SlideShare una empresa de Scribd logo
1 de 67
Chapter 4:  Network Protocols Network+ Guide to Networks
Objectives ,[object Object],[object Object],[object Object]
Objectives (continued) ,[object Object],[object Object],[object Object]
Introduction To Protocols ,[object Object],[object Object],[object Object]
Introduction To Protocols ,[object Object]
Transmission Control Protocol /Internet Protocol (TCP/IP) ,[object Object],[object Object]
TCP/IP (continued) ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],[object Object],TCP/IP (continued)
[object Object],[object Object],[object Object],IPX/SPX
[object Object],[object Object],[object Object],IPX/SPX (continued)
[object Object],[object Object],IPX/SPX (continued)
[object Object],[object Object],[object Object],[object Object],IPX/SPX (continued)
NetBIOS and NetBEUI ,[object Object],[object Object],[object Object]
[object Object],[object Object],NetBIOS and NetBEUI (continued)
[object Object],[object Object],NetBIOS and NetBEUI (continued)
[object Object],[object Object],Appletalk
[object Object],[object Object],Appletalk (continued)
[object Object],[object Object],Binding Protocols on a Windows XP Workstation
Summary ,[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
IP Address
IP AddressIP Address
IP Address
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Tcp/ip
Tcp/ipTcp/ip
Tcp/ip
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 

Destacado

Network protocols
Network protocolsNetwork protocols
Network protocols
Hemnath R.
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
Kak Yong
 
Module info systems
Module info systemsModule info systems
Module info systems
Kak Yong
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure tree
rantd
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
Kak Yong
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 

Destacado (20)

Network protocols
Network protocolsNetwork protocols
Network protocols
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
 
Module info systems
Module info systemsModule info systems
Module info systems
 
Cyber security and ethical hacking 3
Cyber security and ethical hacking 3Cyber security and ethical hacking 3
Cyber security and ethical hacking 3
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure tree
 
Cyber security & ethical hacking 10
Cyber security & ethical hacking 10Cyber security & ethical hacking 10
Cyber security & ethical hacking 10
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
Cyber security and ethical hacking 7
Cyber security and ethical hacking 7Cyber security and ethical hacking 7
Cyber security and ethical hacking 7
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
OSI(Open System Interconnection) model
OSI(Open System Interconnection) modelOSI(Open System Interconnection) model
OSI(Open System Interconnection) model
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 

Similar a Chapter04 -- network protocols

10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d model
Swarndeep Singh
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Лекц 7
Лекц 7Лекц 7
Лекц 7
Muuluu
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Saumendra Pradhan
 

Similar a Chapter04 -- network protocols (20)

TCP Model
TCP ModelTCP Model
TCP Model
 
Hardware9
Hardware9Hardware9
Hardware9
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d model
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Лекц 7
Лекц 7Лекц 7
Лекц 7
 
Tcp
TcpTcp
Tcp
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Tcp and introduction to protocol
Tcp and introduction to protocolTcp and introduction to protocol
Tcp and introduction to protocol
 
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892Tcpandintroductiontoprotocol 150618054958-lva1-app6892
Tcpandintroductiontoprotocol 150618054958-lva1-app6892
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 

Más de Raja Waseem Akhtar

Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 

Más de Raja Waseem Akhtar (20)

God is Great
God is GreatGod is Great
God is Great
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Chapter04 -- network protocols

  • 1. Chapter 4: Network Protocols Network+ Guide to Networks
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.