SlideShare a Scribd company logo
Visit our YouTube Channel “Easy Learning 247’’
BY NITASHA CHATURVEDI
EASY LEARNING 247
Network Protocols
TCP/IP (Transmission Control Protocol/Internet Protocol)- also referred to as the Internet Protocol Suite, is the
World Wide Web's core communication system which enables every Internet-based device to communicate
with every other such devices simultaneously.
An IP address is the unique numerical address of a device in a computer network that uses Internet Protocol
for communication. The IP address allow you to pinpoint a particular device from the billions of devices on
the Internet.
Static IP Addresses-usually never change but they may be changed as a result of network administration.
Dynamic IP Addresses-These IP addresses are temporary and assigned to a computer when they get connected
to the Internet each time
Two most used ip versions are ipv4 and ipv6. IPv4 is a 32-Bit IP Address. IPv6 is 128 Bit IP Address. IPv4 is a
numeric address, and its binary bits are separated by a dot (.) IPv6 is an alphanumeric address whose binary
bits are separated by a colon (:)
Network Protocols
IPv4 ADDRESS CLASS -
Of the five address classes, three—Class A, B, and C—were designated for unicast single source–to–single destination
communication. Addresses in Class D were reserved for IP Multicast applications, which allows one-to-many communication.
Class E addresses were reserved for experimental purposes.
Network Protocols
How TCP/IP WORKS -worksTCP/IP is a two-layered program: the higher layer (TCP) disassembles message
content into small "data packets" that are then transmitted over the Internet to be re-assembled by the
receiving computer's TCP back into the message's original form.
TCP/IP and Higher-Level Applications - Many higher-level apps that
ecommerce businesses need to be familiar with utilize and/or are built on
TCP/IP.
• FTP (the Internet's File Transfer Protocol)
• HTTP (the Internet's Hyper-text Transfer Protocol)
• Telnet, which enables logging on computers from remote locations
• SMTP (Simple Mail Transfer Protocol)
FTP – FTP, or File Transfer Protocol, is one of the standard internet protocols used to transfer data files between a
client(FTP client) and a server(FTP server) over a computer network. It was developed in the early 1970s by
Abhay Bhushan (alumni IIT Kanpur),while he was a student at MIT. FTP was initially created to allow for the
secure transfer of files between servers and host computers over the ARPANET Network Control Program (a
precursor to the modern internet).Nowadays it is being used for uploading files on webserver after non
anonymous ftp(means username and password available with you).downloading is possible as anonymous
ftp(no password is required).FTP is available in two mode – text mode ftp(where user have to give commands in
text form) and GUI ftp(graphical interaction is possible).
Some of the more popular, andreliable, FTP
Clients currently operating in the
industry are FileZilla,WinSCP,Cyberduck,gFTP
Point-to-Point Protocol (PPP) is an open standard protocol that is mostly used
to provide connections over point-to-point serial links. The main purpose of PPP
is to transport Layer 3 packets over a Data Link layer point-to-point link
HTTP - HTTP stands for hypertext transfer protocol and is used to transfer data across the Web. It allow
users of the World Wide Web to exchange information found on web pages. When accessing any web page
entering http:// in front of the address tells the browser to communicate over HTTP.
How It Works-
It is a connectionless text based protocol. Clients (web browsers) send requests through request object of
http to web servers for web pages / images etc.Web server respond accordingly through response object
of http After this cycle(request – response), the connection between client and server across the Internet is
disconnected. A new connection must be made for each request(means for each web page).
This diagram shows the working of http protocol. Working with
dns server and working with web Server both.
HTTPS(Hyper text transfer protocol secure) - helps prevent intruders from tampering with the communications
between your websites and your users' browsers. It scramble the messages using that "code" so that no
one in between can read the message. It keeps our information safe from hackers.
Https uses the "code" on a Secure Sockets Layer (SSL), sometimes called Transport Layer Security (TLS)
to send the information back and forth.
Essentially, we need three things to encrypt data:
• The data to be sent/encrypted
• A unique encryption key
• An encryption algorithm (a math function that garbles the data)
asymmetric encryption is used in https. Asymmetric means we are using two different keys, one to encrypt
and one to decrypt.
This encryption is now done at TLS rather than SSL.
Remote login – A remote login facility permits a user who is using one computer to login to remote
computer or interact with a program on another computer. Command given at remote location
is processed by server and result displayed over remote location.
Telnet – Telnet is most popular protocol for accessing remote site/server. Using telnet client software on our
computer, we can make a connection to a telnet server (that is, the remote host). Once our telnet client establishes
a connection to the remote host, our client becomes a virtual terminal, allowing us to communicate with the remote
host from our computer. In most cases, we need to log into the remote host, which requires that we have an account
on that system. Occasionally, we can log in as guest or public without having an account.Generally it is
used in unix based client server system to interact.
Email Protocols
Email –Electronic mail is a facility that allows users to transmit messages across the
internet in fast and secure manner.
Email created using email client program->on press of send button ,it is delivered to sender’s mail server through
SMTP(Simple mail transfer protocol)->which further transmit the same through internet to recipient’s mail server-
>whenever recipient’s email client program’s inbox is opened,that email is delivered to inbox through POP3 (post
office protocols 3rd version)->which user will read in email client program.
VOIP – Voice over Internet Protocol (VoIP), is a technology that allows us to make voice calls using a broadband Internet
connection instead of a regular (or analog) phone line.
VoIP services convert our voice into a digital signal that travels over the Internet. If we are calling a regular phone
number, the signal is converted to a regular telephone signal before it reaches the destination. VoIP can allow us to make
a call directly from a computer, a special VoIP phone. In addition, wireless "hot spots" in locations such as airports,
parks, and cafes allow us to connect to the Internet and may enable us to use VoIP service wirelessly.
Advantages:
• Less Cost
• Accessibility
• Flexibility
• Voice Quality
• Extra/Less Expensive Features Disadvantages:
• Reliable Internet Connection Required
• Power Outages/Emergencies
• Latency
Protocols for chat
& video conferencing

More Related Content

PPT
network protocols7 class 12 computer .ppt
PreeTVithule1
 
PPTX
internet protocol
rajshreemuthiah
 
PDF
Application Layer
Sweta Kumari Barnwal
 
PPTX
Tcp/Ip Model
ShofiqulIslam38
 
PPTX
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Kajal Singh
 
PDF
Notes e commerce
S S
 
PPTX
Chapter 12 Computer Networks II class 12.pptx
vanshk11224
 
DOCX
Protocols in computer network
priya sehgal
 
network protocols7 class 12 computer .ppt
PreeTVithule1
 
internet protocol
rajshreemuthiah
 
Application Layer
Sweta Kumari Barnwal
 
Tcp/Ip Model
ShofiqulIslam38
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Kajal Singh
 
Notes e commerce
S S
 
Chapter 12 Computer Networks II class 12.pptx
vanshk11224
 
Protocols in computer network
priya sehgal
 

Similar to network protocol | Networking by Nitasha Chaturvedi (20)

PDF
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
PPTX
Ways to-access-inetrnet-
markgernale24
 
PDF
TCP - TCP breaks data into manageable packets and tracks information.pdf
anjanacottonmills
 
DOCX
application layer
BishalWosti1
 
DOCX
Introduction To Internet
Mohit Dhankher
 
PPTX
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
PPTX
Internet Internet Protocols.pptx( technology)
ujjawalr9027
 
PPT
Computer Networks
Shylesh BC
 
PPTX
Networking
sumitbhaskar0007
 
DOCX
Identify and describe each phase (numbered) in the TCP trace- Make sur.docx
mckerliejonelle
 
DOCX
Identify and describe each phase (numbered) in the TCP trace. Make su.docx
Abhinav816839
 
PPTX
How Internet Works
sumit kumar
 
PPTX
Information on protocols-email protocols
Priyanka Shinde
 
PDF
Lesson 17 fundamental of internet (88 kb)
IMRAN KHAN
 
PDF
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
PPTX
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
 
PPT
Ta 104-tcp
Nitesh Singh
 
DOC
Networking-basics
Raj Alam
 
PPT
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
Ways to-access-inetrnet-
markgernale24
 
TCP - TCP breaks data into manageable packets and tracks information.pdf
anjanacottonmills
 
application layer
BishalWosti1
 
Introduction To Internet
Mohit Dhankher
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
VivekTripathi684438
 
Internet Internet Protocols.pptx( technology)
ujjawalr9027
 
Computer Networks
Shylesh BC
 
Networking
sumitbhaskar0007
 
Identify and describe each phase (numbered) in the TCP trace- Make sur.docx
mckerliejonelle
 
Identify and describe each phase (numbered) in the TCP trace. Make su.docx
Abhinav816839
 
How Internet Works
sumit kumar
 
Information on protocols-email protocols
Priyanka Shinde
 
Lesson 17 fundamental of internet (88 kb)
IMRAN KHAN
 
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
 
Ta 104-tcp
Nitesh Singh
 
Networking-basics
Raj Alam
 
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
Ad

Recently uploaded (20)

PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
CDH. pptx
AneetaSharma15
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Ad

network protocol | Networking by Nitasha Chaturvedi

  • 1. Visit our YouTube Channel “Easy Learning 247’’ BY NITASHA CHATURVEDI EASY LEARNING 247
  • 2. Network Protocols TCP/IP (Transmission Control Protocol/Internet Protocol)- also referred to as the Internet Protocol Suite, is the World Wide Web's core communication system which enables every Internet-based device to communicate with every other such devices simultaneously. An IP address is the unique numerical address of a device in a computer network that uses Internet Protocol for communication. The IP address allow you to pinpoint a particular device from the billions of devices on the Internet. Static IP Addresses-usually never change but they may be changed as a result of network administration. Dynamic IP Addresses-These IP addresses are temporary and assigned to a computer when they get connected to the Internet each time Two most used ip versions are ipv4 and ipv6. IPv4 is a 32-Bit IP Address. IPv6 is 128 Bit IP Address. IPv4 is a numeric address, and its binary bits are separated by a dot (.) IPv6 is an alphanumeric address whose binary bits are separated by a colon (:)
  • 3. Network Protocols IPv4 ADDRESS CLASS - Of the five address classes, three—Class A, B, and C—were designated for unicast single source–to–single destination communication. Addresses in Class D were reserved for IP Multicast applications, which allows one-to-many communication. Class E addresses were reserved for experimental purposes.
  • 4. Network Protocols How TCP/IP WORKS -worksTCP/IP is a two-layered program: the higher layer (TCP) disassembles message content into small "data packets" that are then transmitted over the Internet to be re-assembled by the receiving computer's TCP back into the message's original form.
  • 5. TCP/IP and Higher-Level Applications - Many higher-level apps that ecommerce businesses need to be familiar with utilize and/or are built on TCP/IP. • FTP (the Internet's File Transfer Protocol) • HTTP (the Internet's Hyper-text Transfer Protocol) • Telnet, which enables logging on computers from remote locations • SMTP (Simple Mail Transfer Protocol)
  • 6. FTP – FTP, or File Transfer Protocol, is one of the standard internet protocols used to transfer data files between a client(FTP client) and a server(FTP server) over a computer network. It was developed in the early 1970s by Abhay Bhushan (alumni IIT Kanpur),while he was a student at MIT. FTP was initially created to allow for the secure transfer of files between servers and host computers over the ARPANET Network Control Program (a precursor to the modern internet).Nowadays it is being used for uploading files on webserver after non anonymous ftp(means username and password available with you).downloading is possible as anonymous ftp(no password is required).FTP is available in two mode – text mode ftp(where user have to give commands in text form) and GUI ftp(graphical interaction is possible). Some of the more popular, andreliable, FTP Clients currently operating in the industry are FileZilla,WinSCP,Cyberduck,gFTP
  • 7. Point-to-Point Protocol (PPP) is an open standard protocol that is mostly used to provide connections over point-to-point serial links. The main purpose of PPP is to transport Layer 3 packets over a Data Link layer point-to-point link
  • 8. HTTP - HTTP stands for hypertext transfer protocol and is used to transfer data across the Web. It allow users of the World Wide Web to exchange information found on web pages. When accessing any web page entering http:// in front of the address tells the browser to communicate over HTTP. How It Works- It is a connectionless text based protocol. Clients (web browsers) send requests through request object of http to web servers for web pages / images etc.Web server respond accordingly through response object of http After this cycle(request – response), the connection between client and server across the Internet is disconnected. A new connection must be made for each request(means for each web page). This diagram shows the working of http protocol. Working with dns server and working with web Server both.
  • 9. HTTPS(Hyper text transfer protocol secure) - helps prevent intruders from tampering with the communications between your websites and your users' browsers. It scramble the messages using that "code" so that no one in between can read the message. It keeps our information safe from hackers. Https uses the "code" on a Secure Sockets Layer (SSL), sometimes called Transport Layer Security (TLS) to send the information back and forth. Essentially, we need three things to encrypt data: • The data to be sent/encrypted • A unique encryption key • An encryption algorithm (a math function that garbles the data) asymmetric encryption is used in https. Asymmetric means we are using two different keys, one to encrypt and one to decrypt. This encryption is now done at TLS rather than SSL.
  • 10. Remote login – A remote login facility permits a user who is using one computer to login to remote computer or interact with a program on another computer. Command given at remote location is processed by server and result displayed over remote location. Telnet – Telnet is most popular protocol for accessing remote site/server. Using telnet client software on our computer, we can make a connection to a telnet server (that is, the remote host). Once our telnet client establishes a connection to the remote host, our client becomes a virtual terminal, allowing us to communicate with the remote host from our computer. In most cases, we need to log into the remote host, which requires that we have an account on that system. Occasionally, we can log in as guest or public without having an account.Generally it is used in unix based client server system to interact.
  • 11. Email Protocols Email –Electronic mail is a facility that allows users to transmit messages across the internet in fast and secure manner. Email created using email client program->on press of send button ,it is delivered to sender’s mail server through SMTP(Simple mail transfer protocol)->which further transmit the same through internet to recipient’s mail server- >whenever recipient’s email client program’s inbox is opened,that email is delivered to inbox through POP3 (post office protocols 3rd version)->which user will read in email client program.
  • 12. VOIP – Voice over Internet Protocol (VoIP), is a technology that allows us to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. VoIP services convert our voice into a digital signal that travels over the Internet. If we are calling a regular phone number, the signal is converted to a regular telephone signal before it reaches the destination. VoIP can allow us to make a call directly from a computer, a special VoIP phone. In addition, wireless "hot spots" in locations such as airports, parks, and cafes allow us to connect to the Internet and may enable us to use VoIP service wirelessly. Advantages: • Less Cost • Accessibility • Flexibility • Voice Quality • Extra/Less Expensive Features Disadvantages: • Reliable Internet Connection Required • Power Outages/Emergencies • Latency Protocols for chat & video conferencing