SlideShare a Scribd company logo
The communication channel consists of the below procedure how the communication happens
between the web browser and web server
Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one
you're reading right now). A protocol is really nothing but a standard way of doing things. If you
were to meet the President of the United States, or the king of a country, there would be specific
procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There
would be a specific way to walk, to talk, a standard greeting, and a standard way to end the
conversation. Protocols in the TCP/IP stack serve the same purpose.
The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer
there are different protocols that are used to standardize the flow of information, and each one is
a computer program (running on your computer) that's used to format the information into a
packet as it's moving down the TCP/IP stack. A packet is a combination of the Application
Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network
Layer takes the packet and turns it into a frame).
The Application Layer
This consists of all applications that use the network to transfer data. It does not care about how
the data gets between two points and it knows very little about the status of the network.
Applications pass data to the next layer in the TCP/IP stack and then continue to perform other
functions until a reply is received. The Application Layer uses host names (like
www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text
Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic
mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a
few.
The main purpose of the Application Layer is to provide a common command language and
syntax between applications that are running on different operating systems -kind of like an
interpreter. The data that is sent by an application that uses the network is formatted to conform
to one of several set standards. The receiving computer can understand the data that is being sent
even if it is running a different operating system than the sender due to the standards that all
network applications conform to.
The Transport Layer
...is responsible for assigning source and destination port numbers to applications. Port numbers
are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers
from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public
(standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS
(udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from
256 to 1023 are assigned by the IANA to companies for the applications that they sell.
Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are
using to read this page, for example. Windows will only assign port numbers up to 5000 -more
than enough port numbers for a Windows based PC. Each application has a unique port number
assigned to it by the transport layer so that as data is received by the Transport Layer it knows
which application to give the data to. An example is when you have more than one browser
window running. Each window is a separate instance of the program that you use to surf the web,
and each one has a different port number assigned to it so you can go to www.dalantech.com in
one browser window and this site does not load into another browser window. Applications like
FireFox that use tabbed windows simply have a unique port number assigned to each tab
The Internet Layer
...is the "glue" that holds networking together. It permits the sending, receiving, and routing of
data.
The Network Layer
Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical
medium that is used to transmit and receive data. The Network Layer uses Media Access Control
(MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an
interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers
that allow you to clone the MAC address of the NIC in your PC.
we can still use communication channel cloud symbol for that communication that happens
through google.
Solution
The communication channel consists of the below procedure how the communication happens
between the web browser and web server
Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one
you're reading right now). A protocol is really nothing but a standard way of doing things. If you
were to meet the President of the United States, or the king of a country, there would be specific
procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There
would be a specific way to walk, to talk, a standard greeting, and a standard way to end the
conversation. Protocols in the TCP/IP stack serve the same purpose.
The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer
there are different protocols that are used to standardize the flow of information, and each one is
a computer program (running on your computer) that's used to format the information into a
packet as it's moving down the TCP/IP stack. A packet is a combination of the Application
Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network
Layer takes the packet and turns it into a frame).
The Application Layer
This consists of all applications that use the network to transfer data. It does not care about how
the data gets between two points and it knows very little about the status of the network.
Applications pass data to the next layer in the TCP/IP stack and then continue to perform other
functions until a reply is received. The Application Layer uses host names (like
www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text
Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic
mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a
few.
The main purpose of the Application Layer is to provide a common command language and
syntax between applications that are running on different operating systems -kind of like an
interpreter. The data that is sent by an application that uses the network is formatted to conform
to one of several set standards. The receiving computer can understand the data that is being sent
even if it is running a different operating system than the sender due to the standards that all
network applications conform to.
The Transport Layer
...is responsible for assigning source and destination port numbers to applications. Port numbers
are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers
from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public
(standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS
(udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from
256 to 1023 are assigned by the IANA to companies for the applications that they sell.
Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are
using to read this page, for example. Windows will only assign port numbers up to 5000 -more
than enough port numbers for a Windows based PC. Each application has a unique port number
assigned to it by the transport layer so that as data is received by the Transport Layer it knows
which application to give the data to. An example is when you have more than one browser
window running. Each window is a separate instance of the program that you use to surf the web,
and each one has a different port number assigned to it so you can go to www.dalantech.com in
one browser window and this site does not load into another browser window. Applications like
FireFox that use tabbed windows simply have a unique port number assigned to each tab
The Internet Layer
...is the "glue" that holds networking together. It permits the sending, receiving, and routing of
data.
The Network Layer
Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical
medium that is used to transmit and receive data. The Network Layer uses Media Access Control
(MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an
interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers
that allow you to clone the MAC address of the NIC in your PC.
we can still use communication channel cloud symbol for that communication that happens
through google.

More Related Content

Similar to The communication channel consists of the below procedure how the co.pdf

How Internet Works
How Internet WorksHow Internet Works
How Internet Works
sumit kumar
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
mraheel205
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
coastalgraphics
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
Saman M. Almufti
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Internet
InternetInternet
Internet
manochitra10
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
MarwaAnany1
 
How does internet works
How does internet worksHow does internet works
How does internet works
RamonNavarro46
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
Anil Neupane
 
Bt0076, tcpip
Bt0076, tcpipBt0076, tcpip
Bt0076, tcpip
smumbahelp
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
AliHamza410
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
 

Similar to The communication channel consists of the below procedure how the co.pdf (20)

How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Internet
InternetInternet
Internet
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Bt0076, tcpip
Bt0076, tcpipBt0076, tcpip
Bt0076, tcpip
 
Web tcp ip
Web tcp ipWeb tcp ip
Web tcp ip
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 

More from ajitdoll

This is a displacement reaction not precipitation.pdf
                     This is a displacement reaction not precipitation.pdf                     This is a displacement reaction not precipitation.pdf
This is a displacement reaction not precipitation.pdf
ajitdoll
 
Quality control the focus of quality control is on deliverables .pdf
    Quality control  the focus of quality control is on deliverables .pdf    Quality control  the focus of quality control is on deliverables .pdf
Quality control the focus of quality control is on deliverables .pdf
ajitdoll
 
We know that in general acids and bases are very .pdf
                     We know that in general acids and bases are very .pdf                     We know that in general acids and bases are very .pdf
We know that in general acids and bases are very .pdf
ajitdoll
 
where is data .pdf
                     where is data                                   .pdf                     where is data                                   .pdf
where is data .pdf
ajitdoll
 
The name of the given compound is 2-hydoxy propan.pdf
                     The name of the given compound is 2-hydoxy propan.pdf                     The name of the given compound is 2-hydoxy propan.pdf
The name of the given compound is 2-hydoxy propan.pdf
ajitdoll
 
Substitution Reactions of Benzene and Other Aroma.pdf
                     Substitution Reactions of Benzene and Other Aroma.pdf                     Substitution Reactions of Benzene and Other Aroma.pdf
Substitution Reactions of Benzene and Other Aroma.pdf
ajitdoll
 
sp2 Solu.pdf
                     sp2                                      Solu.pdf                     sp2                                      Solu.pdf
sp2 Solu.pdf
ajitdoll
 
Oxidised Al(s) Reduced Cu2+(aq) .pdf
                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf
Oxidised Al(s) Reduced Cu2+(aq) .pdf
ajitdoll
 
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
ajitdoll
 
Leu-Phen-Val-Met .pdf
                     Leu-Phen-Val-Met                                 .pdf                     Leu-Phen-Val-Met                                 .pdf
Leu-Phen-Val-Met .pdf
ajitdoll
 
I believe you do. I recall most reactants used i.pdf
                     I believe you do.  I recall most reactants used i.pdf                     I believe you do.  I recall most reactants used i.pdf
I believe you do. I recall most reactants used i.pdf
ajitdoll
 
hello When you add NaOH to benzoic acid a neutra.pdf
                     hello  When you add NaOH to benzoic acid a neutra.pdf                     hello  When you add NaOH to benzoic acid a neutra.pdf
hello When you add NaOH to benzoic acid a neutra.pdf
ajitdoll
 
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdfWhen a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
ajitdoll
 
When You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdfWhen You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdf
ajitdoll
 
conductivity = k. no of ions in solution NaI = N.pdf
                     conductivity = k. no of ions in solution  NaI = N.pdf                     conductivity = k. no of ions in solution  NaI = N.pdf
conductivity = k. no of ions in solution NaI = N.pdf
ajitdoll
 
treatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdftreatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdf
ajitdoll
 
The first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdfThe first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdf
ajitdoll
 
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdfThe apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
ajitdoll
 
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdfIt is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
ajitdoll
 
sorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdfsorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdf
ajitdoll
 

More from ajitdoll (20)

This is a displacement reaction not precipitation.pdf
                     This is a displacement reaction not precipitation.pdf                     This is a displacement reaction not precipitation.pdf
This is a displacement reaction not precipitation.pdf
 
Quality control the focus of quality control is on deliverables .pdf
    Quality control  the focus of quality control is on deliverables .pdf    Quality control  the focus of quality control is on deliverables .pdf
Quality control the focus of quality control is on deliverables .pdf
 
We know that in general acids and bases are very .pdf
                     We know that in general acids and bases are very .pdf                     We know that in general acids and bases are very .pdf
We know that in general acids and bases are very .pdf
 
where is data .pdf
                     where is data                                   .pdf                     where is data                                   .pdf
where is data .pdf
 
The name of the given compound is 2-hydoxy propan.pdf
                     The name of the given compound is 2-hydoxy propan.pdf                     The name of the given compound is 2-hydoxy propan.pdf
The name of the given compound is 2-hydoxy propan.pdf
 
Substitution Reactions of Benzene and Other Aroma.pdf
                     Substitution Reactions of Benzene and Other Aroma.pdf                     Substitution Reactions of Benzene and Other Aroma.pdf
Substitution Reactions of Benzene and Other Aroma.pdf
 
sp2 Solu.pdf
                     sp2                                      Solu.pdf                     sp2                                      Solu.pdf
sp2 Solu.pdf
 
Oxidised Al(s) Reduced Cu2+(aq) .pdf
                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf                     Oxidised  Al(s) Reduced  Cu2+(aq)              .pdf
Oxidised Al(s) Reduced Cu2+(aq) .pdf
 
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf                     let 1x = z So -1x^2 dx =dz  I =- int e^z dz = -.pdf
let 1x = z So -1x^2 dx =dz I =- int e^z dz = -.pdf
 
Leu-Phen-Val-Met .pdf
                     Leu-Phen-Val-Met                                 .pdf                     Leu-Phen-Val-Met                                 .pdf
Leu-Phen-Val-Met .pdf
 
I believe you do. I recall most reactants used i.pdf
                     I believe you do.  I recall most reactants used i.pdf                     I believe you do.  I recall most reactants used i.pdf
I believe you do. I recall most reactants used i.pdf
 
hello When you add NaOH to benzoic acid a neutra.pdf
                     hello  When you add NaOH to benzoic acid a neutra.pdf                     hello  When you add NaOH to benzoic acid a neutra.pdf
hello When you add NaOH to benzoic acid a neutra.pdf
 
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdfWhen a new species like methanofloresn stordalenmiresnsis is discove.pdf
When a new species like methanofloresn stordalenmiresnsis is discove.pdf
 
When You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdfWhen You connect a host to a switch, the host is capable only of hal.pdf
When You connect a host to a switch, the host is capable only of hal.pdf
 
conductivity = k. no of ions in solution NaI = N.pdf
                     conductivity = k. no of ions in solution  NaI = N.pdf                     conductivity = k. no of ions in solution  NaI = N.pdf
conductivity = k. no of ions in solution NaI = N.pdf
 
treatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdftreatment of childhood disorders is difficult because children hide .pdf
treatment of childhood disorders is difficult because children hide .pdf
 
The first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdfThe first trigonometric table was compiled by Hipparchus, who is now.pdf
The first trigonometric table was compiled by Hipparchus, who is now.pdf
 
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdfThe apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
The apparent mode of inheritance if Autosomal Dominant Inheritance .pdf
 
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdfIt is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
It is false sinceleft side should be mu(nd)SolutionIt is fa.pdf
 
sorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdfsorry , the figure is not given ion the question , so unable to solv.pdf
sorry , the figure is not given ion the question , so unable to solv.pdf
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

The communication channel consists of the below procedure how the co.pdf

  • 1. The communication channel consists of the below procedure how the communication happens between the web browser and web server Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one you're reading right now). A protocol is really nothing but a standard way of doing things. If you were to meet the President of the United States, or the king of a country, there would be specific procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There would be a specific way to walk, to talk, a standard greeting, and a standard way to end the conversation. Protocols in the TCP/IP stack serve the same purpose. The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer there are different protocols that are used to standardize the flow of information, and each one is a computer program (running on your computer) that's used to format the information into a packet as it's moving down the TCP/IP stack. A packet is a combination of the Application Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network Layer takes the packet and turns it into a frame). The Application Layer This consists of all applications that use the network to transfer data. It does not care about how the data gets between two points and it knows very little about the status of the network. Applications pass data to the next layer in the TCP/IP stack and then continue to perform other functions until a reply is received. The Application Layer uses host names (like www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a few. The main purpose of the Application Layer is to provide a common command language and syntax between applications that are running on different operating systems -kind of like an interpreter. The data that is sent by an application that uses the network is formatted to conform to one of several set standards. The receiving computer can understand the data that is being sent even if it is running a different operating system than the sender due to the standards that all network applications conform to. The Transport Layer ...is responsible for assigning source and destination port numbers to applications. Port numbers are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public (standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS (udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from
  • 2. 256 to 1023 are assigned by the IANA to companies for the applications that they sell. Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are using to read this page, for example. Windows will only assign port numbers up to 5000 -more than enough port numbers for a Windows based PC. Each application has a unique port number assigned to it by the transport layer so that as data is received by the Transport Layer it knows which application to give the data to. An example is when you have more than one browser window running. Each window is a separate instance of the program that you use to surf the web, and each one has a different port number assigned to it so you can go to www.dalantech.com in one browser window and this site does not load into another browser window. Applications like FireFox that use tabbed windows simply have a unique port number assigned to each tab The Internet Layer ...is the "glue" that holds networking together. It permits the sending, receiving, and routing of data. The Network Layer Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical medium that is used to transmit and receive data. The Network Layer uses Media Access Control (MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers that allow you to clone the MAC address of the NIC in your PC. we can still use communication channel cloud symbol for that communication that happens through google. Solution The communication channel consists of the below procedure how the communication happens between the web browser and web server Hyper Text Transfer Protocol (HTTP) is a protocol used for transferring web pages (like the one you're reading right now). A protocol is really nothing but a standard way of doing things. If you were to meet the President of the United States, or the king of a country, there would be specific procedures that you'd have to follow. You couldn't just walk up and say "hey dude". There would be a specific way to walk, to talk, a standard greeting, and a standard way to end the conversation. Protocols in the TCP/IP stack serve the same purpose. The TCP/IP stack has four layers: Application, Transport, Internet, and Network. At each layer there are different protocols that are used to standardize the flow of information, and each one is a computer program (running on your computer) that's used to format the information into a packet as it's moving down the TCP/IP stack. A packet is a combination of the Application
  • 3. Layer data, the Transport Layer header (TCP or UDP), and the IP layer header (the Network Layer takes the packet and turns it into a frame). The Application Layer This consists of all applications that use the network to transfer data. It does not care about how the data gets between two points and it knows very little about the status of the network. Applications pass data to the next layer in the TCP/IP stack and then continue to perform other functions until a reply is received. The Application Layer uses host names (like www.dalantech.com) for addressing. Examples of application layer protocols: Hyper Text Transfer Protocol (HTTP -web browsing), Simple Mail Transfer Protocol (SMTP -electronic mail), Domain Name Services (DNS -resolving a host name to an IP address), to name just a few. The main purpose of the Application Layer is to provide a common command language and syntax between applications that are running on different operating systems -kind of like an interpreter. The data that is sent by an application that uses the network is formatted to conform to one of several set standards. The receiving computer can understand the data that is being sent even if it is running a different operating system than the sender due to the standards that all network applications conform to. The Transport Layer ...is responsible for assigning source and destination port numbers to applications. Port numbers are used by the Transport Layer for addressing and they range from 1 to 65,535. Port numbers from 0 to 1023 are called "well known ports". The numbers below 256 are reserved for public (standard) services that run at the Application Layer. Here are a few: 25 for SMTP, 53 for DNS (udp for domain resolution and tcp for zone transfers) , and 80 for HTTP. The port numbers from 256 to 1023 are assigned by the IANA to companies for the applications that they sell. Port numbers from 1024 to 65,535 are used for client side applications -the web browser you are using to read this page, for example. Windows will only assign port numbers up to 5000 -more than enough port numbers for a Windows based PC. Each application has a unique port number assigned to it by the transport layer so that as data is received by the Transport Layer it knows which application to give the data to. An example is when you have more than one browser window running. Each window is a separate instance of the program that you use to surf the web, and each one has a different port number assigned to it so you can go to www.dalantech.com in one browser window and this site does not load into another browser window. Applications like FireFox that use tabbed windows simply have a unique port number assigned to each tab The Internet Layer ...is the "glue" that holds networking together. It permits the sending, receiving, and routing of data.
  • 4. The Network Layer Consists of your Network Interface Card (NIC) and the cable connected to it. It is the physical medium that is used to transmit and receive data. The Network Layer uses Media Access Control (MAC) addresses, discussed earlier, for addressing. The MAC address is fixed at the time an interface was manufactured and cannot be changed. There are a few exceptions, like DSL routers that allow you to clone the MAC address of the NIC in your PC. we can still use communication channel cloud symbol for that communication that happens through google.