1. A PRESENTATION ON
C O M P U T E R APPLICATIONS
Topic – Internet Protocols
Guided By :-
Samiksha Thakur M a m
Submitted By :-
Javin Varma
Class – 10t h A7
Roll No. -
10728
3. -: I N T R O D U C T I O N :-
• A Protocol is a set of rules that needs to be followed.
• The full form of IP is Internet Protocol.
• A part of the protocol specifies where on the
envelope the delivery address needs to be written. If
the delivery address is written in the wrong place,
the letter cannot be delivered.
4. • IP allows you to address a package
and drop it in the system, but there
is no direct link between sender and
the recipient.
• Internet Protocols are set of rules
g overning communication within and
between computers on a network.
5. -: P U R P O S E & F U N C T I O N S
O F IP :-
• Identifying Errors
• Compressing The Data
• Deciding how the data is to be sent
• Addressing The Data
• Deciding how to announce sent and received
Data
6.
7. G E N E R AL LY U S E D INT E R N E T
P R O T O C O L S :-
• TCP/IP : The Transmission Control Protocol /Internet Protocol suite
protocol has become the dominant standard for internetworking. TCP/IP
represents a set of public standards that specify how packets of information
are exchanged between computers over one or more networks.
• IPX/SPX : Internetwork Packet Exchange / Sequenced Packet
Exchange is the protocol suite originally employed by Novell
Corporation’s network operating system, NetWare.
• N e t B E U I : N e t B I O S Extended User Interface is a protocol primarily
on small Windows N T networks.. N e t B E U I cannot be routed or used
by routers talk to each other in a large network.
8. • Apple Talk : AppleTalk is a protocol suite to
network Macintosh computers. It is designed to
run over Local Talk, which is the Apple L A N
physical topology.
• HTTP : Hyper Text Transfer Protocol governs how
files such as texts, graphics, sound and video are
exchanged on the World Wide Web (WWW).
• FTP : File Transfer Protocol provides services for
file transfer and manipulation. FTP allows
multiple simultaneous computers that lacks
9. • S S H : Secure Shell is used to securely connect to a
remote computer. The S S H protocol ensures
security shell using other protocols like S C P and
SFTP.
• Telnet : Telnet is a that facilitates remote login on
a computer system. It has now became an older
Internet utility.
• S C P : S C P is a Secure Copy Protocol which allows
you to transmit files from one machine to another
over Internet with the encryption benefits of S S H .
10. • I M A P : Internet Message Access Protocol is also
used to download E-mail from a remote mail server.
• S F T P : S F T P is a file transfer but is secure contrary
to the unsecure FTP. Secure File Transfer Protocol
(SFTP) is a secure protocol for file transfer and it
ensures security of data based on the Secure Shell
protocol.
• S M T P : Simple Mail Transfer Protocol is used to
send E-mail to a remote E-mail server.
11.
12. -: IP AD D R E S S IN G :-
• An IP Addressing is a that is used to identify a device
on the network.
• Each device on a network must have a unique IP
address to communicate with other network devices.
Network devices are devices that move data across
the network, including hubs, switches and routers.
• On a LAN, each host and network device must have an
IP address within the same network to be able to
communicate with each other.
13. • An IP address consists of a series of 32
binary bits (1s and 0s). It is very difficult for
humans to read binary IP address. For this
reason, the 32 bits are grouped into four 8-
bit bytes called OCTETS. An IP Address,
even in this grouped format, is hard for
humans to read, write, and remember.
15. -: C O N C LU S IO N S :-
• Without the Internet Protocols nothing can
work on the Internet.
• Internet Protocols must be updated on a
real-time. Internet Protocols suite is nothing
but a set of rules for communication.
• S uch rules are very necessary in nowadays
because of increasing numbers of computers
in Internet.
• It has been very helpful to all mankind.