3. Why is it called
The Internet..???
The word internet was used as early as 1849,
meaning interconnected or interwoven. The
word Internet was used in 1945 by the United
States War Department in a radio operator's
manual, and 1974 as the shorthand form of
Internetwork.
3
8. Computer
Protocols
SMTP
Internet Message
Access Protocol
IMAP
File Transfer Protocol
FTP
Point-to-Point Protocol .
PPP
Post office Protocol .
POP
User Datagram Protocol
UDP/IP Protocol
Transmission Control Protocol.
TCP/IP protocol
Hypertext Transfer
Protocol.
HTTP
Simple Mail transfer
Protocol
8
9. What is TCP ?
The most common networking protocol online.
Extremely reliable,
Sending emails (SMTP)
Transferring files (FTP).
TCP is used in situations.
9
11. the transfer of data that takes place
between individual processes executing on
end systems.
Port numbers are 16 bits long that help
identify which process is sending or
receiving data on a host. 22
Process-to-Process
11
12. Full Duplex
This means that the communication
can take place in both directions at
the same time.
12
13. Connection -
Oriented service
TCP provides a connection oriented
service. It defines 3 different phases:
Connection establishment
Data transfer
Connection termination
13
14. Connection Establishment
In connection establishment, some
rules have to maintain in a sequence
manner. Like:
A SYN Segment cannot carry data,
but it consumes one sequence
number.
A SYN ACK segment cannot carry
data, but does consume one
sequence number.
An ACK segment, if carrying no
data, consumes no sequence
number.
14
15. Data Transfer
After connection is established,
bidirectional data transfer can
take place. The client and server
can both send data and
acknowledgments.
15
16. Connection Termination
The FIN segment consumes
one sequence number if it does
not carry data. The (FIN + ACK)
segment consumes one
sequence number if it does not
carry data.
16
17. Multiplexing & Demultiplexing
TCP does multiplex and De-
multiplexing at the sender and
receiver ends respectively as a
number of logical connections
can be established between
port numbers over a physical
connection.
17
18. Error & Flow control
To provide reliable service, TCP
implements an error control
mechanism.
To prevent the receiver from
being overwhelmed with data.
18
20. Encapsulation adds information
to a packet as it travels to its
destination.
Decapsulation reverses the
process by removing the info, so
a destination device can read the
original data.
Encapsulation and Decapsulation
20
21. Connectionless Service
Each user datagram sent by UDP
is an independent datagram.
No connection establishment and
no connection termination.
21
22. Flow & Error Control
No flow control in UDP, and
hence no window mechanism.
The receiver may overflow with
incoming messages.
No error control mechanism in
UDP except for the checksum.
22
23. UDP Header
UDP header is an 8-bytes fixed
and simple header, while for
TCP it may vary from 20 bytes
to 60 bytes.
Length: UDP length = IP length – IP header’s
length.
23
28. Basis TCP UDP SCTP
Protocols TCP is used by HTTP, HTTPs, FTP,
SMTP and Telnet.
UDP is used by DNS, DHCP,
TFTP, SNMP, RIP, and VoIP.
SCTP is used to carry
telecommunication
signaling through IP.
Connection type Connection-oriented Connectionless Connection-oriented
Reliability trustworthy unreliable trustworthy
Transmission type Byte-oriented News-oriented News-oriented
Transfer
sequence
Strictly ordered Disordered Partially ordered
Overload control yes No yes
Error tolerance No No yes
28
29. 01
02
03
04
05
Internet and Network
are not the same.
Networks
TCP, UDP & SMTP
Transfer Layer Protocols
UDP is more widely
used than TCP
Future Work
TCP is the better one protocol
between them.
TCP & UDP
There are various protocols in
Computer Networking.
Protocols
Summary
29