Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

TCP/IP PROTOCOL

INTRODUCTION TCP/IP PROTOCOL


TCP/IP that is transmission control protocol and internet protocol was
developed by department of defence’s (DOD) in USA project research
agency of network interconnection to connect remote machines.

TCP/IP is the network model used in the current internet architecture as


well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement
of data between the source and destination or the internet.

The TCP/IP reference model were:


support for a flexible architecture. Adding more machines to a network
was easy.
The network was robust, and connections remained intact untill the
source and destination machines were functioning.
TCP/IP MODEL VS. OSI MODEL
APPLICATION LAYER 

 The application layer is the highest abstraction


layer of the TCP/IP model that provides the
interfaces and protocols needed by the users
 It is used to develop network-based
applications.
 It provides user services like user login, naming
network devices, formatting messages, and e-
mails, transfer of files.
TELNET (TELETYPE NETWORK PROTOCOL)

Telnet is a common
network protocol used
on the Internet and also
inside a LAN (local
network).
 Telnet is one of the
simplest ways to
exchange data between
two computers.
 It allows two computers
anywhere on a computer
network, including the
worldwide Internet, to
exchange text and other
data in real time.
SSH SECURE SHELL

 Secure Shell is a
network
communication
protocol that enables
two computers to
communicate 
 (ex: http or hypertext
transfer protocol,
which is the protocol
used to transfer
hypertext such as web
pages) and share data.
 FILE TRANSFER PROTOCOL
 FTP is a standard
communication
protocol used for the
transfer of computer
files from a server to
a client on a
computer network.
 FTP is built on a
client–server model
architecture using
separate control and
data connections
between the client
and the server.
TRIVIAL FILE TRANSFER PROTOCOL 

 TFTP is a simple
protocol used for
transferring files.
 TFTP uses the User
Datagram Protocol
(UDP) to transport
data from one end to
another.
 TFTP is mostly used
to read and write
files/mail to or from a
remote server.
HYPERTEXT TRANSFER PROTOCOL
 HTTP gives users a way
to interact with web
resources such as HTML
files by transmitting
hypertext messages
between clients and
servers.
 HTTP clients generally
use Transmission Control
Protocol (TCP)
connections to
communicate with
servers.
DOMAIN NAME SYSTEM (DNS)
 DNS is an internet
service protocol.
 It is responsible for
translating domain
names into their
corresponding IP
addresses.
 It is user friendly
because domain name
are easier to remember
than IP Addresses.
TRANSPORT LAYER PROTOCOLS 

 TCP is also know as host to host protocol


because it provides host to host services
such as flow control, reliability and
communication services.

 The two main layers of Transport layer


protocols :-
1. Transmission control protocol (TCP)
2. User datagram protocol (UDP)
TRANSMISSION CONTROL PROTOCOL
 TCP communications standard
that enables application
programs and computing
devices to exchange messages
over a network.
 It is designed to send packets
across the internet and ensure
the successful delivery of data
and messages over networks.
 TCP works with the Internet
Protocol (IP), which defines
how computers send packets of
data to each other.
USER DATAGRAM PROTOCOL (UDP)
 UDP  a communications
protocol that facilitates the
exchange of messages
between computing devices
in a network.
 UDP does not require the
source and destination to
establish a three-way
handshake before
transmission takes place.
 Additionally, there is no
need for an end-to-end
connection.
INTERNET LAYER PROTOCOL
Internet layer protocol IP addressing as well as
routing function. It enables the packet to travel on its
own to the destination.
The pattern in which the packets are received is
altered before they are dispatched

The List of Important Protocol at Internet layer are:-


1. Internet Protocol (IP)
2. Internet Control message protocol(ICMP)
3.Address resolution Protocol (ARP)
INTERNET CONTROL MESSAGE PROTOCOL (ICMP) 

 ICMP is a network
layer protocol used
by network devices
to diagnose network
communication
issues.
 ICMP is mainly used
to determine whether
or not data is
reaching its intended
destination in a
timely manner.
ADDRESS RESOLUTION PROTOCOL (ARP)
 ARP broadcasts a request packet
to all the machines on the LAN
and asks if any of the machines
know they are using that
particular IP address. When a
machine recognizes the IP
address as its own, it sends a
reply so ARP can update the
cache for future reference and
proceed with the communication.
 ARP is a communication protocol
used for discovering the link
layer address, such as a MAC
address, associated with a given
internet layer address, typically
an IPv4 address.
NETWORK ACCESS LAYER PROTOCOL

 It is responsible for the placing or receiving of TCP/IP


packets on or off the network medium and includes Ethernet
token ring and WAN technologies.

Network access layer combines layers 1 - physical and


2 - data link of the OSI model.

It addresses layer 1 issues such as energy, bits, and the


medium used to carry them (copper, fiber, wireless).

It also addresses layer 2 issues such as converting bits into


protocol units—for example : MAC addresses,
ETHERNET
 Ethernet protocol is a typical LAN
technology. Standard Ethernet-based
local area networks transmit data at
speed up to 10 Mbps. As Ethernet
cards are used for connecting
computers to LANs, they are in the
same time an entry point in
establishing connection to a WAN
and Internet.
 Ethernet describes how network
devices can format and transmit data
so other devices on the same local
or campus area network segment can
recognize, receive and process the
information.
TOKEN RING

A token-ring network is a local area
network (LAN) topology that sends
data in one direction throughout a
specified number of locations by
using a token.
 The switch then establishes a
dedicated connection between the
two stations, enabling data to be
transmitted and received at the
same time.
  Token Ring uses a logical ring
topology, which provides more
equal opportunity for each station
to gain access to the network than
the broadcast method used by
Ethernet. All nodes connect to the
MAU.
FIBER DISTRIBUTED DATA INTERFACE (FDDI)
 FDDI is a set of ANSI and ISO
guidelines for information
transmission on fiber-optic lines in
Local Area Network (LAN) that
can expand in run up to 200 km
(124 miles). The FDDI convention
is based on the token ring protocol.
 FDDI is used mainly in mission
critical and high traffic
networks where large amounts of
data flow need to flow quickly and
efficiently. FDDI is used anywhere
that utilizes a large network in
need of high bandwidth
INTERNET PROTOCOL
THANK YOU!

You might also like