SlideShare a Scribd company logo
How Circuit-Switched Digital Networks Work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is TCP/IP ? Protocol / Internet Protocol) are  one of most important protocol  for Internet Protocol Suite or it points at Internet Protocol Suite itself. The TCP/IP model consists of  it at four hierarchies.
How work circuit-switched services  ,[object Object],[object Object],[object Object]
Digital access equipment ,[object Object],[object Object]
Receiver  Apparatus ,[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Internal architecture of isp 54
Internal architecture of isp  54Internal architecture of isp  54
Internal architecture of isp 54myrajendra
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
Atika Zaimi
 
Dsl
DslDsl
Video Conferencing at INTEGRIS
Video Conferencing at INTEGRISVideo Conferencing at INTEGRIS
Video Conferencing at INTEGRISVideoguy
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
Er Aadarsh Srivastava
 
Presentation on DSL & ADSL
Presentation on DSL & ADSLPresentation on DSL & ADSL
Presentation on DSL & ADSL
rewa_monami
 
Last Mile Access Technologies
Last Mile Access TechnologiesLast Mile Access Technologies
Last Mile Access Technologies
Tharindu Kumara
 
Bluetooth and mobile ip
Bluetooth and mobile ipBluetooth and mobile ip
Bluetooth and mobile ip
seva for poor people
 
Bluetooth
BluetoothBluetooth
Bluetooth
Aniruddha Gupta
 
Broadcasting 3.0
Broadcasting 3.0Broadcasting 3.0
Telecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyTelecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyKristina Pesic
 
dsl (digital subscriber line)
dsl (digital subscriber line)dsl (digital subscriber line)
dsl (digital subscriber line)
waheed iqbal
 
Last Mile Access Telecommunications Telco
Last Mile Access Telecommunications TelcoLast Mile Access Telecommunications Telco
Last Mile Access Telecommunications Telco
Pedro Martinez
 

What's hot (19)

Dsl
DslDsl
Dsl
 
Internal architecture of isp 54
Internal architecture of isp  54Internal architecture of isp  54
Internal architecture of isp 54
 
Voip Ppt
Voip PptVoip Ppt
Voip Ppt
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
Dsl
DslDsl
Dsl
 
Video Conferencing at INTEGRIS
Video Conferencing at INTEGRISVideo Conferencing at INTEGRIS
Video Conferencing at INTEGRIS
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
Presentation on DSL & ADSL
Presentation on DSL & ADSLPresentation on DSL & ADSL
Presentation on DSL & ADSL
 
Last Mile Access Technologies
Last Mile Access TechnologiesLast Mile Access Technologies
Last Mile Access Technologies
 
Pabx
PabxPabx
Pabx
 
Bluetooth and mobile ip
Bluetooth and mobile ipBluetooth and mobile ip
Bluetooth and mobile ip
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Broadcasting 3.0
Broadcasting 3.0Broadcasting 3.0
Broadcasting 3.0
 
Wan technology
Wan technologyWan technology
Wan technology
 
Telecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyTelecommunication, internet and wireless technology
Telecommunication, internet and wireless technology
 
dsl (digital subscriber line)
dsl (digital subscriber line)dsl (digital subscriber line)
dsl (digital subscriber line)
 
Wi te-pp
Wi te-ppWi te-pp
Wi te-pp
 
Last Mile Access Telecommunications Telco
Last Mile Access Telecommunications TelcoLast Mile Access Telecommunications Telco
Last Mile Access Telecommunications Telco
 
Bluetooth - Overview
Bluetooth - OverviewBluetooth - Overview
Bluetooth - Overview
 

Viewers also liked

J-On-G-Egelijk !
J-On-G-Egelijk !J-On-G-Egelijk !
J-On-G-Egelijk !
guest455c1c7
 
AUAQUICK2000 PRESENTATIE
AUAQUICK2000 PRESENTATIEAUAQUICK2000 PRESENTATIE
AUAQUICK2000 PRESENTATIE
guestfb993475
 
My presentation
My presentationMy presentation
My presentationpiino
 
150 Mbps Receiver.Sevastopol, CriMiCo presentation
150 Mbps Receiver.Sevastopol, CriMiCo presentation150 Mbps Receiver.Sevastopol, CriMiCo presentation
150 Mbps Receiver.Sevastopol, CriMiCo presentationdcalex
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
Christina Hoh
 
Rihanna - Umbrella (Analysis Presentation)
Rihanna - Umbrella (Analysis Presentation)Rihanna - Umbrella (Analysis Presentation)
Rihanna - Umbrella (Analysis Presentation)SoniiaOx
 
Promotional Posters & DVD Covers
Promotional Posters & DVD CoversPromotional Posters & DVD Covers
Promotional Posters & DVD CoversSoniiaOx
 
Music Genres & Tribes
Music Genres & TribesMusic Genres & Tribes
Music Genres & TribesSoniiaOx
 
Music Magazine Photoshoot
Music Magazine PhotoshootMusic Magazine Photoshoot
Music Magazine PhotoshootSoniiaOx
 
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences. Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Marie_Estager
 
Conférence Availpro - Nouvelles tendances de distribution hôtelière
Conférence Availpro - Nouvelles tendances de distribution hôtelièreConférence Availpro - Nouvelles tendances de distribution hôtelière
Conférence Availpro - Nouvelles tendances de distribution hôtelière
Availpro
 
Les règles d'or pour réussir sur Twitter - Erwan le Nagard
Les règles d'or pour réussir sur Twitter  - Erwan le NagardLes règles d'or pour réussir sur Twitter  - Erwan le Nagard
Les règles d'or pour réussir sur Twitter - Erwan le NagardLACT
 

Viewers also liked (20)

Sde5
Sde5Sde5
Sde5
 
Week8
Week8Week8
Week8
 
J-On-G-Egelijk !
J-On-G-Egelijk !J-On-G-Egelijk !
J-On-G-Egelijk !
 
AUAQUICK2000 PRESENTATIE
AUAQUICK2000 PRESENTATIEAUAQUICK2000 PRESENTATIE
AUAQUICK2000 PRESENTATIE
 
My presentation
My presentationMy presentation
My presentation
 
Sde2
Sde2Sde2
Sde2
 
Sde1
Sde1Sde1
Sde1
 
150 Mbps Receiver.Sevastopol, CriMiCo presentation
150 Mbps Receiver.Sevastopol, CriMiCo presentation150 Mbps Receiver.Sevastopol, CriMiCo presentation
150 Mbps Receiver.Sevastopol, CriMiCo presentation
 
L
LL
L
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Week14
Week14Week14
Week14
 
Week9
Week9Week9
Week9
 
Rihanna - Umbrella (Analysis Presentation)
Rihanna - Umbrella (Analysis Presentation)Rihanna - Umbrella (Analysis Presentation)
Rihanna - Umbrella (Analysis Presentation)
 
Promotional Posters & DVD Covers
Promotional Posters & DVD CoversPromotional Posters & DVD Covers
Promotional Posters & DVD Covers
 
Music Genres & Tribes
Music Genres & TribesMusic Genres & Tribes
Music Genres & Tribes
 
Sde4
Sde4Sde4
Sde4
 
Music Magazine Photoshoot
Music Magazine PhotoshootMusic Magazine Photoshoot
Music Magazine Photoshoot
 
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences. Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
Réseaux Sociaux : Quand le marketing et la DSI partagent leurs expériences.
 
Conférence Availpro - Nouvelles tendances de distribution hôtelière
Conférence Availpro - Nouvelles tendances de distribution hôtelièreConférence Availpro - Nouvelles tendances de distribution hôtelière
Conférence Availpro - Nouvelles tendances de distribution hôtelière
 
Les règles d'or pour réussir sur Twitter - Erwan le Nagard
Les règles d'or pour réussir sur Twitter  - Erwan le NagardLes règles d'or pour réussir sur Twitter  - Erwan le Nagard
Les règles d'or pour réussir sur Twitter - Erwan le Nagard
 

Similar to Week11

C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdfC and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
anonaeon
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
ParikshitTaksande1
 
Overview of Internet.ppt
Overview of Internet.pptOverview of Internet.ppt
Overview of Internet.pptVideoguy
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
SANTIAGO PABLO ALBERTO
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
ROHIT JADHAV
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
1 introduction
1 introduction1 introduction
1 introductionJesusizdo
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Crouzet Automation - em4 Ethernet brochure, English Version
Crouzet Automation - em4 Ethernet brochure, English VersionCrouzet Automation - em4 Ethernet brochure, English Version
Crouzet Automation - em4 Ethernet brochure, English Version
Crouzet
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing TechnologyVideoguy
 
Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708
ceverson
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
Deevena Dayaal
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
Global Knowledge Training
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IPVideoguy
 
MWC 2010 Femtocell
MWC 2010 FemtocellMWC 2010 Femtocell
MWC 2010 Femtocell
Continuous Computing
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptxmashiur
 
Final project report
Final project reportFinal project report
Final project report
RaziaSultanaHimu
 
Md Minhajul Haq (072849556)
Md Minhajul Haq (072849556)Md Minhajul Haq (072849556)
Md Minhajul Haq (072849556)mashiur
 
protocol architecture
 protocol architecture protocol architecture
protocol architecture
Srinivasa Rao
 

Similar to Week11 (20)

C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdfC and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
 
TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
Overview of Internet.ppt
Overview of Internet.pptOverview of Internet.ppt
Overview of Internet.ppt
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
1 introduction
1 introduction1 introduction
1 introduction
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
Crouzet Automation - em4 Ethernet brochure, English Version
Crouzet Automation - em4 Ethernet brochure, English VersionCrouzet Automation - em4 Ethernet brochure, English Version
Crouzet Automation - em4 Ethernet brochure, English Version
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing Technology
 
Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
VOIP: VOICE OVER IP
VOIP: VOICE OVER IPVOIP: VOICE OVER IP
VOIP: VOICE OVER IP
 
MWC 2010 Femtocell
MWC 2010 FemtocellMWC 2010 Femtocell
MWC 2010 Femtocell
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
Final project report
Final project reportFinal project report
Final project report
 
Md Minhajul Haq (072849556)
Md Minhajul Haq (072849556)Md Minhajul Haq (072849556)
Md Minhajul Haq (072849556)
 
Chapter10
Chapter10Chapter10
Chapter10
 
protocol architecture
 protocol architecture protocol architecture
protocol architecture
 

More from s1170128 (20)

Week7
Week7Week7
Week7
 
Spr5
Spr5Spr5
Spr5
 
Pre4
Pre4Pre4
Pre4
 
Pre1
Pre1Pre1
Pre1
 
Cdd5
Cdd5Cdd5
Cdd5
 
Cdd4
Cdd4Cdd4
Cdd4
 
Sde4
Sde4Sde4
Sde4
 
Cdd3
Cdd3Cdd3
Cdd3
 
Cdd1
Cdd1Cdd1
Cdd1
 
Sde3
Sde3Sde3
Sde3
 
Sw3
Sw3Sw3
Sw3
 
Sw3
Sw3Sw3
Sw3
 
Sw3
Sw3Sw3
Sw3
 
Sw3
Sw3Sw3
Sw3
 
Sw3
Sw3Sw3
Sw3
 
Sw3-2
Sw3-2Sw3-2
Sw3-2
 
Sw3
Sw3Sw3
Sw3
 
Roy_week6_2
Roy_week6_2Roy_week6_2
Roy_week6_2
 
Roy_week
Roy_weekRoy_week
Roy_week
 
Week11
Week11Week11
Week11
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Week11

  • 1.
  • 2. What is TCP/IP ? Protocol / Internet Protocol) are one of most important protocol for Internet Protocol Suite or it points at Internet Protocol Suite itself. The TCP/IP model consists of it at four hierarchies.
  • 3.
  • 4.
  • 5.
  • 6.