Professional Documents
Culture Documents
A.Protocol, in computer science, a set of rules or procedures for transmitting data between
electronic devices, such as computers. In order for computers to exchange information, there
must be a pre-existing agreement as to how the information will be structured and how each
side will send and receive it.
1.File Transfer Protocol (FTP)-It is a protocol that carries data guarantees that data will be
delivered properly. Port-20 and 21,Transmission Protocol-TCP
3.Telnet-It is the used for remote management protocol for managing network devices.Port-
23,Transmission Protocol-TCP.
5.Domian Name System (DNS)-It is used in the performance of one simple task of converting IP
addressTo domain names that everyone can easily understand.Port-55,Transmission Protocol-
TCP and UDP.
6.Trivial File Transfer Protocol (TFTP)-TFTP is typically used by devices to upgrade software and
firmware and that include cisco.Port-69,Transmission Protocol-UDP.
7.Hyper Text Transfer Protocol (HTTP)-It is a kind of protocol used to define how data is
transmitted and formatted and also used by www as a channel for communication.Port-
80,Transmission Protocol-TCP.
8.Dynamic Host Configuration Protocol (DHCP)- It is a kind of service used in the client and
server model.Port-67 and 68,Transmission Protocol-UDP.
9.Post Office Protocol 3 (POP3)-It is a protocol used by e-mail client to retrieve e-mail from the
servers.Port-110,Transmission Protocol-TCP.
10.Network News Transport Protocol (NNTP)- nntp is an application protocol used for
transporting USENET news articles between news servers and the end user client.Port-
119,Transmission Protocol-TCP.
11.Network Time Protocol (NTP)-It is the synchronization of time between network devices in
the network.Port-123,Transmission Protocol-UDP.
12.NetBIOS-NetBIOS itself is not a protocol but is typically used in combination with IP with the
NetBIOS over TCP/IP protocol.Port-135 and 139,Transmission Protocol-TCP and UDP.
13.Simple Network Management Protocol-It has the ability to monitor, configure and control
network devices.Port-161 and 162,Transmission Protocol-TCP and UDP.
15.Transport Layer Security (TLS)- It is a protocol of a secured socket layer that uses
asymmetric keys to transfer data over a network.Port-443,Transmission Protocol-TCP .
SMTP protocol. The Application layer places a header (encapsulation) field that contains
information such as screen size and fonts, and passes the data to the Presentation layer.
2) Presentation Layer: This layer places header information. The text in the message is
converted to ASCII. The Presentation layer will then pass the new data to the Session layer.
3) Session Layer: This Layer will start a new and separate session for communication
between the devices and manages the flow of data in the same session only and data received
4) Transportation Layer: Here the Data received is broken into segments of Data and
6) Data Layer: The data of the packets is converted into Frames. Then the data is send to
Physical Layer.
7) Physical Layer: The data of the Frames is converted into bit stream (the information is
in binary 0’s and 1’s) and eventually the data is reached to the Receiver’s end (teacher).
1) Physical Layer: The received data from the sender which is in bit stream is converted
2) Data Layer: The Data Layer merges all the frames information and makes those into
packets.
3) Network Layer: The packets are converted to segments and pushed forward to
Transportation Layer.
4) Transportation Layer: Those received segments are combined into a single data
element.
5) Session Layer: The single Data element obtained from the Transportation Layer is
6) Presentation Layer: This Layer removes the necessary compression that were made
with the Data and passes the new Data obtained to Application Layer.
7) Application Layer: The Layer will showcase the readable data at the receiver’s end
Disimilarities:-
1. OSI model is a generic model that is based upon functionalities of each
layer. TCP/IP model is a protocol-oriented standard.
5. The OSI has seven layers while the TCP/IP has four layers.
-Packets of data arrive at a gateway, destined for a particular host machine. The
gateway, or the piece of hardware on a network that allows data to flow from one
network to another, asks the ARP program to find a MAC address that matches
the IP address. The ARP cache keeps a list of each IP address and its matching
MAC address. The ARP cache is dynamic, but users on a network can also
configure a static ARP table containing IP addresses and MAC addresses.
-ARP caches are kept on all operating systems in an IPv4 Ethernet network. Every
time a device requests a MAC address to send data to another device connected
to the LAN, the device verifies its ARP cache to see if the IP-to-MAC-address
connection has already been completed. If it exists, then a new request is
unnecessary. However, if the translation has not yet been carried out, then the
request for network addresses is sent, and ARP is performed.
-An ARP cache size is limited by design, and addresses tend to stay in the cache
for only a few minutes. It is purged regularly to free up space. This design is also
intended for privacy and security to prevent IP addresses from being stolen or
spoofed by cyberattackers. While MAC addresses are fixed, IP addresses are
constantly updated.
-In the purging process, unutilized addresses are deleted; so is any data related to
unsuccessful attempts to communicate with computers not connected to the
network or that are not even powered on.