SlideShare a Scribd company logo
1 of 38
Rift valley university laga xafo campus
Department of information technology ITNS
Level III
unit of competence install and manage network protocols
By Teshome G.
Email:- teshomegutema084@gmail.com
At the end of this module the trianee will able to know:-
• basic concept of protocol
• network protocol and their function
• how protocol is work
• protocols and port number
• purpose of network protocol
• HTTP,HTTPS,FTP,IP,ICMP,POP3 and etc
By Tshome G.
2
LO1 INTRODUCTION TO NETWORK PROTOCOL
basic concept of network protocol
By Tshome G. 3
• A network protocol is an established set of
rules that determine how data is
transmitted between different devices in the
same network.
• Essentially, it allows connected devices to
communicate with each other, regardless of
any differences in their internal processes,
structure or design.
LO1 INTRODUCTION TO NETWORK PROTOCOL
CONT...
By Tshome G. 4
• a protocol is a standardized set of rules for formatting and
processing data. Protocols enable computers to communicate
with one another.
• Network protocols are a set of rules, conventions, and data
structures that dictate how devices exchange data across
networks.
• Network Protocols are a set of rules governing exchange of
information in an easy, reliable and secure way.
• In order for two computers to talk to each other, they must be
speaking the same language.
List of Network Protocols
By Tshome
G.
5
• There are thousands of different network
protocols, but they all perform one of three
primary actions:
– Communication
– Network Management
– Security
Communication
• Communication protocols allow different network devices to communicate with
each other. They are used in both analog and digital communications and can be
used for important processes, ranging from transferring files between devices to
accessing the internet.
• Common types of communication protocols include the following:
• Automation: These protocols are used to automate different processes in both
commercial and personal settings, such as in smart buildings, cloud technology or
self-driving vehicles.
• Instant messaging: Instantaneous, text-based communications on smartphones and
computers occur because of a number of different instant messaging network
protocols.
• Routing: Routing protocols permit communication between routers and other
network devices. There are also routing protocols specifically for ad hoc networks.
• Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and
computers — work due to a variety of different Bluetooth protocols.
• File transfer: If you have ever moved files from one device to another, either via a
physical or digital medium, you’ve used file transfer protocols (FTP).
• Internet Protocol: Internet Protocob
ly(I
ja
P
le
)to
alS
lo
. ws data to be sent between devices via
6
the internet. The internet could not operate as it currently does without IP.
By Tshome
G.
Network management
By Tshome
G.
7
• protocols define and describe the various procedures needed to effectively
operate a computer network. These protocols affect various devices on a
single network — including computers, routers and servers — to ensure
each one, and the network as a whole, perform optimally.
• The functions of network management protocols include the following:
• Connection: These protocols establish and maintain stable connections
between different devices on the same network.
• Link aggregation: Link aggregation protocols allow you to combine
multiple network connections into one link between two devices. This
works to increase the strength of the connection and helps sustain the
connection should one of the links fail.
• Troubleshooting: Troubleshooting protocols allow network administrators
to identify errors affecting the network, evaluate the quality of the network
connection, and determine how administrators can fix any issues.
Security
By Tshome
G.
8
• Security protocols, also called cryptographic protocols, work to
ensure that the network and the data sent over it are protected from
unauthorized users.
• Common functions of security network protocols include the
following:
• Encryption: Encryption protocols protect data and secure areas by
requiring users to input a secret key or password in order to access
that information.
• EntityAuthentication: Entity authentication protocols create a
system that requires different devices or users on a network to verify
their identity before accessing secure areas.
• Transportation: Transportation security protocols protect data
while it is transported from one network device to another.
Here are a few examples of the most commonly used network
protocols:
• Hypertext Transfer Protocol (HTTP): This Internet Protocol
defines how data is transmitted over the internet and
determines how web servers and browsers should respond to
commands. This protocol (or its secure counterpart, HTTPS)
appears at the beginning of various URLs or web addresses
online.
• Secure Socket Shell (SSH): This protocol provides secure
access to a computer, even if it’s on an unsecured network.
SSH is particularly useful for network administrators who
need to manage different systems remotely.
• Short Message Service (SMS): This communications
protocol was created to send and receive text messages over
cellular networks. SMS refers exclusively to text-based
messages. Pictures, videosboyrj
a
l
oe
t
to
hS
e.
r media require Multimedia 9
Messaging Service (MMS), an extension of the SMS protocol.
By Tshome
G.
Cont…
By Tshome
G.
• Protocols
• Protocols are a fundamental aspect of digital
communication as they dictate how to format, transmit
and receive data. They are a set of rules that determines
how the data will be transmitted over the network.
• It can also be defined as a communication standard
followed by the two key parties(sender and receiver) in
a computer network to communicate with each other.
• It specifies what type of data can be transmitted, what
commands are used to send and receive data, and how
data transfers are confirmed.
How to implement network protocols
By Tshome
G.
• In order for network protocols to work, they must be coded within
software -- either as part of the computer's operating system (OS) or
as an application -- or implemented within the computer's hardware.
Most modern OSes possess built-in software services that are
prepared to implement some network protocols. Other applications,
such as web browsers, are designed with software libraries that
support the protocols necessary for the application to function. In
addition, TCP/IP and routing protocol support is implemented in
direct hardware for enhanced performance.
• Whenever a new protocol is implemented, it is added to the protocol
suite. The organization of protocol suites is considered to be
monolithic since all protocols are stored in the same address and
build on top of one another.
Levels of a Protocol
By Tshome
G.
• There are mainly three levels of a protocol, they are as
follows:
• Hardware Level: In this level, the protocol enables the
hardware devices to connect and communicate with
each other for various purposes.
• Software Level: In the software level, the protocol
enables different software to connect and communicate
with each other to work collaboratively.
• Application Level: In this level, the protocol enables
the application programs to connect and communicate
with each other for various purposes.
Types of Protocols
By Tshome
G.
• Protocols can be broadly divided into the
following two types:
– Standard Protocols
– Proprietary Protocols
Standard Protocols
By Tshome
G.
• A standard protocol is a mandated protocol for all
devices. It supports multiple devices and acts as a
standard.
• Standard protocols are not vendor-specific i.e.
they are not specific to a particular company or
organization. They are developed by a group of
experts from different organizations .
• These protocols are publicly available, and we
need not pay for them.
• Some of the examples of Standard Protocols
are FTP, DNS, DHCP, SMTP, TELNET, TFTP, etc.
Proprietary Protocols
By Tshome
G.
• Proprietary protocols are developed by an
individual organization for their specific
devices. We have to take permission from the
organization if we want to use their protocols.
• It is not a standard protocol and it supports
only specific devices. We may have to pay for
these protocols.
• Some of the examples of Proprietary Protocols
are IMessage, Apple Talk, etc.
Key Elements of protocols
By Tshome
G.
• The key elements of the protocol determine
what to be communicated, how it is
communicated, and when it is communicated.
• There are mainly three key elements of a
protocol, they are as follows:
– Syntax
– Semantics
– Timing
Syntax
By Tshome
G.
• Syntax refers to the structure or format of data and
signal levels. It indicates how to read the data in the
form of bits or fields. It also decides the order in which
the data is presented to the receiver.
• Example: A protocol might expect that the size of a
data packet will be 16 bits. In which, the first 4 bits are
the sender’s address, the next 4 bits are the receiver’s
address, the next 4 bits are the check-sum bits, and the
last 4 bits will contain the message. So, every
communication that is following that protocol should
send 16-bit data.
Semantics
By Tshome
G.
• Semantics refers to the interpretation or meaning
of each section of bits or fields. It specifies which
field defines what action. It defines how a
particular section of bits or pattern can be
interpreted, and what action needs to be taken. It
includes control information for coordination and
error handling.
• Example: It interprets whether the bits of address
identify the route to be taken or the final
destination of the message or something else.
Timing
By Tshome
G.
• Timing refers to two characteristics:
– when the data should be sent?
– what will be the speed of sending and receiving the data?
• It performs speed matching, sequencing and flow
control of the data items.
• Example: Asender can send the data at a speed of 100
Mbps, but the receiver can consume it only at a speed
of 20 Mbps, then there may be data losses or the
packets might get dropped. So, proper synchronization
must be there between a sender and a receiver.
Functions of protocols
By Tshome
G.
• The Following are the main functionalities of a
protocol:
• Data Sequencing: It mainly refers to dive data into
packets i.e. it divided the whole data into some packets.
• Data Flow: It mainly deals with sending data to the
correct destination i.e. the flow of the data is correct or
not.
• Data Routing: It refers to select the best path for data
transmission between a sender and a receiver because
there can be many routes from sender to receiver and
you should select the best possible route.
Cont…
By Tshome
G.
• Encapsulation: It refers to the process of taking one
protocol and transferring it to some other another
protocol.
• Segmentation & Reassembly: It deals with
segmenting the data message i.e. diving the data into
packets when data flows from the upper protocol layer
to lower, and reassembly is vice-versa of segmentation
i.e. all the segmented packets are recollected in the
correct order at the receiver side.
• Connection Control: It ensures connection oriented
data transfer for lengthy data items.
cont...
By Tshome
G.
• Multiplexing: It allows combining multiple transmission unit
signals or channels of higher-level protocols in one transmission unit
of a lower-level protocol. Multiplexing can be upward or downward.
• Ordered Delivery: Protocol facilitates ordered delivery of data, by
providing a unique sequence number to each data packet. It is the
function of the sender to maintain ordered delivery. By doing so, the
receiver will receive the data in the same order as sent by the sender.
• Transmission Services: It mainly deals with priority, Quality of
Service (QoS), and security of data packets.
• Addressing: It mainly deals with addressing levels, addressing
scope, communication identifiers, and addressing modes.
• Flow Control: It facilitates to limit the flow of data. It is the
function of the receiver's end to maintain flow control of data.
cont...
• Error Control: It deals with error
detection (using the checksum bits) and
its control. If any error is detected during
the transmission of the data, a request for
retransmission of data is sent to the
sender by the receiver, and the corrupt
data packet is discarded.
By Tshome
G.
There are various types of protocols that support a major and compassionate
role in communicating with different devices across the network. These are:
• Transmission Control Protocol (TCP)
• Internet Protocol (IP)
• User Datagram Protocol (UDP)
• Post office Protocol (POP)
• Simple mail transport Protocol (SMTP)
• File Transfer Protocol (FTP)
• Hyper Text Transfer Protocol (HTTP)
• Hyper Text Transfer Protocol Secure (HTTPS)
• Telnet
• Gopher
• NAT
By Tshome
G.
Cont…
By Tshome
G.
• Transmission Control Protocol (TCP): TCP is a popular
communication protocol which is used for communicating
over a network. It divides any message into series of packets
that are sent from source to destination and there it gets
reassembled at the destination.
• Internet Protocol (IP): An IP is an internet protocol address.
Essentially, it is a numeric value assigned to a network device,
and it is used for the identification and location of a network
device. IP addresses are assigned to every type of network
device.
• IP is designed explicitly as addressing protocol. It is mostly
used with TCP. The IP addresses in packets help in routing
them through different nodes in a network until it reaches the
destination system.
• TCP/IP is the most popular protocol connecting the networks.
Cont..
By Tshome
G.
• User Datagram Protocol (UDP): UDP is a substitute
communication protocol to Transmission Control
Protocol implemented primarily for creating loss-
tolerating and low-latency linking between different
applications.
• Post office Protocol (POP): POP3 is designed for
receiving incoming E-mails.
• Simple mail transport Protocol (SMTP): SMTP is
designed to send and distribute outgoing E-Mail.
• File Transfer Protocol (FTP): FTP allows users to
transfer files from one machine to another. Types of
files may include program files, multimedia files, text
files, and documents, etc.
Cont…
By Tshome
G.
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a
hypertext among two or more systems. HTML tags are used for creating links.
These links may be in any form like text or images.
– HTTP is designed on Client-server principles which allow a client system for
establishing a connection with the server machine for making a request.
– The server acknowledges the request initiated by the client and responds
accordingly.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as
Hyper Text Transfer Protocol Secure is a standard protocol to secure the
communication among two computers one using the browser and other fetching
data from web server.
– HTTP is used for transferring data between the client browser (request) and the web
server (response) in the hypertext format, same in case of HTTPS except that the
transferring of data is done in an encrypted format.
– So it can be said that https thwart hackers from interpretation or modification of
data throughout the transfer of packets.
Cont…
By Tshome
G.
• Telnet: Telnet is a set of rules designed for
connecting one system with another. The
connecting process here is termed as remote
login.
– The system which requests for connection is the local
computer, and the system which accepts the
connection is the remote computer.
• Gopher: Gopher is a collection of rules
implemented for searching, retrieving as well as
displaying documents from isolated sites.
– Gopher also works on the client/server principle.
cont...
By Tshome
G.
• NAT (network adress translation)is a
method that enables hosts on private networks
to communicate with hosts on the Internet
• NAT is run on routers that connect private
networks to the public Internet, to replace the
IP address-port pair of an IP packet with
another IP address-port pair.
Cont…
• some other popular protocols act as co-functioning protocols
associated with these primary protocols for core functioning.
These are:
• ARP (Address Resolution Protocol)
• DHCP (Dynamic Host Configuration Protocol)
• IMAP4 (Internet MessageAccess Protocol)
• SIP (Session Initiation Protocol)
• RTP (Real-Time Transport Protocol)
• RLP (Resource Location Protocol)
• RAP (RouteAccess Protocol)
• L2TP (Layer Two Tunneling Protocol)
• PPTP (Point To Point Tunneling Protocol)
• SNMP (Simple Network M
by
aj
n
al
a
et
g
o
e
S
m
.
ent Protocol)
30
By Tshome
G.
cont...
By Tshome
G.
• ARP(Address Resolution Protocol)
– is a procedure for mapping a dynamic IP address to a permanent physical
machine address in a local area network (LAN). Or IP into MAC
• (RARP) ReverseAddress Resolution Protocol is a protocol a
physical machine in a local area network (LAN) can use to request
its IP address.
– It does this by sending the device's physical address to a specialized RARP
server that is on the same LAN and is actively listening for RARP requests.
• DHCP(Dynamic Host Configuration Protocol)
– dynamic Host Configuration Protocol (DHCP) is a client/server protocol
that automatically provides an Internet Protocol (IP) host with its IP
address and other related configuration information such as the subnet
mask and default gateway.
• NetBIOS (Network Basic Input/Output System) is a network
service that enables applications on different computers to
communicate with each other
Cont..
By Tshome
G.
• IRC (Internet Relay Chat) is a protocol
for real-time text messaging between internet-
connected computers created in 1988.
• It is mainly used for group discussion in chat
rooms called “channels” although it supports
private messages between two users, data
transfer, and various server-side and client-side
commands.
Border Gateway Protocol (BGP)
By Tshome
G.
• BGP:- version 4 is widely used on the public internet
and by Internet Service Providers (ISP) to maintain
very large routing tables and traffic processing. BGP
is one of the few protocols that have been designed to
deal with the astronomically large routing tables that
must exist on the public Internet.
• User Datagram Protocol (UDP) is a Transport Layer
protocol. UDP is a part of the Internet Protocol suite,
referred to as UDP/IP suite. Unlike TCP, it is
an unreliable and connectionless protocol.
• RDP:-
– It enables you to establish a connection with a remote
computer.
SSL
• The Secure Sockets Layer (SSL) protocol was
developed by Netscape Communications
Corporation.
• SSL ensures the data that is transferred
between a client and a server remains private.
This protocol enables the client to authenticate
the identity of the server
By Tshome
G.
What is protocol port
• A port in networking is a software-defined
number associated to a network protocol that
receives or transmits communication for a
specific service.
• A port in computer hardware is a jack or
socket that peripheral hardware plugs into
By Tshome
G.
Some protocols within their ports
Protocol service name Port
numbers
File Transfer Protocol (FTP 20 and 21
Secure Shell (SSH) 22
Telnet 23
Simple Mail Transfer Protocol
(SMTP)
25
Domain Name System (DNS) 53
Trivial File Transfer Protocol
(TFTP)
69
Dynamic Host Configuration
Protocol (DHCP)
67 and 68
IRC by jaleto S. 194
By Tshome
G.
cont...
By Tshome
G.
Protocol service name Port numbers
HTTPS 443
POP3 110
Network Time Protocol (NTP) 123
NetBIOS 137/138/139
Internet Message Access Protocol
(IMAP)
143
THE END OF LO1
ANY QUESTION
By Tshome
G.

More Related Content

Similar to installandmanagenetworkprotocols.pptx

IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdfaravlitraders2012
 
Tssn ppt(en.39) data netwok standards
Tssn ppt(en.39) data netwok standardsTssn ppt(en.39) data netwok standards
Tssn ppt(en.39) data netwok standardsDharit Unadkat
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxManasaPM3
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slideAbhishek Kesharwani
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommercepreetikapri1
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Communication Protocol - Arindam Samanta
Communication Protocol - Arindam SamantaCommunication Protocol - Arindam Samanta
Communication Protocol - Arindam Samantasankhadeep
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxPoojaBahirat1
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docxkndnewguade
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaSDr. Shivashankar
 

Similar to installandmanagenetworkprotocols.pptx (20)

IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Ferro
FerroFerro
Ferro
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf1) Protocols are needed so your computer can interact with other com.pdf
1) Protocols are needed so your computer can interact with other com.pdf
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
2_iot.pptx
2_iot.pptx2_iot.pptx
2_iot.pptx
 
Tssn ppt(en.39) data netwok standards
Tssn ppt(en.39) data netwok standardsTssn ppt(en.39) data netwok standards
Tssn ppt(en.39) data netwok standards
 
Giuzio angela
Giuzio angelaGiuzio angela
Giuzio angela
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
Network architecture (protocols) by lanz lowen jay o. bognot
Network architecture (protocols) by lanz lowen jay o. bognotNetwork architecture (protocols) by lanz lowen jay o. bognot
Network architecture (protocols) by lanz lowen jay o. bognot
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Communication Protocol - Arindam Samanta
Communication Protocol - Arindam SamantaCommunication Protocol - Arindam Samanta
Communication Protocol - Arindam Samanta
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 

More from Teshome48

Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxChapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxTeshome48
 
Chapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptChapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptTeshome48
 
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptChapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptTeshome48
 
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxChapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxTeshome48
 
Chapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxChapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxTeshome48
 
Chapter 2 Globalization.pptx
Chapter 2 Globalization.pptxChapter 2 Globalization.pptx
Chapter 2 Globalization.pptxTeshome48
 
Research Methodology(1).pptx
Research Methodology(1).pptxResearch Methodology(1).pptx
Research Methodology(1).pptxTeshome48
 
Entrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxEntrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxTeshome48
 
QA CHAPTER I.pptx
QA CHAPTER I.pptxQA CHAPTER I.pptx
QA CHAPTER I.pptxTeshome48
 
Operations Management PPT RVU 2022.ppt
Operations Management  PPT RVU   2022.pptOperations Management  PPT RVU   2022.ppt
Operations Management PPT RVU 2022.pptTeshome48
 
Zelalem final power point..pptx
Zelalem final power point..pptxZelalem final power point..pptx
Zelalem final power point..pptxTeshome48
 
QA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfQA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfTeshome48
 
is chap 6.pptx
is chap 6.pptxis chap 6.pptx
is chap 6.pptxTeshome48
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.pptTeshome48
 
Chapter 2Management Theories.ppt
Chapter 2Management Theories.pptChapter 2Management Theories.ppt
Chapter 2Management Theories.pptTeshome48
 
journal.docx
journal.docxjournal.docx
journal.docxTeshome48
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docxTeshome48
 
fra'ool ass.pptx
fra'ool ass.pptxfra'ool ass.pptx
fra'ool ass.pptxTeshome48
 
ababa pre.pptx
ababa pre.pptxababa pre.pptx
ababa pre.pptxTeshome48
 
The Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptxThe Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptxTeshome48
 

More from Teshome48 (20)

Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxChapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
 
Chapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptChapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.ppt
 
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptChapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.ppt
 
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxChapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
 
Chapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxChapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptx
 
Chapter 2 Globalization.pptx
Chapter 2 Globalization.pptxChapter 2 Globalization.pptx
Chapter 2 Globalization.pptx
 
Research Methodology(1).pptx
Research Methodology(1).pptxResearch Methodology(1).pptx
Research Methodology(1).pptx
 
Entrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxEntrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptx
 
QA CHAPTER I.pptx
QA CHAPTER I.pptxQA CHAPTER I.pptx
QA CHAPTER I.pptx
 
Operations Management PPT RVU 2022.ppt
Operations Management  PPT RVU   2022.pptOperations Management  PPT RVU   2022.ppt
Operations Management PPT RVU 2022.ppt
 
Zelalem final power point..pptx
Zelalem final power point..pptxZelalem final power point..pptx
Zelalem final power point..pptx
 
QA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfQA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdf
 
is chap 6.pptx
is chap 6.pptxis chap 6.pptx
is chap 6.pptx
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
Chapter 2Management Theories.ppt
Chapter 2Management Theories.pptChapter 2Management Theories.ppt
Chapter 2Management Theories.ppt
 
journal.docx
journal.docxjournal.docx
journal.docx
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docx
 
fra'ool ass.pptx
fra'ool ass.pptxfra'ool ass.pptx
fra'ool ass.pptx
 
ababa pre.pptx
ababa pre.pptxababa pre.pptx
ababa pre.pptx
 
The Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptxThe Staffing Function_Yohannes.pptx
The Staffing Function_Yohannes.pptx
 

Recently uploaded

GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Recently uploaded (20)

GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

installandmanagenetworkprotocols.pptx

  • 1. Rift valley university laga xafo campus Department of information technology ITNS Level III unit of competence install and manage network protocols By Teshome G. Email:- teshomegutema084@gmail.com
  • 2. At the end of this module the trianee will able to know:- • basic concept of protocol • network protocol and their function • how protocol is work • protocols and port number • purpose of network protocol • HTTP,HTTPS,FTP,IP,ICMP,POP3 and etc By Tshome G. 2 LO1 INTRODUCTION TO NETWORK PROTOCOL
  • 3. basic concept of network protocol By Tshome G. 3 • A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. • Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. LO1 INTRODUCTION TO NETWORK PROTOCOL
  • 4. CONT... By Tshome G. 4 • a protocol is a standardized set of rules for formatting and processing data. Protocols enable computers to communicate with one another. • Network protocols are a set of rules, conventions, and data structures that dictate how devices exchange data across networks. • Network Protocols are a set of rules governing exchange of information in an easy, reliable and secure way. • In order for two computers to talk to each other, they must be speaking the same language.
  • 5. List of Network Protocols By Tshome G. 5 • There are thousands of different network protocols, but they all perform one of three primary actions: – Communication – Network Management – Security
  • 6. Communication • Communication protocols allow different network devices to communicate with each other. They are used in both analog and digital communications and can be used for important processes, ranging from transferring files between devices to accessing the internet. • Common types of communication protocols include the following: • Automation: These protocols are used to automate different processes in both commercial and personal settings, such as in smart buildings, cloud technology or self-driving vehicles. • Instant messaging: Instantaneous, text-based communications on smartphones and computers occur because of a number of different instant messaging network protocols. • Routing: Routing protocols permit communication between routers and other network devices. There are also routing protocols specifically for ad hoc networks. • Bluetooth: Ever-popular Bluetooth devices — including headsets, smartphones and computers — work due to a variety of different Bluetooth protocols. • File transfer: If you have ever moved files from one device to another, either via a physical or digital medium, you’ve used file transfer protocols (FTP). • Internet Protocol: Internet Protocob ly(I ja P le )to alS lo . ws data to be sent between devices via 6 the internet. The internet could not operate as it currently does without IP. By Tshome G.
  • 7. Network management By Tshome G. 7 • protocols define and describe the various procedures needed to effectively operate a computer network. These protocols affect various devices on a single network — including computers, routers and servers — to ensure each one, and the network as a whole, perform optimally. • The functions of network management protocols include the following: • Connection: These protocols establish and maintain stable connections between different devices on the same network. • Link aggregation: Link aggregation protocols allow you to combine multiple network connections into one link between two devices. This works to increase the strength of the connection and helps sustain the connection should one of the links fail. • Troubleshooting: Troubleshooting protocols allow network administrators to identify errors affecting the network, evaluate the quality of the network connection, and determine how administrators can fix any issues.
  • 8. Security By Tshome G. 8 • Security protocols, also called cryptographic protocols, work to ensure that the network and the data sent over it are protected from unauthorized users. • Common functions of security network protocols include the following: • Encryption: Encryption protocols protect data and secure areas by requiring users to input a secret key or password in order to access that information. • EntityAuthentication: Entity authentication protocols create a system that requires different devices or users on a network to verify their identity before accessing secure areas. • Transportation: Transportation security protocols protect data while it is transported from one network device to another.
  • 9. Here are a few examples of the most commonly used network protocols: • Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is transmitted over the internet and determines how web servers and browsers should respond to commands. This protocol (or its secure counterpart, HTTPS) appears at the beginning of various URLs or web addresses online. • Secure Socket Shell (SSH): This protocol provides secure access to a computer, even if it’s on an unsecured network. SSH is particularly useful for network administrators who need to manage different systems remotely. • Short Message Service (SMS): This communications protocol was created to send and receive text messages over cellular networks. SMS refers exclusively to text-based messages. Pictures, videosboyrj a l oe t to hS e. r media require Multimedia 9 Messaging Service (MMS), an extension of the SMS protocol. By Tshome G.
  • 10. Cont… By Tshome G. • Protocols • Protocols are a fundamental aspect of digital communication as they dictate how to format, transmit and receive data. They are a set of rules that determines how the data will be transmitted over the network. • It can also be defined as a communication standard followed by the two key parties(sender and receiver) in a computer network to communicate with each other. • It specifies what type of data can be transmitted, what commands are used to send and receive data, and how data transfers are confirmed.
  • 11. How to implement network protocols By Tshome G. • In order for network protocols to work, they must be coded within software -- either as part of the computer's operating system (OS) or as an application -- or implemented within the computer's hardware. Most modern OSes possess built-in software services that are prepared to implement some network protocols. Other applications, such as web browsers, are designed with software libraries that support the protocols necessary for the application to function. In addition, TCP/IP and routing protocol support is implemented in direct hardware for enhanced performance. • Whenever a new protocol is implemented, it is added to the protocol suite. The organization of protocol suites is considered to be monolithic since all protocols are stored in the same address and build on top of one another.
  • 12. Levels of a Protocol By Tshome G. • There are mainly three levels of a protocol, they are as follows: • Hardware Level: In this level, the protocol enables the hardware devices to connect and communicate with each other for various purposes. • Software Level: In the software level, the protocol enables different software to connect and communicate with each other to work collaboratively. • Application Level: In this level, the protocol enables the application programs to connect and communicate with each other for various purposes.
  • 13. Types of Protocols By Tshome G. • Protocols can be broadly divided into the following two types: – Standard Protocols – Proprietary Protocols
  • 14. Standard Protocols By Tshome G. • A standard protocol is a mandated protocol for all devices. It supports multiple devices and acts as a standard. • Standard protocols are not vendor-specific i.e. they are not specific to a particular company or organization. They are developed by a group of experts from different organizations . • These protocols are publicly available, and we need not pay for them. • Some of the examples of Standard Protocols are FTP, DNS, DHCP, SMTP, TELNET, TFTP, etc.
  • 15. Proprietary Protocols By Tshome G. • Proprietary protocols are developed by an individual organization for their specific devices. We have to take permission from the organization if we want to use their protocols. • It is not a standard protocol and it supports only specific devices. We may have to pay for these protocols. • Some of the examples of Proprietary Protocols are IMessage, Apple Talk, etc.
  • 16. Key Elements of protocols By Tshome G. • The key elements of the protocol determine what to be communicated, how it is communicated, and when it is communicated. • There are mainly three key elements of a protocol, they are as follows: – Syntax – Semantics – Timing
  • 17. Syntax By Tshome G. • Syntax refers to the structure or format of data and signal levels. It indicates how to read the data in the form of bits or fields. It also decides the order in which the data is presented to the receiver. • Example: A protocol might expect that the size of a data packet will be 16 bits. In which, the first 4 bits are the sender’s address, the next 4 bits are the receiver’s address, the next 4 bits are the check-sum bits, and the last 4 bits will contain the message. So, every communication that is following that protocol should send 16-bit data.
  • 18. Semantics By Tshome G. • Semantics refers to the interpretation or meaning of each section of bits or fields. It specifies which field defines what action. It defines how a particular section of bits or pattern can be interpreted, and what action needs to be taken. It includes control information for coordination and error handling. • Example: It interprets whether the bits of address identify the route to be taken or the final destination of the message or something else.
  • 19. Timing By Tshome G. • Timing refers to two characteristics: – when the data should be sent? – what will be the speed of sending and receiving the data? • It performs speed matching, sequencing and flow control of the data items. • Example: Asender can send the data at a speed of 100 Mbps, but the receiver can consume it only at a speed of 20 Mbps, then there may be data losses or the packets might get dropped. So, proper synchronization must be there between a sender and a receiver.
  • 20. Functions of protocols By Tshome G. • The Following are the main functionalities of a protocol: • Data Sequencing: It mainly refers to dive data into packets i.e. it divided the whole data into some packets. • Data Flow: It mainly deals with sending data to the correct destination i.e. the flow of the data is correct or not. • Data Routing: It refers to select the best path for data transmission between a sender and a receiver because there can be many routes from sender to receiver and you should select the best possible route.
  • 21. Cont… By Tshome G. • Encapsulation: It refers to the process of taking one protocol and transferring it to some other another protocol. • Segmentation & Reassembly: It deals with segmenting the data message i.e. diving the data into packets when data flows from the upper protocol layer to lower, and reassembly is vice-versa of segmentation i.e. all the segmented packets are recollected in the correct order at the receiver side. • Connection Control: It ensures connection oriented data transfer for lengthy data items.
  • 22. cont... By Tshome G. • Multiplexing: It allows combining multiple transmission unit signals or channels of higher-level protocols in one transmission unit of a lower-level protocol. Multiplexing can be upward or downward. • Ordered Delivery: Protocol facilitates ordered delivery of data, by providing a unique sequence number to each data packet. It is the function of the sender to maintain ordered delivery. By doing so, the receiver will receive the data in the same order as sent by the sender. • Transmission Services: It mainly deals with priority, Quality of Service (QoS), and security of data packets. • Addressing: It mainly deals with addressing levels, addressing scope, communication identifiers, and addressing modes. • Flow Control: It facilitates to limit the flow of data. It is the function of the receiver's end to maintain flow control of data.
  • 23. cont... • Error Control: It deals with error detection (using the checksum bits) and its control. If any error is detected during the transmission of the data, a request for retransmission of data is sent to the sender by the receiver, and the corrupt data packet is discarded. By Tshome G.
  • 24. There are various types of protocols that support a major and compassionate role in communicating with different devices across the network. These are: • Transmission Control Protocol (TCP) • Internet Protocol (IP) • User Datagram Protocol (UDP) • Post office Protocol (POP) • Simple mail transport Protocol (SMTP) • File Transfer Protocol (FTP) • Hyper Text Transfer Protocol (HTTP) • Hyper Text Transfer Protocol Secure (HTTPS) • Telnet • Gopher • NAT By Tshome G.
  • 25. Cont… By Tshome G. • Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. It divides any message into series of packets that are sent from source to destination and there it gets reassembled at the destination. • Internet Protocol (IP): An IP is an internet protocol address. Essentially, it is a numeric value assigned to a network device, and it is used for the identification and location of a network device. IP addresses are assigned to every type of network device. • IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP addresses in packets help in routing them through different nodes in a network until it reaches the destination system. • TCP/IP is the most popular protocol connecting the networks.
  • 26. Cont.. By Tshome G. • User Datagram Protocol (UDP): UDP is a substitute communication protocol to Transmission Control Protocol implemented primarily for creating loss- tolerating and low-latency linking between different applications. • Post office Protocol (POP): POP3 is designed for receiving incoming E-mails. • Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail. • File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc.
  • 27. Cont… By Tshome G. • Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. HTML tags are used for creating links. These links may be in any form like text or images. – HTTP is designed on Client-server principles which allow a client system for establishing a connection with the server machine for making a request. – The server acknowledges the request initiated by the client and responds accordingly. • Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. – HTTP is used for transferring data between the client browser (request) and the web server (response) in the hypertext format, same in case of HTTPS except that the transferring of data is done in an encrypted format. – So it can be said that https thwart hackers from interpretation or modification of data throughout the transfer of packets.
  • 28. Cont… By Tshome G. • Telnet: Telnet is a set of rules designed for connecting one system with another. The connecting process here is termed as remote login. – The system which requests for connection is the local computer, and the system which accepts the connection is the remote computer. • Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. – Gopher also works on the client/server principle.
  • 29. cont... By Tshome G. • NAT (network adress translation)is a method that enables hosts on private networks to communicate with hosts on the Internet • NAT is run on routers that connect private networks to the public Internet, to replace the IP address-port pair of an IP packet with another IP address-port pair.
  • 30. Cont… • some other popular protocols act as co-functioning protocols associated with these primary protocols for core functioning. These are: • ARP (Address Resolution Protocol) • DHCP (Dynamic Host Configuration Protocol) • IMAP4 (Internet MessageAccess Protocol) • SIP (Session Initiation Protocol) • RTP (Real-Time Transport Protocol) • RLP (Resource Location Protocol) • RAP (RouteAccess Protocol) • L2TP (Layer Two Tunneling Protocol) • PPTP (Point To Point Tunneling Protocol) • SNMP (Simple Network M by aj n al a et g o e S m . ent Protocol) 30 By Tshome G.
  • 31. cont... By Tshome G. • ARP(Address Resolution Protocol) – is a procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN). Or IP into MAC • (RARP) ReverseAddress Resolution Protocol is a protocol a physical machine in a local area network (LAN) can use to request its IP address. – It does this by sending the device's physical address to a specialized RARP server that is on the same LAN and is actively listening for RARP requests. • DHCP(Dynamic Host Configuration Protocol) – dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. • NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other
  • 32. Cont.. By Tshome G. • IRC (Internet Relay Chat) is a protocol for real-time text messaging between internet- connected computers created in 1988. • It is mainly used for group discussion in chat rooms called “channels” although it supports private messages between two users, data transfer, and various server-side and client-side commands.
  • 33. Border Gateway Protocol (BGP) By Tshome G. • BGP:- version 4 is widely used on the public internet and by Internet Service Providers (ISP) to maintain very large routing tables and traffic processing. BGP is one of the few protocols that have been designed to deal with the astronomically large routing tables that must exist on the public Internet. • User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. • RDP:- – It enables you to establish a connection with a remote computer.
  • 34. SSL • The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications Corporation. • SSL ensures the data that is transferred between a client and a server remains private. This protocol enables the client to authenticate the identity of the server By Tshome G.
  • 35. What is protocol port • A port in networking is a software-defined number associated to a network protocol that receives or transmits communication for a specific service. • A port in computer hardware is a jack or socket that peripheral hardware plugs into By Tshome G.
  • 36. Some protocols within their ports Protocol service name Port numbers File Transfer Protocol (FTP 20 and 21 Secure Shell (SSH) 22 Telnet 23 Simple Mail Transfer Protocol (SMTP) 25 Domain Name System (DNS) 53 Trivial File Transfer Protocol (TFTP) 69 Dynamic Host Configuration Protocol (DHCP) 67 and 68 IRC by jaleto S. 194 By Tshome G.
  • 37. cont... By Tshome G. Protocol service name Port numbers HTTPS 443 POP3 110 Network Time Protocol (NTP) 123 NetBIOS 137/138/139 Internet Message Access Protocol (IMAP) 143
  • 38. THE END OF LO1 ANY QUESTION By Tshome G.