SlideShare une entreprise Scribd logo
1  sur  47
Avani
PROTOCOL STACK AND ADDRESSING
Team Members: Bhavya K  Meera B CPooja PSushma Mallesh
Agenda1. Introduction2. Description of the OSI model3. Addressing4. Working/analogy5. Demonstration6. Conclusion
Introduction1. Topic - Protocol stack and                    addressing2. Network Models - OSI model                               - Internet model3. Protocol4. Protocol Stack5. OSI model
OSI Model 1. It is an abstract description 2. Has 7 layers 3. Each layer provides services to the layer above it   and receives services from the layer below it.
PHYSICAL LAYER It is the first layer of the protocol stack. Data at this layer is in the form of bits (0s and 1s). Co-ordinates the functions required to carry the bit stream over a physical medium. It defines the relationship between a device and a physical medium. Some of the protocols which function at this layer include ISDN, ATM, X.21, RS-232.
Functions : Defines the physical characteristics of the interfaces and the medium. Modulation  Data rate Line configuration Transmission mode Physical topology Contention resolution
Integrated Services Digital Network (ISDN) : ISDN in concept is the integration of both analog or voice data together with digital data over the same network.  It allows the transmission of voice, data, video and graphics at very high speeds simultaneously over communication lines. ISDN uses two channels for communication namely      1. B-channel (Bearer channel)      2. D-channel (Data channel)
Asynchronous Transfer Mode (ATM) : ATM is a technological system developed for both LAN and WAN and designed to handle data as well as video and voice traffic, all at the same time.  ATM organizes data into fixed 53-bytes cell units and transmit them over a physical medium. Each cell has 5 bytes header and 48 bytes information field. ATM creates a fixed channel, or route, between two points whenever data transfer begins.
DATA LINK LAYER It is the second layer of the protocol stack.  Data at this layer is in the form of frames. It translates the logical information into the actual electrical pulses that travel over the physical layer. It is composed of two sub layers     1. Logical Link Control (LLC)     2. Media Access Control  (MAC)     Some of the protocols which function at this layer include IEEE 802.5 Token Ring, PPP, ISL, HDLC.
Functions : Framing Frame sequencing Physical addressing Error notification and error control Flow control Access control
Token Ring Protocol: It is a LAN protocol defined in the IEEE 802.5. All the workstations are connected in a ring topology. A bit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time.
Point-to-Point Protocol (PPP) : This is a full-duplex protocol that can be used on various physical media. It is meant for communication between two computers using a serial interface.  Ex: a personal computer connected by phone line to a server It offers error detection mechanism.
NETWORK LAYER It is the third layer of the protocol stack.  Data at this layer is in the form of packets. This layer is mainly concerned with source to destination delivery of data packets via multiple networks. Routers operate at this layer. Some of the protocols which function at this layer are ARP, RIP, IP, ICMP, IGMP.
Functions : Logical addressing Routing Packet fragmentation
Routing Information Protocol (RIP) : RIP is a distance-vector protocol that uses hop (node) count as its metric. This protocol is widely used for traffic in the global internet. It sends routing-update messages at regular intervals and when the network topology changes.
Address Resolution Protocol (ARP) : ARP is a network protocol which maps network layer protocol address to a data link hardware address. It is used when a host in a Ethernet network has to communicate with another host. ARP resolves IP address to corresponding Ethernet address.
Transport layer It is the fourth layer of the Open Systems Interconnection (OSI) model. It is responsible for process-to-process delivery of the entire message. It encapsulates application data blocks into data units (data gram/segments). Various protocols under this layer include TCP, UDP, ECN, DCCP and so on.
Functions of transport layer: Statistical multiplexing of data. Connection oriented communication. End-to-end reliable connection. Flow control.
Protocols of Transport layer: 1.   Explicit Congestion Notification (ECN) Delivers distinguished protocol segments from the source host to the destination host solely based on their addresses. Allows end-to-end notification of network congestion without dropping packets.
2.   Datagram Congestion Control Protocol (DCCP) Provides reliable connection setup. Sends acknowledgements to sender about the segments sent. Useful for applications with timing constraints on the delivery of data.
Session layer It is the fifth layer of the Open Systems Interconnection (OSI) model. It establishes, maintains and synchronizes interaction among communicating systems. Used in application environments that make use of remote procedure calls (RPC). Various protocols under this layer include PAP, PPTP, RPC, ZIP and so on.
Functions of Session layer: Dialog control. Authentication/permission. Synchronization.
Protocols of Session layer: Password Authentication Protocol (PAP) Authenticates a user to a network access server. Server sends acknowledgement based on credentials. It is used by point to point protocol.
Point-to-Point Tunneling Protocol (PPTP) Implements virtual private networks. It does not provide confidentiality and encryption.
Presentation layer It is the sixth layer of the Open Systems Interconnection (OSI) model. It is concerned with the syntax and semantics of the information exchanged between two systems. It is composed of two sub layers: 		CASE (Common Application Service Element)  		SASE (Specific Application Service Element)  Various protocols of this layer include AFP, NCP, RDP, XDR.
Functions of Presentation layer: Translation Encryption Compression
Protocols of presentation layer: Remote Desktop Protocol (RDP) It is a proprietary protocol developed by Microsoft. It is also a communications protocol. Provides a user with a graphical interface to another computer.
NetWare Core Protocol (NCP) It is usually associated with the NetWare operating systems. It is used to access files, directories and clock synchronization.
Application Layer: Enables the application to access the network. Services provided by the application layer includes: Network Virtual Terminal: A network virtual terminal is a software version of a physical terminal and allows the user to log on to a remote host.  File transfer, access and management (FTAM): This application allows user to Access, Retrieve and Manage files in a remote computer. Mail services: Facilitates email forwarding and storage. Directory Services: This application provides distributed database sources and access for global information about various objects and services.  Examples for protocols in this layer: HTTP(Hyper Text Transfer Protocol), FTP(File transfer Protocol), BOOTP(Bootstrap protocol), SSH(Secure Shell), SLP(Service Location Protocol) etc.
Hypertext Transfer Protocol (HTTP): It is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web. User Agent: Using a web browser, spider, or other end-user     tool Origin Server: Which stores or creates resources such as HTML files and images  Implementation: Implemented on top of any other protocol on the Internet, or on other networks  Bootstrap Protocol, or BOOTP: It is a network protocol used by a network client to obtain an IP address from a configuration server      BOOTP has also been used for Unix-like diskless workstations to obtain the network location of their boot image in addition to an IP address, and also by enterprises to roll out a pre-configured client (e.g., Windows) installation to newly installed PCs Bootstrapping: Use of another device on the network to become an active IP hosts.
File Transfer Protocol (FTP): is the simplest way to exchange files between computers on the Internet Architecture: It is a standard network protocol used to exchange and manipulate files over an Internet Protocol computer network. It built on a client-server architecture and it utilizes separate control and data connections between the client and server applications.        FTP can be used with user-based password authentication or with anonymous user access.  Use: FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet, used to download programs and other files to your computer from other servers. You can also update (delete, rename, move, and copy) files at a server.
Physical Address (MAC Address): Usually encodes the manufacturer’s registered identification number Formulating a MAC Address: MAC -48 EUI -48 EUI -64 Finding MAC Address for WINDOWS: Start Menu – Run – Type ‘cmd’- Enter – Type ‘Ipconfig /all’(If WINDOWS XP type ‘getmac’) Finding MAC Address for LINUX: Use the ‘ifconfig’ command - /bin or /sbin directories.
IP Address: In a computer network utilizing the Internet Protocol for communication between its nodes Versions: IPV4:  Uses 32-bit (4-byte) addresses, limits the address space to 4,294,967,296 (232) possible unique addresses.   Each part represents 8bits of the address, hence called Octet. It may be presented in hexadecimal, octal, or binary representations  Example of an IPv4 address: 208.77.188.166 IPV6:  Due to rapid exhaustion of IPV4 address space, prompted the IETF to expand Internet’s addressing capability.  Increased address size to 16 Octets. 	 Opportunity to separate the addressing infrastructure of a Network segment. No need to have a complex address conservation methods as used in classless inter-domain routing (CIDR).  Example of an IPv6 address: 2001:0db8:85a3:08d3:1319:8a2e:0370:7334
IP Address of WINDOWS based Operating System: Start – Run – Type “cmd” or “Command” – Press Enter/OK. An MS DOS window will open.  You are now ready to send a command to your Computer.  Type "netstat -n" – Press Enter List of all your active connections and IP numbers. You will see 4 fields with 4 columns with all the IP details of sites or the people whom you are connected. Type "netstat -nab" and you can see the programming details. Type Start – Run – cmd – Ipconfig, shows masked IP and IP.
IP Address of LINUX based Operating System Use the command “ifconfig”. Used at boot time to set up interfaces as necessary.  It displays Ethernet IP address, Mac address, subnet mask and other information  Type /sbin /ipconfig command to display IP address: $ /sbin/ifconfig
Differences between MAC and IP Address: MAC Type of a number for network devices like Assigned at the time hardware is manufactured   Hardware address  Hexadecimal string of numbers and letters   IP Address: It uniquely identifies computers on the Internet, or on a local intranet As part of connection to a network. It is not fixed Software address    It is assigned by the router every time it gets connected to the network
Apple Talk: Proprietary suite of protocols. The AppleTalk Link Access Protocol (ALAP) AppleTalk's address header Sockets Transport Layer AppleTalk names consist of three fields: (Object Name, Type Name and Zone Name. 	 The Echo Protocol (EP) Specifications for ADSP (Apple Talk Data Stream Protocol) Apple Talk Session Protocol (ASP) Apple Talk Filing Protocol (AFP) – Specifications
Apple Talk Protocols: Apple Computers developed the AppleTalk protocol suite to communicate among Apple systems using the Local Talk interface. The Apple Talk Protocol suite includes the following protocols:   AARP: AppleTalk Address Resolution  Protocol DDP: Datagram Delivery Protocol   RTMP: Routing Table Maintenance Protocol AEP: AppleTalk Echo Protocol                  ATP: AppleTalk Transaction Protocol                NBP: Name-Binding Protocol                             ZIP: Zone Information Protocol                    ASP: AppleTalk Session Protocol                       PAP: Printer Access Protocol ADSP: AppleTalk Data Stream Protocol AFP: AppleTalk Filing Protocol
How to check IP Address on an Apple System: Apple Computer running Mac OSX - Apple logo on the top left of the screen - System Preferences - Internet and Network - Network -– Drop down menu. In case of Ethernet – Select "Built In Ethernet" – if Wireless (select “Airport). Select "TCP/IP" on the "Network" screen. Your IP Address will be shown here.
ANOLOGY Sender’s end:
Receiver’s end:
Tools1. Ethereal2. Multiple Interface Watcher
Conclusion1. Basic concepts2. Description of OSI model3. Addressing4. Analogy5. Demonstration of the tools

Contenu connexe

Tendances (20)

OsiI model
OsiI modelOsiI model
OsiI model
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
03. osi reference-layer
03. osi reference-layer03. osi reference-layer
03. osi reference-layer
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 

En vedette

Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Types of ip address classes
Types of ip address classesTypes of ip address classes
Types of ip address classesgreatbury
 
Ip addressing
Ip addressingIp addressing
Ip addressingOnline
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

En vedette (7)

Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
Types of ip address classes
Types of ip address classesTypes of ip address classes
Types of ip address classes
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ip address
Ip addressIp address
Ip address
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similaire à Avani

Similaire à Avani (20)

Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Presentation5
Presentation5Presentation5
Presentation5
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Network standards
Network standardsNetwork standards
Network standards
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Dernier

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 

Dernier (20)

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 

Avani

  • 2. PROTOCOL STACK AND ADDRESSING
  • 3. Team Members: Bhavya K Meera B CPooja PSushma Mallesh
  • 4. Agenda1. Introduction2. Description of the OSI model3. Addressing4. Working/analogy5. Demonstration6. Conclusion
  • 5. Introduction1. Topic - Protocol stack and addressing2. Network Models - OSI model - Internet model3. Protocol4. Protocol Stack5. OSI model
  • 6. OSI Model 1. It is an abstract description 2. Has 7 layers 3. Each layer provides services to the layer above it and receives services from the layer below it.
  • 7. PHYSICAL LAYER It is the first layer of the protocol stack. Data at this layer is in the form of bits (0s and 1s). Co-ordinates the functions required to carry the bit stream over a physical medium. It defines the relationship between a device and a physical medium. Some of the protocols which function at this layer include ISDN, ATM, X.21, RS-232.
  • 8. Functions : Defines the physical characteristics of the interfaces and the medium. Modulation Data rate Line configuration Transmission mode Physical topology Contention resolution
  • 9. Integrated Services Digital Network (ISDN) : ISDN in concept is the integration of both analog or voice data together with digital data over the same network. It allows the transmission of voice, data, video and graphics at very high speeds simultaneously over communication lines. ISDN uses two channels for communication namely 1. B-channel (Bearer channel) 2. D-channel (Data channel)
  • 10. Asynchronous Transfer Mode (ATM) : ATM is a technological system developed for both LAN and WAN and designed to handle data as well as video and voice traffic, all at the same time. ATM organizes data into fixed 53-bytes cell units and transmit them over a physical medium. Each cell has 5 bytes header and 48 bytes information field. ATM creates a fixed channel, or route, between two points whenever data transfer begins.
  • 11. DATA LINK LAYER It is the second layer of the protocol stack. Data at this layer is in the form of frames. It translates the logical information into the actual electrical pulses that travel over the physical layer. It is composed of two sub layers 1. Logical Link Control (LLC) 2. Media Access Control (MAC) Some of the protocols which function at this layer include IEEE 802.5 Token Ring, PPP, ISL, HDLC.
  • 12. Functions : Framing Frame sequencing Physical addressing Error notification and error control Flow control Access control
  • 13. Token Ring Protocol: It is a LAN protocol defined in the IEEE 802.5. All the workstations are connected in a ring topology. A bit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time.
  • 14. Point-to-Point Protocol (PPP) : This is a full-duplex protocol that can be used on various physical media. It is meant for communication between two computers using a serial interface. Ex: a personal computer connected by phone line to a server It offers error detection mechanism.
  • 15. NETWORK LAYER It is the third layer of the protocol stack. Data at this layer is in the form of packets. This layer is mainly concerned with source to destination delivery of data packets via multiple networks. Routers operate at this layer. Some of the protocols which function at this layer are ARP, RIP, IP, ICMP, IGMP.
  • 16. Functions : Logical addressing Routing Packet fragmentation
  • 17. Routing Information Protocol (RIP) : RIP is a distance-vector protocol that uses hop (node) count as its metric. This protocol is widely used for traffic in the global internet. It sends routing-update messages at regular intervals and when the network topology changes.
  • 18. Address Resolution Protocol (ARP) : ARP is a network protocol which maps network layer protocol address to a data link hardware address. It is used when a host in a Ethernet network has to communicate with another host. ARP resolves IP address to corresponding Ethernet address.
  • 19. Transport layer It is the fourth layer of the Open Systems Interconnection (OSI) model. It is responsible for process-to-process delivery of the entire message. It encapsulates application data blocks into data units (data gram/segments). Various protocols under this layer include TCP, UDP, ECN, DCCP and so on.
  • 20. Functions of transport layer: Statistical multiplexing of data. Connection oriented communication. End-to-end reliable connection. Flow control.
  • 21. Protocols of Transport layer: 1. Explicit Congestion Notification (ECN) Delivers distinguished protocol segments from the source host to the destination host solely based on their addresses. Allows end-to-end notification of network congestion without dropping packets.
  • 22. 2. Datagram Congestion Control Protocol (DCCP) Provides reliable connection setup. Sends acknowledgements to sender about the segments sent. Useful for applications with timing constraints on the delivery of data.
  • 23. Session layer It is the fifth layer of the Open Systems Interconnection (OSI) model. It establishes, maintains and synchronizes interaction among communicating systems. Used in application environments that make use of remote procedure calls (RPC). Various protocols under this layer include PAP, PPTP, RPC, ZIP and so on.
  • 24. Functions of Session layer: Dialog control. Authentication/permission. Synchronization.
  • 25. Protocols of Session layer: Password Authentication Protocol (PAP) Authenticates a user to a network access server. Server sends acknowledgement based on credentials. It is used by point to point protocol.
  • 26. Point-to-Point Tunneling Protocol (PPTP) Implements virtual private networks. It does not provide confidentiality and encryption.
  • 27. Presentation layer It is the sixth layer of the Open Systems Interconnection (OSI) model. It is concerned with the syntax and semantics of the information exchanged between two systems. It is composed of two sub layers: CASE (Common Application Service Element) SASE (Specific Application Service Element) Various protocols of this layer include AFP, NCP, RDP, XDR.
  • 28. Functions of Presentation layer: Translation Encryption Compression
  • 29. Protocols of presentation layer: Remote Desktop Protocol (RDP) It is a proprietary protocol developed by Microsoft. It is also a communications protocol. Provides a user with a graphical interface to another computer.
  • 30. NetWare Core Protocol (NCP) It is usually associated with the NetWare operating systems. It is used to access files, directories and clock synchronization.
  • 31. Application Layer: Enables the application to access the network. Services provided by the application layer includes: Network Virtual Terminal: A network virtual terminal is a software version of a physical terminal and allows the user to log on to a remote host. File transfer, access and management (FTAM): This application allows user to Access, Retrieve and Manage files in a remote computer. Mail services: Facilitates email forwarding and storage. Directory Services: This application provides distributed database sources and access for global information about various objects and services. Examples for protocols in this layer: HTTP(Hyper Text Transfer Protocol), FTP(File transfer Protocol), BOOTP(Bootstrap protocol), SSH(Secure Shell), SLP(Service Location Protocol) etc.
  • 32. Hypertext Transfer Protocol (HTTP): It is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web. User Agent: Using a web browser, spider, or other end-user tool Origin Server: Which stores or creates resources such as HTML files and images Implementation: Implemented on top of any other protocol on the Internet, or on other networks Bootstrap Protocol, or BOOTP: It is a network protocol used by a network client to obtain an IP address from a configuration server BOOTP has also been used for Unix-like diskless workstations to obtain the network location of their boot image in addition to an IP address, and also by enterprises to roll out a pre-configured client (e.g., Windows) installation to newly installed PCs Bootstrapping: Use of another device on the network to become an active IP hosts.
  • 33. File Transfer Protocol (FTP): is the simplest way to exchange files between computers on the Internet Architecture: It is a standard network protocol used to exchange and manipulate files over an Internet Protocol computer network. It built on a client-server architecture and it utilizes separate control and data connections between the client and server applications. FTP can be used with user-based password authentication or with anonymous user access. Use: FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet, used to download programs and other files to your computer from other servers. You can also update (delete, rename, move, and copy) files at a server.
  • 34. Physical Address (MAC Address): Usually encodes the manufacturer’s registered identification number Formulating a MAC Address: MAC -48 EUI -48 EUI -64 Finding MAC Address for WINDOWS: Start Menu – Run – Type ‘cmd’- Enter – Type ‘Ipconfig /all’(If WINDOWS XP type ‘getmac’) Finding MAC Address for LINUX: Use the ‘ifconfig’ command - /bin or /sbin directories.
  • 35. IP Address: In a computer network utilizing the Internet Protocol for communication between its nodes Versions: IPV4: Uses 32-bit (4-byte) addresses, limits the address space to 4,294,967,296 (232) possible unique addresses. Each part represents 8bits of the address, hence called Octet. It may be presented in hexadecimal, octal, or binary representations Example of an IPv4 address: 208.77.188.166 IPV6: Due to rapid exhaustion of IPV4 address space, prompted the IETF to expand Internet’s addressing capability. Increased address size to 16 Octets. Opportunity to separate the addressing infrastructure of a Network segment. No need to have a complex address conservation methods as used in classless inter-domain routing (CIDR). Example of an IPv6 address: 2001:0db8:85a3:08d3:1319:8a2e:0370:7334
  • 36. IP Address of WINDOWS based Operating System: Start – Run – Type “cmd” or “Command” – Press Enter/OK. An MS DOS window will open. You are now ready to send a command to your Computer. Type "netstat -n" – Press Enter List of all your active connections and IP numbers. You will see 4 fields with 4 columns with all the IP details of sites or the people whom you are connected. Type "netstat -nab" and you can see the programming details. Type Start – Run – cmd – Ipconfig, shows masked IP and IP.
  • 37. IP Address of LINUX based Operating System Use the command “ifconfig”. Used at boot time to set up interfaces as necessary. It displays Ethernet IP address, Mac address, subnet mask and other information Type /sbin /ipconfig command to display IP address: $ /sbin/ifconfig
  • 38. Differences between MAC and IP Address: MAC Type of a number for network devices like Assigned at the time hardware is manufactured Hardware address Hexadecimal string of numbers and letters IP Address: It uniquely identifies computers on the Internet, or on a local intranet As part of connection to a network. It is not fixed Software address It is assigned by the router every time it gets connected to the network
  • 39. Apple Talk: Proprietary suite of protocols. The AppleTalk Link Access Protocol (ALAP) AppleTalk's address header Sockets Transport Layer AppleTalk names consist of three fields: (Object Name, Type Name and Zone Name. The Echo Protocol (EP) Specifications for ADSP (Apple Talk Data Stream Protocol) Apple Talk Session Protocol (ASP) Apple Talk Filing Protocol (AFP) – Specifications
  • 40. Apple Talk Protocols: Apple Computers developed the AppleTalk protocol suite to communicate among Apple systems using the Local Talk interface. The Apple Talk Protocol suite includes the following protocols:   AARP: AppleTalk Address Resolution Protocol DDP: Datagram Delivery Protocol RTMP: Routing Table Maintenance Protocol AEP: AppleTalk Echo Protocol ATP: AppleTalk Transaction Protocol NBP: Name-Binding Protocol ZIP: Zone Information Protocol ASP: AppleTalk Session Protocol PAP: Printer Access Protocol ADSP: AppleTalk Data Stream Protocol AFP: AppleTalk Filing Protocol
  • 41. How to check IP Address on an Apple System: Apple Computer running Mac OSX - Apple logo on the top left of the screen - System Preferences - Internet and Network - Network -– Drop down menu. In case of Ethernet – Select "Built In Ethernet" – if Wireless (select “Airport). Select "TCP/IP" on the "Network" screen. Your IP Address will be shown here.
  • 43.
  • 45.
  • 46. Tools1. Ethereal2. Multiple Interface Watcher
  • 47. Conclusion1. Basic concepts2. Description of OSI model3. Addressing4. Analogy5. Demonstration of the tools