on a relatively high level; IP operates at a lower level.
• TCP is the protocol from Transport Layer whereas IP is the primary protocol in the
Internet Layer.
• TCP provides communication services at an intermediate level between an
application program and the IP; IP encapsulates all data, and is connectionless.
20. Telnet:
- Telnet is a user command and an underlying TCP/IP protocol for
accessing remote computers.
- The Telnet protocol enables terminals and terminal-oriented
processes to communicate on a network running TCP/IP.
- Telnet provides a user interface through which two hosts can
communicate on a character-by-character or line-by-line basis.
- 23 is the port number.
21. Anonymous / File Transfer Protocol (FTP)
- The File Transfer Protocol (FTP) is a standard network protocol used
to transfer computer files from one host to another host over a TCP-
based network, such as the Internet.
- Anonymous FTP is a common way to get access to a server in order
to view or download files that are publicly available.
- 20/21 is the port number.
22. Trivial File Transfer Protocol (TFTP)
• Trivial File Transfer Protocol (TFTP) is a simple, lock-step, File Transfer
Protocol which allows a client to get from or put a file onto a remote host.
• Trivial File Transfer Protocol (TFTP) is an Internet software utility for
transferring files that is simpler to use than the File Transfer Protocol (FTP)
but less capable.
• It is used where user authentication and directory visibility are not required.
• 69 is the port number.
23. Port Numbers
• A port number is a way to identify a specific process to which an
Internet or other network message is to be forwarded when it arrives at
a server.
• For the Transmission Control Protocol, a port number is a 16-bit
integer that is put in the header appended to a message unit.
24. Socket Address
• A socket address is the combination of an IP address and a port
number, much like one end of a telephone connection is the
combination of a phone number and a particular extension.
• Based on this address, internet sockets deliver incoming data packets
to the appropriate application process or thread.