Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
6Activity
P. 1
TCP/IP and Protocols

TCP/IP and Protocols

Ratings: (0)|Views: 461|Likes:
Published by Selva Kumar
Introduction, Understanding the Purpose and Function of Networking Models, Networking Model, Network Interface, Media Access Control, Network Interface Hardware/Software, OSI Model, The Microsoft Model, TCP/IP Protocol Suite - Host-to-Host Transport, Transmission Control Protocol, User Datagram Protocol, Application, NetBIOS over TCP, Windows Internet Name Service Server Message Block/Common Internet File System, Internet Print
Introduction, Understanding the Purpose and Function of Networking Models, Networking Model, Network Interface, Media Access Control, Network Interface Hardware/Software, OSI Model, The Microsoft Model, TCP/IP Protocol Suite - Host-to-Host Transport, Transmission Control Protocol, User Datagram Protocol, Application, NetBIOS over TCP, Windows Internet Name Service Server Message Block/Common Internet File System, Internet Print

More info:

Published by: Selva Kumar on Dec 06, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/12/2013

pdf

text

original

 
Skill Based Elective
 – 
VI: TCP/IP and Protocol
Unit
 – 
1: Introduction, Understanding the Purpose and Function of Networking Models,Networking Model, Network Interface, Media Access Control, Network InterfaceHardware/Software, OSI Model, The Microsoft Model, TCP/IP Protocol Suite.Unit - 2: Host-to-Host Transport, Transmission Control Protocol, User DatagramProtocol, Application, NetBIOS over TCP, Windows Internet Name Service ServerMessage Block/Common Internet File System, Internet Printing Protocol, WindowsSockets, Telnet Dynamic Host Configuration Protocol Simple Mail Transport Protocol -Post Office Protocol - Internet Message Access Protocol - Hypertext Transport Protocol -Network News Transfer Protocol - File Transfer Protocol - Domain Naming System -Routing Information Protocol - SNMPUnit - 3: IP Addressing - Converting from Decimal to Binary - Network ID and Host ID- Rules for Network IDs - Rules for Host IDs - Class A - Class B - Class C - Class Dand Class EUnit - 4: Determine the Number of Host Bits to Be Used-Determine the New Sub nettedNetwork IDs - Determine the IP Addresses for Each New Subnet Creating the SubnetMask - Public and Private IP Addresses - Basic IP Routing - Name and AddressResolution - Host Name Resolution - How Packets Travel from Network to Network - IPRouting Tables - Route Processing - Physical Address Resolution - Inverse ARP - ProxyARP - Static and Dynamic IP Routers
 – 
RoutingUnit - 5: Exam Objectives Fast Track Self Test Example of a Simple Glassful Network -Summary of Exam Objectives
References:
1) Richard Stevens, Advanced programming in the UNIX Environment, AddisonWesley, 1999.2) Richard Stevens, UNIX Network Programming Volume 1,2, Prentice HallInternational,1998.3) William Stallings, Data and Computer Communications, 5th edition, PHI, 1997.
 
UNIT-IPurpose of Network Architecture:
Network architecture is making better commanication and decrease the administrative task as well as toavoid to have error and conflicte in between so it will work in healthy condition and we can provide bettersecurity for data's to avoid misuse fo data and servicess so we can architecte network in the such a way.We can implement server stucture and software deployment servicess whitch will make better and lessadministrative task whitch is really provide good communication and very good foult taularence and securityfor data mind it in any company data is the main important source it may be software code, or as accounts sonetwork architecture is very necessory thing for this kind structures.
Networking Model
When dealing with networking, you may hear the terms "network model" and "network layer" used often.Network models define a set of network layers and how they interact. There are several different network models depending on what organization or company started them. The most important two are:
 
The TCP/IP Model
- This model is sometimes called the DOD model since it was designed for thedepartment of defense. It is also called the internet model because TCP/IP is the protocol used on theinternet.
 
OSI Network Model
- The International Standards Organization (ISO) has defined a standard calledthe Open Systems Interconnection (OSI) reference model. This is a seven layer architecture listed inthe next section.The International Standards Organization (ISO) has defined a standard called the Open SystemsInterconnection (OSI) reference model. This is a seven layer architecture listed below. Each layer isconsidered to be responsible for a different part of the communications. This concept was developed toaccommodate changes in technology. The layers are arranged here from the lower levels starting with thephysical (hardware) to the higher levels.1.
 
Physical Layer
- The actual hardware. Concerned with the connection between the computer and thenetwork.2.
 
Data Link Layer
- Data transfer method (802x ethernet). Puts data in frames and ensures error freetransmission. Also controls the timing of the network transmission. IEEE divided this layer into thetwo following sublayers.1.
 
Media Access Control (MAC)
- Used to coordinate the sending of data between computers.The 802.3, 4, 5, and 12 standards apply to this layer. If you hear someone talking about theMAC address of a network card, they are referring to the hardware address of the card.2.
 
Logical Link control (LLC)
- Maintains the Link between two computers by establishingService Access Points (SAPs) which are a series of interface points. IEEE802.2.3.
 
Network Layer
- IP network protocol. Routes messages using the best path available. Concernedwith message priority, status, and data congestion.4.
 
Transport Layer
- TCP, UDP. Provides properly sequenced and error free transmission.Recombines fragmented packets.5.
 
Session Layer
- Determines when the session is begun or opened, how long it is used, and when it isclosed. concerned with security and name recognition.
 
6.
 
Presentation Layer
- ASCII or EBCDEC data syntax. Makes the type of data transparent to thelayers around it. Used to translate date to computer specific format such as byte ordering. It mayinclude compression. It prepares the data, either for the network or the application depending on thedirection it is going.7.
 
Application Layer
- Provides the ability for user applications to interact with the network.Many protocol stacks overlap the borders of the seven layer model. Transmission Control Protocol (TCP)provides the function of session and some of the transport layer. The Internet Protocol (IP) provides thefunction of the rest of the transport and most of the network layer. Netware Core Protocol (NCP) providesthe function of the application, presentation, and the session layer.When we talk about Local Area Network (LAN) technology the IEEE 802 standard may be heard. Thisstandard defines networking connections for the interface card and the physical connections, describing howthey are done. The 802 standards were published by the Institute of Electrical and Electronics Engineers(IEEE). The 802.3 standard is called Ethernet.The ethernet standard data encapsulation method is defined by RFC 894. RFC 1042 defines the IP to link layer data encapsulation for networks using the IEEE 802 standards. The 802 standards define the two lowestlevels of the seven layer network model and primarily deal with the control of access to the network media.The network media is the physical means of carrying the data such as network cable. The control of access tothe media is called media access control (MAC). The 802 standards are listed below:
 
802.1 - Internetworking
 
802.2 - Logical Link Control *
 
802.3 - Ethernet or CSMA/CD, Carrier-Sense Multiple Access with Collision detection LAN *
 
802.4 - Token-Bus LAN *
 
802.5 - Token Ring LAN *
 
802.6 - Metropolitan Area Network (MAN)
 
802.7 - Broadband Technical Advisory Group
 
802.8 - Fiber-Optic Technical Advisory Group
 
802.9 - Integrated Voice/Data Networks
 
802.10 - Network Security
 
802.11 - Wireless Networks
 
802.12 - Demand Priority Access LAN, 100 Base VG-AnyLAN*The ones with stars should be remembered in order for network certification testing.
Network Access Methods
 
Contention
o
 
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) - Used by Ethernet
o
 
Carrier-Sense Multiple Access with Collision Avoidance
 
Token Passing
 
Demand Priority - Describes a method where intelligent hubs control data transmission. A computerwill send a demand signal to the hub indicating that it wants to transmit. The hub will respond withan acknowledgement that will allow the computer to transmit. The hub will allow computers totransmit in turn. An example of a demand priority network is 100VG-AnyLAN (IEEE 802.12). Ituses a star-bus topology.

Activity (6)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Divya Nadar liked this
Divya Nadar liked this
MKay Sch liked this
rajaramansuresh liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->