SlideShare una empresa de Scribd logo
1 de 17
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
AppleTalk
Content
 Introduction
 Rules of Engagement
 Network Components
 Sockets
 Nodes
 Implications of the end of AppleTalk routing
 Security
 Advantages
 Disadvantages
 Conclusion
Introduction
 AppleTalk is a network operating system designed to
connect Apple computers. Its components are built on
Macintosh operating systems. There are two main
versions of AppleTalk depending on how many years in
the past the network was implemented, Phase 1 and
Phase 2.
Rules of Engagement
 AppleTalk networks make use of an addressing
scheme in which each computer
when it comes online.
 Looks for a stored address that it used in a
previous session.
 If one isn't available then it chooses an address
at random from those that are available .
 Then it broadcasts the address to make sure no
other computer is using it.
 If it is being used then it tries another .
Network Components
Sockets
 An AppleTalk socket is a unique, addressable location in
an AppleTalk node. It is the logical point at which upper-
layer AppleTalk software processes and the network
layer Datagram Delivery Protocol (DDP) interact.
Nodes
 An AppleTalk node is a device that is connected
to an AppleTalk network.
 This device might be a Macintosh computer, a
printer, an IBM PC, a router, or some other
similar device.
Networks
 It consists of a single logical cable and
multiple attached nodes.
 A single physical cable or multiple physical
cables interconnected by using bridges or
routers may be found.
Networks…
 Non extended Networks
It is a physical network segment that is assigned
only a single network number, which can range
between 1 and 1024.
 Extended Networks
Also known as a cable range. It is a physical
network segment that can be assigned multiple
network numbers.
Zones
 An AppleTalk zone is a logical group of nodes or
networks that is defined when the network
administrator configures the network.
 The nodes or networks need not be physically
contiguous to belong to the same AppleTalk
zone.
Implications of the end of
AppleTalk routing
 Legacy operating systems and devices that only support
AppleTalk should be replaced if at all possible. If they
cannot be replaced, they need to be placed on the RIT
network with forethought.
 As long as any two legacy AppleTalk devices are within
the same network segment, AppleTalk communications
between them will still work. However, after July 24,
2006, the addresses change because AppleTalk zones
will no longer be present.
 There will no longer be a way to use two AppleTalk-only
devices between campus buildings, and in many cases,
between hallways within buildings.
Security
 AppleTalk, like many network protocols, makes
no provisions for network security. The design of
the AppleTalk protocol architecture requires that
security measures be implemented at higher
application levels. Cisco supports AppleTalk
distribution lists, allowing control of routing
updates on a per-interface basis. This security
feature is similar to those that Cisco provides for
other protocols.
Advantages
 Apple automatically includes AppleTalk in
the Macintosh operating system.
 Easy to implement and configure
 Setting up a small workgroup is simple
and inexpensive
Disadvantages
 It is not suitable for very large networks
 It is very slow compared to other LAN
links at 230.4 Kbps
 It is unsuitable for bandwidth intensive
applications
Conclusion
AppleTalk includes an address-resolution
method much like TCP/IP's ARP. The
AppleTalk version is called AARP. AARP
uses broadcasts to discover the hardware
address of a node.
Reference
 www.google.com
 www.wikipedia.com
 www.oeclib.in
Thanks

Más contenido relacionado

La actualidad más candente

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 

La actualidad más candente (20)

Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
LI-FI Presentation
LI-FI  Presentation LI-FI  Presentation
LI-FI Presentation
 
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALAWIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Li-Fi Technology PPT
Li-Fi Technology PPT Li-Fi Technology PPT
Li-Fi Technology PPT
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 

Similar a Apple talk ppt

IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 
MathWork Network Architecture
MathWork Network ArchitectureMathWork Network Architecture
MathWork Network Architecture
Robert Muliero
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
Arumugam90
 

Similar a Apple talk ppt (20)

Apple%20Talk%20ppt[1].pptx
Apple%20Talk%20ppt[1].pptxApple%20Talk%20ppt[1].pptx
Apple%20Talk%20ppt[1].pptx
 
Apple talk-WPS Office.pptx
Apple talk-WPS Office.pptxApple talk-WPS Office.pptx
Apple talk-WPS Office.pptx
 
Ens
EnsEns
Ens
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Internet
InternetInternet
Internet
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptx
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
TCP/IP implementation in apple mac operating system.
TCP/IP implementation in apple mac operating system.TCP/IP implementation in apple mac operating system.
TCP/IP implementation in apple mac operating system.
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
MathWork Network Architecture
MathWork Network ArchitectureMathWork Network Architecture
MathWork Network Architecture
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 

Más de OECLIB Odisha Electronics Control Library

Más de OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Último (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Apple talk ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On AppleTalk
  • 2. Content  Introduction  Rules of Engagement  Network Components  Sockets  Nodes  Implications of the end of AppleTalk routing  Security  Advantages  Disadvantages  Conclusion
  • 3. Introduction  AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems. There are two main versions of AppleTalk depending on how many years in the past the network was implemented, Phase 1 and Phase 2.
  • 4. Rules of Engagement  AppleTalk networks make use of an addressing scheme in which each computer when it comes online.  Looks for a stored address that it used in a previous session.  If one isn't available then it chooses an address at random from those that are available .  Then it broadcasts the address to make sure no other computer is using it.  If it is being used then it tries another .
  • 6. Sockets  An AppleTalk socket is a unique, addressable location in an AppleTalk node. It is the logical point at which upper- layer AppleTalk software processes and the network layer Datagram Delivery Protocol (DDP) interact.
  • 7. Nodes  An AppleTalk node is a device that is connected to an AppleTalk network.  This device might be a Macintosh computer, a printer, an IBM PC, a router, or some other similar device.
  • 8. Networks  It consists of a single logical cable and multiple attached nodes.  A single physical cable or multiple physical cables interconnected by using bridges or routers may be found.
  • 9. Networks…  Non extended Networks It is a physical network segment that is assigned only a single network number, which can range between 1 and 1024.  Extended Networks Also known as a cable range. It is a physical network segment that can be assigned multiple network numbers.
  • 10. Zones  An AppleTalk zone is a logical group of nodes or networks that is defined when the network administrator configures the network.  The nodes or networks need not be physically contiguous to belong to the same AppleTalk zone.
  • 11. Implications of the end of AppleTalk routing  Legacy operating systems and devices that only support AppleTalk should be replaced if at all possible. If they cannot be replaced, they need to be placed on the RIT network with forethought.  As long as any two legacy AppleTalk devices are within the same network segment, AppleTalk communications between them will still work. However, after July 24, 2006, the addresses change because AppleTalk zones will no longer be present.  There will no longer be a way to use two AppleTalk-only devices between campus buildings, and in many cases, between hallways within buildings.
  • 12. Security  AppleTalk, like many network protocols, makes no provisions for network security. The design of the AppleTalk protocol architecture requires that security measures be implemented at higher application levels. Cisco supports AppleTalk distribution lists, allowing control of routing updates on a per-interface basis. This security feature is similar to those that Cisco provides for other protocols.
  • 13. Advantages  Apple automatically includes AppleTalk in the Macintosh operating system.  Easy to implement and configure  Setting up a small workgroup is simple and inexpensive
  • 14. Disadvantages  It is not suitable for very large networks  It is very slow compared to other LAN links at 230.4 Kbps  It is unsuitable for bandwidth intensive applications
  • 15. Conclusion AppleTalk includes an address-resolution method much like TCP/IP's ARP. The AppleTalk version is called AARP. AARP uses broadcasts to discover the hardware address of a node.