SlideShare a Scribd company logo
Shubham KhedekarShubham Khedekar
Introduction TCP/IPIntroduction TCP/IP
 The Internet Protocol Suite (commonly known
as TCP/IP) is the set of communications
protocols used for the Internet and other similar
networks.
 It is named from two of the most important protocols
in it:
 Transmission Control Protocol (TCP) and
 Internet Protocol (IP), which were the first two
networking protocols defined in this standard.
TCP/IP Protocols With All Layer Description
APPLICATION LAYER
 This layer is comparable to the application,
presentation, and session layers of the OSI model all
combined into one.
 It provides a way for applications to have access to
networked services.
 It is widely-known layer for the exchange of user
information
 The Hypertext Transfer Protocol (HTTP) is used to
transfer files that make up the Web pages of the
World Wide Web.
 The File Transfer Protocol (FTP) is used for
interactive file transfer.
 The Simple Mail Transfer Protocol (SMTP) is used
for the transfer of mail messages and attachments.
 Presentation Layer does Encryption-Decryption and
Compression-Decompression of Data.
 This layer allows a process to add checkpoints which
are considered as synchronization points into stream of
data.
TCP/IP Protocols With All Layer Description
TRANSPORT LAYER
 This layer acts as the delivery service used by the
application layer.
 Two protocols used are TCP and UDP.
 The choice is made based on the application's
transmission reliability requirements.
 The transport layer also handles all error detection
and recovery.
 It uses checksums, acknowledgements, and timeouts
to control transmissions and end to end verification.
 Unlike the OSI model, TCP/IP treats reliability as an
end-to-end problem
 TCP provides a one-to-one, connection-oriented,
reliable communications service.
 UDP provides a one-to-one or one-to-many,
connectionless, unreliable communications service.
 A message is divided into segments; each segment
contains sequence number, which enables this layer
in reassembling the message.
 Message is reassembled correctly upon arrival at the
destination and replaces packets which were lost in
transmission.
 Connection Control : It includes 2 types :
1. Connectionless Transport Layer : Each segment is
considered as an independent packet and delivered
to the transport layer at the destination machine.
2. Connection Oriented Transport Layer : Before
delivering packets, connection is made with
transport layer at the destination machine.
NETWORK LAYER
 This layer is also known as Internet Layer. The main
purpose of this layer is to organize or handle the
movement of data on network.
 By movement of data, we generally mean routing of
data over the network.
 This layer is responsible for addressing, packaging,
and routing functions.
 The core protocols of the Internet layer are IP, ARP,
ICMP, and IGMP.
 The Internet Protocol (IP) is a routable protocol
responsible for IP addressing, routing, and the
fragmentation and reassembly of packets.
 The Address Resolution Protocol (ARP) is
responsible for the resolution of the Internet layer
address to the Network Interface layer address such
as a hardware address.
 The Internet Control Message Protocol (ICMP) is
responsible for providing diagnostic functions and
reporting errors due to the unsuccessful delivery of IP
packets.
 The Internet Group Management Protocol (IGMP) is
responsible for the management of IP multicast
groups.
 It translates logical network address into physical
address. Concerned with circuit, message or packet
switching.
 Routers and gateways operate in the network layer.
TCP/IP Protocols With All Layer Description
DATA LINK LAYER
 Data link layer is most reliable node to node delivery
of data.
 It forms frames from the packets that are received
from network layer and gives it to physical layer.
 It also synchronizes the information which is to be
transmitted over the data. Error controlling is easily
done.
 Protocols of this layer determine which of the devices
has control over the link at any given time, when two
or more devices are connected to the same link.
 Error control is achieved by adding a trailer at the end
of the frame.
 Duplication of frames are also prevented by using this
mechanism.
 Frames are the streams of bits received from the
network layer into manageable data units.
 This division of stream of bits is done by Data Link
Layer.
 Switch and Bridge are used in this layer
PHYSICAL LAYER
 Physical layer is the lowest layer of all. It is
responsible for sending bits from one computer to
another.
 This layer is not concerned with the meaning of the
bits and deals with the physical connection
 This layer defines electrical and physical details
represented as 0 or a 1.
 This layer defines the rate of transmission which is
the number of bits per second.
 It deals with the synchronization of the transmitter
and receiver. The sender and receiver are
synchronized at bit level.
 Devices must be connected using the following
topologies: Mesh, Star, Ring and Bus.
 Physical Layer defines the direction of transmission
between two devices: Simplex, Half Duplex, Full
Duplex
 Deals with baseband and broadband transmission.
 Hubs and Repeater are used in this layer
TCP/IP Protocols With All Layer Description
Ad

More Related Content

What's hot (20)

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
Sangeetha Rangarajan
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
Network software
Network softwareNetwork software
Network software
SakthiVinoth78
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Tcp
TcpTcp
Tcp
Varsha Kumar
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
OSI MODEL
OSI MODEL OSI MODEL
OSI MODEL
Soumo Dhali
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 

Similar to TCP/IP Protocols With All Layer Description (20)

Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
TadeseBeyene
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
vmdharxfr
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
Manjeet MN
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
PRADEEP
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
Abhishek Parihari
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
Nitesh Singh
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
2. UNIT I-NETWORK MODELS for studying computer networks
2. UNIT I-NETWORK MODELS for studying computer networks2. UNIT I-NETWORK MODELS for studying computer networks
2. UNIT I-NETWORK MODELS for studying computer networks
radha452880
 
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptxEContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
HarshDeliwala10B19
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
muhammadsaudm19a
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
Hattori Sidek
 
L 1
L   1L   1
L 1
Sonali260672
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
Shamima Akther
 
Assignment3
Assignment3Assignment3
Assignment3
MahfujurRahman63
 
Osi model
Osi modelOsi model
Osi model
GLIM Digital
 
four
fourfour
four
م.وائل الزعبي
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
Pooja Dewangan
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Marwaha
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
TadeseBeyene
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
vmdharxfr
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
Manjeet MN
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
PRADEEP
 
2. UNIT I-NETWORK MODELS for studying computer networks
2. UNIT I-NETWORK MODELS for studying computer networks2. UNIT I-NETWORK MODELS for studying computer networks
2. UNIT I-NETWORK MODELS for studying computer networks
radha452880
 
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptxEContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
EContent_11_2024_10_15_02_14_40_UNIT2newpptx__2024_08_08_10_16_53.pptx
HarshDeliwala10B19
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
muhammadsaudm19a
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
OSI MODEL AND ITS LAYERS FUNCTION
OSI  MODEL AND ITS LAYERS FUNCTIONOSI  MODEL AND ITS LAYERS FUNCTION
OSI MODEL AND ITS LAYERS FUNCTION
Pooja Dewangan
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
Ad

More from Shubham Khedekar (7)

Business Level Strategies
Business Level StrategiesBusiness Level Strategies
Business Level Strategies
Shubham Khedekar
 
IMS based IPTV
IMS based IPTVIMS based IPTV
IMS based IPTV
Shubham Khedekar
 
Holacracy : The New Approach
Holacracy : The New Approach Holacracy : The New Approach
Holacracy : The New Approach
Shubham Khedekar
 
Henry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC LimitedHenry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC Limited
Shubham Khedekar
 
Service Product Marketing (Banking)
Service Product Marketing (Banking)Service Product Marketing (Banking)
Service Product Marketing (Banking)
Shubham Khedekar
 
Environmental Analysis of Telecom Company
Environmental Analysis of Telecom CompanyEnvironmental Analysis of Telecom Company
Environmental Analysis of Telecom Company
Shubham Khedekar
 
Oppo Marketing Strategies
Oppo Marketing StrategiesOppo Marketing Strategies
Oppo Marketing Strategies
Shubham Khedekar
 
Holacracy : The New Approach
Holacracy : The New Approach Holacracy : The New Approach
Holacracy : The New Approach
Shubham Khedekar
 
Henry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC LimitedHenry Fayol Principles for ITC Limited
Henry Fayol Principles for ITC Limited
Shubham Khedekar
 
Service Product Marketing (Banking)
Service Product Marketing (Banking)Service Product Marketing (Banking)
Service Product Marketing (Banking)
Shubham Khedekar
 
Environmental Analysis of Telecom Company
Environmental Analysis of Telecom CompanyEnvironmental Analysis of Telecom Company
Environmental Analysis of Telecom Company
Shubham Khedekar
 
Ad

Recently uploaded (20)

From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint PresentationFrom Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
Shay Ginsbourg
 
Top 12 Most Useful AngularJS Development Tools to Use in 2025
Top 12 Most Useful AngularJS Development Tools to Use in 2025Top 12 Most Useful AngularJS Development Tools to Use in 2025
Top 12 Most Useful AngularJS Development Tools to Use in 2025
GrapesTech Solutions
 
Best HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRMBest HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRM
accordHRM
 
Medical Device Cybersecurity Threat & Risk Scoring
Medical Device Cybersecurity Threat & Risk ScoringMedical Device Cybersecurity Threat & Risk Scoring
Medical Device Cybersecurity Threat & Risk Scoring
ICS
 
Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025
Web Designer
 
Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025
Phil Eaton
 
Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509
Fermin Galan
 
Solar-wind hybrid engery a system sustainable power
Solar-wind  hybrid engery a system sustainable powerSolar-wind  hybrid engery a system sustainable power
Solar-wind hybrid engery a system sustainable power
bhoomigowda12345
 
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studiesTroubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Tier1 app
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.pptPassive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
IES VE
 
Digital Twins Software Service in Belfast
Digital Twins Software Service in BelfastDigital Twins Software Service in Belfast
Digital Twins Software Service in Belfast
julia smits
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdfTop Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
evrigsolution
 
Artificial hand using embedded system.pptx
Artificial hand using embedded system.pptxArtificial hand using embedded system.pptx
Artificial hand using embedded system.pptx
bhoomigowda12345
 
Time Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project TechniquesTime Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project Techniques
Livetecs LLC
 
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-RuntimeReinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Natan Silnitsky
 
Adobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREEAdobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREE
zafranwaqar90
 
GC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance EngineeringGC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance Engineering
Tier1 app
 
Wilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For WindowsWilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For Windows
Google
 
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint PresentationFrom Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
From Vibe Coding to Vibe Testing - Complete PowerPoint Presentation
Shay Ginsbourg
 
Top 12 Most Useful AngularJS Development Tools to Use in 2025
Top 12 Most Useful AngularJS Development Tools to Use in 2025Top 12 Most Useful AngularJS Development Tools to Use in 2025
Top 12 Most Useful AngularJS Development Tools to Use in 2025
GrapesTech Solutions
 
Best HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRMBest HR and Payroll Software in Bangladesh - accordHRM
Best HR and Payroll Software in Bangladesh - accordHRM
accordHRM
 
Medical Device Cybersecurity Threat & Risk Scoring
Medical Device Cybersecurity Threat & Risk ScoringMedical Device Cybersecurity Threat & Risk Scoring
Medical Device Cybersecurity Threat & Risk Scoring
ICS
 
Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025Wilcom Embroidery Studio Crack Free Latest 2025
Wilcom Embroidery Studio Crack Free Latest 2025
Web Designer
 
Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025Memory Management and Leaks in Postgres from pgext.day 2025
Memory Management and Leaks in Postgres from pgext.day 2025
Phil Eaton
 
Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509
Fermin Galan
 
Solar-wind hybrid engery a system sustainable power
Solar-wind  hybrid engery a system sustainable powerSolar-wind  hybrid engery a system sustainable power
Solar-wind hybrid engery a system sustainable power
bhoomigowda12345
 
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studiesTroubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Tier1 app
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.pptPassive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
IES VE
 
Digital Twins Software Service in Belfast
Digital Twins Software Service in BelfastDigital Twins Software Service in Belfast
Digital Twins Software Service in Belfast
julia smits
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdfTop Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
Top Magento Hyvä Theme Features That Make It Ideal for E-commerce.pdf
evrigsolution
 
Artificial hand using embedded system.pptx
Artificial hand using embedded system.pptxArtificial hand using embedded system.pptx
Artificial hand using embedded system.pptx
bhoomigowda12345
 
Time Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project TechniquesTime Estimation: Expert Tips & Proven Project Techniques
Time Estimation: Expert Tips & Proven Project Techniques
Livetecs LLC
 
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-RuntimeReinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Natan Silnitsky
 
Adobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREEAdobe Audition Crack FRESH Version 2025 FREE
Adobe Audition Crack FRESH Version 2025 FREE
zafranwaqar90
 
GC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance EngineeringGC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance Engineering
Tier1 app
 
Wilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For WindowsWilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For Windows
Google
 

TCP/IP Protocols With All Layer Description

  • 2. Introduction TCP/IPIntroduction TCP/IP  The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.  It is named from two of the most important protocols in it:  Transmission Control Protocol (TCP) and  Internet Protocol (IP), which were the first two networking protocols defined in this standard.
  • 4. APPLICATION LAYER  This layer is comparable to the application, presentation, and session layers of the OSI model all combined into one.  It provides a way for applications to have access to networked services.  It is widely-known layer for the exchange of user information
  • 5.  The Hypertext Transfer Protocol (HTTP) is used to transfer files that make up the Web pages of the World Wide Web.  The File Transfer Protocol (FTP) is used for interactive file transfer.  The Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments.
  • 6.  Presentation Layer does Encryption-Decryption and Compression-Decompression of Data.  This layer allows a process to add checkpoints which are considered as synchronization points into stream of data.
  • 8. TRANSPORT LAYER  This layer acts as the delivery service used by the application layer.  Two protocols used are TCP and UDP.  The choice is made based on the application's transmission reliability requirements.  The transport layer also handles all error detection and recovery.
  • 9.  It uses checksums, acknowledgements, and timeouts to control transmissions and end to end verification.  Unlike the OSI model, TCP/IP treats reliability as an end-to-end problem  TCP provides a one-to-one, connection-oriented, reliable communications service.  UDP provides a one-to-one or one-to-many, connectionless, unreliable communications service.
  • 10.  A message is divided into segments; each segment contains sequence number, which enables this layer in reassembling the message.
  • 11.  Message is reassembled correctly upon arrival at the destination and replaces packets which were lost in transmission.  Connection Control : It includes 2 types : 1. Connectionless Transport Layer : Each segment is considered as an independent packet and delivered to the transport layer at the destination machine. 2. Connection Oriented Transport Layer : Before delivering packets, connection is made with transport layer at the destination machine.
  • 12. NETWORK LAYER  This layer is also known as Internet Layer. The main purpose of this layer is to organize or handle the movement of data on network.  By movement of data, we generally mean routing of data over the network.  This layer is responsible for addressing, packaging, and routing functions.
  • 13.  The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.  The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing, and the fragmentation and reassembly of packets.  The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer address to the Network Interface layer address such as a hardware address.
  • 14.  The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic functions and reporting errors due to the unsuccessful delivery of IP packets.  The Internet Group Management Protocol (IGMP) is responsible for the management of IP multicast groups.
  • 15.  It translates logical network address into physical address. Concerned with circuit, message or packet switching.  Routers and gateways operate in the network layer.
  • 17. DATA LINK LAYER  Data link layer is most reliable node to node delivery of data.  It forms frames from the packets that are received from network layer and gives it to physical layer.  It also synchronizes the information which is to be transmitted over the data. Error controlling is easily done.
  • 18.  Protocols of this layer determine which of the devices has control over the link at any given time, when two or more devices are connected to the same link.
  • 19.  Error control is achieved by adding a trailer at the end of the frame.  Duplication of frames are also prevented by using this mechanism.  Frames are the streams of bits received from the network layer into manageable data units.  This division of stream of bits is done by Data Link Layer.
  • 20.  Switch and Bridge are used in this layer
  • 21. PHYSICAL LAYER  Physical layer is the lowest layer of all. It is responsible for sending bits from one computer to another.  This layer is not concerned with the meaning of the bits and deals with the physical connection  This layer defines electrical and physical details represented as 0 or a 1.
  • 22.  This layer defines the rate of transmission which is the number of bits per second.  It deals with the synchronization of the transmitter and receiver. The sender and receiver are synchronized at bit level.  Devices must be connected using the following topologies: Mesh, Star, Ring and Bus.
  • 23.  Physical Layer defines the direction of transmission between two devices: Simplex, Half Duplex, Full Duplex
  • 24.  Deals with baseband and broadband transmission.  Hubs and Repeater are used in this layer
  翻译: