This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP in the ARPANET project and the distributed network design. It describes the OSI model and compares it to the TCP/IP architecture. It also covers IP addressing and numbering, client-server architecture, IP forwarding, and some common network troubleshooting tools.
ip net basic understanding slide show pptlolo749806
油
This document provides an overview of IP networking and TCP/IP basics. It discusses the origins of TCP/IP from the ARPANET project in the 1960s and its distributed network design. It also describes the OSI model and how TCP/IP maps to it, with layers for the application, transport, internet, and link levels. Finally, it covers client-server architecture and IP addressing fundamentals like public and private address spaces.
This document provides an overview of IP and networking basics. It discusses the origins of TCP/IP which was developed by ARPA to create a distributed and decentralized network. It then covers the OSI model and compares it to the TCP/IP architecture. The networking layer uses IP to provide addressing and routing functions across different underlying networks. IP addressing is hierarchical, using both network and host portions. Special addresses like broadcast and loopback are also defined.
This document provides an introduction to the OSI and TCP/IP network models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains the functions of each layer, such as the transport layer providing reliable data delivery and the network layer providing network-wide addressing and routing. The document also discusses protocols like TCP, UDP, and IP that operate at different layers and how data is encapsulated as it passes through the layers.
The document discusses layered network models including OSI and TCP/IP. It provides details on the layers of each model, the functions of each layer, and examples of protocols used. Key points covered include how data is encapsulated as it moves through the layers, with each layer adding header information, and how the layers allow for standardization and modularity in network communication.
1. The document discusses basic networking concepts including protocols, protocol layers, and network interconnection. It provides details on network addressing, the Domain Name System, and port numbers.
2. Key protocol layers are examined, including the OSI 7-layer model and the TCP/IP 4-layer model. The roles and functions of each layer are defined.
3. Types of networks like WANs, LANs, Ethernet, Token Ring, and FDDI are introduced along with examples of interconnection devices like bridges, routers, and gateways.
The document provides an overview of computer networking, including definitions of key terms like computer network and network topology. It discusses why networks are needed, how they work, common network models like OSI and TCP/IP. It also covers topics like IP addressing, different network types (LAN, MAN, WAN), common network devices, applications, and security concerns.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
This document provides an overview of network models, specifically comparing the OSI reference model and the TCP/IP model. It explains that both models are based on layering with different layers performing distinct functions. The seven layers of the OSI model and four layers of the TCP/IP model are defined along with examples of protocols used in each layer. Key concepts like encapsulation, addresses, broadcasts, and the client-server model are also summarized.
The document provides information about the Data Communication Network course syllabus including course objectives, outcomes, topics covered, textbooks, and reference books. The syllabus is divided into 6 units that cover data communication network fundamentals, data link control protocols, network layer addressing and routing, transport layer protocols, application layer protocols, and network security. The document also includes summaries of the Open Systems Interconnection (OSI) model and TCP/IP reference model explaining their layered architectures and functions.
This document discusses computer networking and the OSI model. It provides an overview of how computers communicate at different layers, from the physical layer up to the application layer. It also discusses protocols like TCP/IP and how they map to the OSI model. The document compares OSI to the TCP/IP protocol suite and provides examples of protocols that operate at each layer.
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
The document provides information about the CCNA (Cisco Certified Network Associate) certification exam, including its introduction, syllabus, fees, number of questions, passing marks, and exam structure over two exams. It also includes summaries of the OSI reference model and TCP/IP model, which define standards for network communication and how data is packaged and transmitted between devices.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
The document discusses the OSI model and TCP/IP protocol stack. It describes the seven layers of the OSI model and the functions of each layer, including the physical, data link, network, transport, session, presentation, and application layers. It then maps the layers of the TCP/IP protocol stack to the OSI model, describing the functions of the physical network, data link, internet, transport, and application layers. It provides examples of protocols that operate at each layer, such as IP, TCP, UDP, ARP, and ICMP.
The document provides notes on networking fundamentals from CCENT/CCNA ICND1 Official Exam Certification Guide. It discusses the TCP/IP and OSI networking models, including their layers and functions. It also covers fundamentals of local area networks (LANs) such as Ethernet standards, speeds, cable types and maximum lengths. Common Ethernet standards include 10BASE-T, 100BASE-TX, 1000BASE-SX, 1000BASE-LX and 1000BASE-T.
Networking involves connecting electronic devices like computers to share resources and communicate. It allows devices to share internet access, hardware like printers, files and folders, and play multiplayer games. Networks use various topologies like star, bus or mesh to connect devices via physical cables or wireless links, and network protocols allow the connected devices to communicate according to shared rules.
The document discusses the TCP/IP protocol suite and compares it to the OSI model. It describes the layers of the TCP/IP model including the physical, data link, internet, and transport layers. The transport layer uses TCP and UDP, with TCP being connection-oriented and reliable, while UDP is connectionless. The internet layer uses IP to transport datagrams independently. The OSI model has 7 layers while TCP/IP has 5 layers that do not directly correspond to the OSI layers.
This document provides an overview of TCP/IP networking concepts including:
- TCP/IP is the default networking protocol for UNIX and the Internet, consisting of protocols like IP, TCP, UDP, ICMP, and ARP.
- IP addresses are composed of four octets that identify devices on the network, while MAC addresses identify hardware. ARP maps IP to MAC addresses.
- TCP provides connection-oriented delivery of data while UDP provides connectionless delivery. Common ports like 80 and 23 are assigned to HTTP and Telnet.
- IP addresses have classes that determine network and host portions, and private addresses are used internally with NAT for Internet connections.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
Introduction_Network_lecture_ for begginers.pptAdrianaany
油
A network security engineer is an IT professional who protects a company's computer networks from security threats. They design, implement, and maintain network security systems, and respond to security incidents.
Introduction_Network_lecture_ for begginers.pptAdrianaany
油
A network security engineer is an IT professional who protects a company's computer networks from security threats. They design, implement, and maintain network security systems, and respond to security incidents.
This document contains summaries of key topics related to Windows Server management:
1. It describes the seven layers of the OSI model and provides examples of the functions of each layer.
2. It also discusses common networking terms like hubs, bridges, routers, and gateways and explains how they relate to the OSI model layers.
3. Finally, it briefly introduces the concept of subnet masks and their role in defining the network and host portions of an IP address.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
The document discusses TCP/IP basics and networking concepts. It provides an overview of the OSI model and describes the layers from physical to application. It then focuses on the lower layers including Ethernet, IP addressing, ARP, and introduces TCP and UDP at the transport layer.
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
tcp-iprefmodel.ppt SI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP M...namrataparopate
油
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL P
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMCjaspervedamvemavarap
油
Action of muscles-Anatomy
Contraction and relaxation
Muscle tone
Length and tension relationship
Types of muscle contraction
Active and passive insufficiency
Shunt and sprunt muscles
Agonists
Antagonists
Fixators
Synergists
Unit No. 4 - Immunopharmacologyslides.pptxAshish Umale
油
The branch of pharmacology concerned with the immune system. Immunopharmacology is the study of the effects of the drugs modifying immune mechanism in body. It includes not only inoculation but also autoimmune disorders, allergic reactions, and cancer. IMMUNITY is the ability of the living body or the process to resist various types of organisms or toxins that tend to damage the tissue and organs.Immunostimulants and immunomodulators are drugs that modulate the immune response and can be used to increase the immune responsiveness of patients with Immunodeficiency as in AIDS, chronic illness and cancers.
Vaccines and antisera are used for immunization against bacterial and viral infections.
Synthesized originally as an anthelmintic but appears to restore depressed immune function of B lymphocytes, T lymphocytes, monocytes and macrophages.
Interferons alpha and beta are mainly used for antiviral effects while interferon a for its immunomodulating actions.
Cyclosporine is a cyclic peptide antibiotic produced by a fungus Beauveria nivea.
Cyclosporine acts at an early stage, selectively inhibits T cell proliferation and suppresses cell-mediated immunity.
Azathioprine is a prodrug of mercaptopurine which is a purine analog.
TNFa is secreted by activated macrophages and other immune cells to act on TNF receptors (TNFR1, TNFR2) which are located on the surface of neutrophils, fibroblasts, endothelial cells as well as found in free soluble form in serum and serous fluids.
Etanercept is also used for severe/refractory ankylosing spondylitis, polyarticular idiopathic juvenile arthritis and plaque psoriasis
Anakinra along with continued MTX has been used alone as well as added to Tnfa antagonists, because its clinical efficacy as monotherapy is lower.Use of immunosuppressants is essential for successful organ transplantation.
A glucocorticoid like methylprednisolone for 3-5 days generally suppresses acute rejection episodes
More Related Content
Similar to internet protocol and networking basic bachelor of science in informATION TEECHNOLOGY (20)
This document provides an overview of network models, specifically comparing the OSI reference model and the TCP/IP model. It explains that both models are based on layering with different layers performing distinct functions. The seven layers of the OSI model and four layers of the TCP/IP model are defined along with examples of protocols used in each layer. Key concepts like encapsulation, addresses, broadcasts, and the client-server model are also summarized.
The document provides information about the Data Communication Network course syllabus including course objectives, outcomes, topics covered, textbooks, and reference books. The syllabus is divided into 6 units that cover data communication network fundamentals, data link control protocols, network layer addressing and routing, transport layer protocols, application layer protocols, and network security. The document also includes summaries of the Open Systems Interconnection (OSI) model and TCP/IP reference model explaining their layered architectures and functions.
This document discusses computer networking and the OSI model. It provides an overview of how computers communicate at different layers, from the physical layer up to the application layer. It also discusses protocols like TCP/IP and how they map to the OSI model. The document compares OSI to the TCP/IP protocol suite and provides examples of protocols that operate at each layer.
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
The document provides information about the CCNA (Cisco Certified Network Associate) certification exam, including its introduction, syllabus, fees, number of questions, passing marks, and exam structure over two exams. It also includes summaries of the OSI reference model and TCP/IP model, which define standards for network communication and how data is packaged and transmitted between devices.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
The document discusses the OSI model and TCP/IP protocol stack. It describes the seven layers of the OSI model and the functions of each layer, including the physical, data link, network, transport, session, presentation, and application layers. It then maps the layers of the TCP/IP protocol stack to the OSI model, describing the functions of the physical network, data link, internet, transport, and application layers. It provides examples of protocols that operate at each layer, such as IP, TCP, UDP, ARP, and ICMP.
The document provides notes on networking fundamentals from CCENT/CCNA ICND1 Official Exam Certification Guide. It discusses the TCP/IP and OSI networking models, including their layers and functions. It also covers fundamentals of local area networks (LANs) such as Ethernet standards, speeds, cable types and maximum lengths. Common Ethernet standards include 10BASE-T, 100BASE-TX, 1000BASE-SX, 1000BASE-LX and 1000BASE-T.
Networking involves connecting electronic devices like computers to share resources and communicate. It allows devices to share internet access, hardware like printers, files and folders, and play multiplayer games. Networks use various topologies like star, bus or mesh to connect devices via physical cables or wireless links, and network protocols allow the connected devices to communicate according to shared rules.
The document discusses the TCP/IP protocol suite and compares it to the OSI model. It describes the layers of the TCP/IP model including the physical, data link, internet, and transport layers. The transport layer uses TCP and UDP, with TCP being connection-oriented and reliable, while UDP is connectionless. The internet layer uses IP to transport datagrams independently. The OSI model has 7 layers while TCP/IP has 5 layers that do not directly correspond to the OSI layers.
This document provides an overview of TCP/IP networking concepts including:
- TCP/IP is the default networking protocol for UNIX and the Internet, consisting of protocols like IP, TCP, UDP, ICMP, and ARP.
- IP addresses are composed of four octets that identify devices on the network, while MAC addresses identify hardware. ARP maps IP to MAC addresses.
- TCP provides connection-oriented delivery of data while UDP provides connectionless delivery. Common ports like 80 and 23 are assigned to HTTP and Telnet.
- IP addresses have classes that determine network and host portions, and private addresses are used internally with NAT for Internet connections.
This document provides an overview of networking and internetworking concepts. It defines what a network is and some common network protocols like TCP/IP. It discusses how network speed is measured by bit rate and latency. It then covers local area networks, wide area networks, and the internet. The document explains the purpose of networks for file sharing, communication, and remote program execution. It also discusses network messaging and different network service models like the OSI reference model and TCP/IP model. Finally, it provides a simplified example of how the TCP/IP protocol functions to route a packet from a source to destination across multiple routers.
Introduction_Network_lecture_ for begginers.pptAdrianaany
油
A network security engineer is an IT professional who protects a company's computer networks from security threats. They design, implement, and maintain network security systems, and respond to security incidents.
Introduction_Network_lecture_ for begginers.pptAdrianaany
油
A network security engineer is an IT professional who protects a company's computer networks from security threats. They design, implement, and maintain network security systems, and respond to security incidents.
This document contains summaries of key topics related to Windows Server management:
1. It describes the seven layers of the OSI model and provides examples of the functions of each layer.
2. It also discusses common networking terms like hubs, bridges, routers, and gateways and explains how they relate to the OSI model layers.
3. Finally, it briefly introduces the concept of subnet masks and their role in defining the network and host portions of an IP address.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
The document discusses TCP/IP basics and networking concepts. It provides an overview of the OSI model and describes the layers from physical to application. It then focuses on the lower layers including Ethernet, IP addressing, ARP, and introduces TCP and UDP at the transport layer.
IP specifies the format of packets, also called #datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
If you want to purchase the content e-mail me on dulith1989@gmail.com
tcp-iprefmodel.ppt SI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP M...namrataparopate
油
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL
TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL PROTOCOL TCP/IP MODEL OSI/MODEL P
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMCjaspervedamvemavarap
油
Action of muscles-Anatomy
Contraction and relaxation
Muscle tone
Length and tension relationship
Types of muscle contraction
Active and passive insufficiency
Shunt and sprunt muscles
Agonists
Antagonists
Fixators
Synergists
Unit No. 4 - Immunopharmacologyslides.pptxAshish Umale
油
The branch of pharmacology concerned with the immune system. Immunopharmacology is the study of the effects of the drugs modifying immune mechanism in body. It includes not only inoculation but also autoimmune disorders, allergic reactions, and cancer. IMMUNITY is the ability of the living body or the process to resist various types of organisms or toxins that tend to damage the tissue and organs.Immunostimulants and immunomodulators are drugs that modulate the immune response and can be used to increase the immune responsiveness of patients with Immunodeficiency as in AIDS, chronic illness and cancers.
Vaccines and antisera are used for immunization against bacterial and viral infections.
Synthesized originally as an anthelmintic but appears to restore depressed immune function of B lymphocytes, T lymphocytes, monocytes and macrophages.
Interferons alpha and beta are mainly used for antiviral effects while interferon a for its immunomodulating actions.
Cyclosporine is a cyclic peptide antibiotic produced by a fungus Beauveria nivea.
Cyclosporine acts at an early stage, selectively inhibits T cell proliferation and suppresses cell-mediated immunity.
Azathioprine is a prodrug of mercaptopurine which is a purine analog.
TNFa is secreted by activated macrophages and other immune cells to act on TNF receptors (TNFR1, TNFR2) which are located on the surface of neutrophils, fibroblasts, endothelial cells as well as found in free soluble form in serum and serous fluids.
Etanercept is also used for severe/refractory ankylosing spondylitis, polyarticular idiopathic juvenile arthritis and plaque psoriasis
Anakinra along with continued MTX has been used alone as well as added to Tnfa antagonists, because its clinical efficacy as monotherapy is lower.Use of immunosuppressants is essential for successful organ transplantation.
A glucocorticoid like methylprednisolone for 3-5 days generally suppresses acute rejection episodes
Analysis of Conf File Parameters in Odoo 17Celine George
油
In this slide, we will analyse the configuration file parameters in Odoo 17. The odoo.conf file plays a pivotal role in configuring and managing the Odoo 17 server. It contains essential parameters that control database connections, server behaviour, logging, and performance settings.
The topic and research question forms the foundation of the entire systematic review.
A poorly defined topic/question leads to:
Unfocused search strategy
Irrelevant studies
Weak synthesis and conclusions
This presentation was provided by Lettie Conrad of LibLynx and San Jos辿 University during the initial session of the NISO training series "Accessibility Essentials." Session One: The Introductory Seminar was held April 3, 2025.
All India Council of Vocational Skills (AICSVS) and National Council of Open Schooling Research and Training (NCOSRT), Global International University, Asia Book of World Records (ABWRECORDS), International a joint Accreditation Commission of Higher Education (IACOHE)The prospectus is going to be published in the year 2025
GET READY TO GROOVE TO THE TUNES OF QUIZZING!
The Quiz Club of PSGCAS brings to you the foot-tapping, energetic "MUSIC QUIZ".
So energise yourself for a trivia filled evening.
QUIZMASTER : A POOJA JAIN, BA ECONOMICS (2023-26 BATCH), THE QUIZ CLUB OF PSGCAS
2. Outline
Origins of TCP/IP
OSI Stack & TCP/IP Architecture
Client Server Architecture
IP Addressing & Numbering Rules
IP Forwarding and default route
Network Troubleshooting Tools
3. Origins of TCP/IP
1950s 1960s US Govt. requirement for
rugged network that would continue to work
in case of a nuclear attack
RAND Corporation (Americas leading think
thank) & DoD formed ARPA (Advanced
Research Project Agency)
1968 ARPA engineers proposed Distributed
network design for ARPANET Network
4. Distributed Network Design
Pre-ARPANET networks
connection oriented
Management & control was centralized
New Network ARPANET
Connectionless
Decentralised
Modern Internet has evolved from the ARPANET
6. Internetworks
Start with lots of little networks
Many different types
Ethernet, dedicated leased lines, dialup, ATM, Frame Relay,
FDDI
Each type has its own idea of addressing and protocols
Want to connect them all together and provide a
unified view of the whole lot (i.e. act as a single large
network)
8. The unifying effect of the network
layer
Define a protocol that works in the same way with
any underlying network
Call it the network layer (IP)
IP routers operate at the network layer
There are defined ways of using:
損 IP over Ethernet
損 IP over ATM
損 IP over FDDI
損 IP over serial lines (PPP)
損 IP over almost anything
10. What is TCP/IP?
In simple terms is a language that enables
communication between computers
A set of rules (protocol) that defines how two
computers address each other and send data to
each other
Is a suite of protocols named after the two most
important protocols TCP and IP but includes
other protocols such as UDP, RTP, etc
11. Open Systems & TCP/IP
TCP/IP formed from standardized communications
procedures that were platform independent and open
Open systems
open architecture - readily available to all
What is open system networking?
network based on well known and standardized protocols
standards readily available
networking open systems using a network protocol
12. OSI - Layered Model Concept
Divide-and-conquer approach
Dividing requirements into groups, e.g transporting of
data, packaging of messages, end user applications
Each group can be referred to as a layer
Upper layers are logically closer to the user and deal with
more abstract data, relying on lower layer protocols to
translate data into forms that can eventually be physically
transmitted.
Open Systems Interconnection Reference Model (OSI-
RM) adopted as a standard for networking
14. OSI Model
APPLICATION
Upper Layers
Application oriented
Independent of layers below
TRANSPORT
Lower Layers
Transmission of data
No differentiation of upper layers
1
3
2
4
5
6
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
15. Layers 7, 6, 5
7: Application layer
Provides different services to the applications
Uses the underlying layers to carry out work
損 e.g. SMTP (mail), HTTP (web), Telnet, FTP, DNS
6: Presentation layer
Converts data from applications into common format and
vice versa
5: Session layer
organizes and synchronizes the exchange of data between
application processes
16. Layer 4
4: Transport layer
Provides end to end transportation of segments
E.g. TCP
損 encapsulates TCP segments in network layer packets
損 adds reliability by detecting and retransmitting lost packets
損 uses acknowledgements and sequence numbers to keep
track of successful, out-of-order, and lost packets
損 timers help differentiate between loss and delay
UDP is much simpler: no reliability features
17. Layer 3
3: Network layer
Routes the information in the network
E.g. IP is a network layer implementation which
defines addresses in such a way that route selection
can be determined.
損 Single address space for the entire internetwork
損 adds an additional layer of addressing, e.g. IP address,
which is different from MAC address.
18. Layer 3
3: Network layer (e.g. IP)
Unreliable (best effort)
損 if packet gets lost, network layer doesnt care for higher layers can
resend lost packets
Forwards packets hop by hop
損 encapsulates network layer packet inside data link layer frame
損 different framing on different underlying network types
損 receive from one link, forward to another link
損 There can be many hops from source to destination
19. Layer 3
3: Network layer (e.g. IP)
Makes routing decisions
損 how can the packet be sent closer to its destination?
損 forwarding and routing tables embody knowledge of
network topology
損 routers can talk to each other to exchange information
about network topology
20. Layer 2
2: Data Link layer
Provides reliable transit of data across a physical
network link
bundles bits into frames and moves frames between
hosts on the same link
a frame has a definite start, end, size
often also a definite source and destination link-layer
address (e.g. Ethernet MAC address)
some link layers detect corrupted frames while other
layers re-send corrupted frames (NOT Ethernet)
21. Layer 1
1: Physical layer
moves bits using voltage, light, radio, etc.
no concept of bytes or frames
bits are defined by voltage levels, or similar
physical properties
1101001000
22. OSI and TCP/IP
TCP/UDP end to end reliability
IP - Forwarding (best-effort)
Framing, delivery
Raw signal
Mail, Web, etc.
1
3
2
4
5
6
7 Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Transport
Network
Data Link &
Physical
OSI TCP/IP
24. Protocol Layers:
The TCP/IP Hourglass Model
Network layer
Token
Ring
ATM X.25 PPP
Frame
Relay
HDLC
Ethernet
IP
UDP
TCP
HTTP FTP Telnet DNS
SMTP Audio Video
RTP
Data link layer
Transport layer
Application layer
25. Layer Interaction
Application, Presentation and Session protocols are
end-to-end
Transport protocol is end-to-end
encapsulation/decapsulation over network protocol on end
systems
Network protocol is throughout the internetwork
encapsulation/decapsulation over data link protocol at each
hop
Link and physical layers may be different on each hop
26. Layer Interaction:
OSI 7-Layer Model
Host Router Router Host
Application
Presentation
Session
Transport
Network
Link
Physical
Network
Link Link
Network
Link Link
Application
Presentation
Session
Transport
Network
Link
Physical
Physical
Hop
by
hop
End
to
end
27. Layer Interaction:
TCP/IP Model
Host Router Router Host
Application
TCP or UDP
IP
Link
Physical
IP
Link Link
IP
Link Link
Application
TCP or UDP
IP
Link
Physical
Physical
Hop
by
hop
End
to
end
No session or presentation layers in TCP/IP model
28. Encapsulation & Decapsulation
Lower layers add headers (and sometimes
trailers) to data from higher layers
Application
Transport
Network
Data Link
Data Link
Network
Data
Transport Layer Data
Header
Network Layer Data
Header
Data
Header
Header
Link Layer Data
Data
Header
Header
Header
Header
Trailer
Trailer
29. Frame, Datagram, Segment, Packet
Different names for packets at different layers
Ethernet (link layer) frame
IP (network layer) datagram
TCP (transport layer) segment
Terminology is not strictly followed
we often just use the term packet at any layer
30. Destination and source are 48-bit MAC
addresses
Type 0x0800 means that the data portion of the
Ethernet frame contains an IP datagram. Type
0x0806 for ARP.
Layer 2 - Ethernet frame
Preamble Dest
6 bytes
Source
6 bytes
Length
2 bytes
Data
46 to 1500
bytes
CRC
4 bytes
Type
2 bytes
31. Protocol = 6 means data
portion contains a TCP
segment. Protocol = 17
means UDP.
Layer 3 - IP datagram
IHL Type of Service Total Length
Version
Fragment Offset
Identification Flags
Time to Live Protocol Header Checksum
Source Address
Destination Address
Version = 4
If no options, IHL = 5
Source and Destination
are 32-bit IP addresses
Data
Padding
Options
32. Source and Destination are 16-bit TCP port numbers (IP
addresses are implied by the IP header)
If no options, Data Offset = 5 (which means 20 octets)
Layer 4 - TCP segment
Source Port Destination Port
Sequence Number
Acknowledgement Number
Data
Offset
Window
Reserved A
C
K
U
R
G
E
O
L
R
S
T
S
Y
N
F
I
N
Checksum Urgent Pointer
Data
Padding
Options
33. Client Server Architecture
simple example layer 7 protocol: HTTP
Client makes requests, Server serves requests e.g
HTTP for transferring websites. This is the easiest
way to provide services on demand and provides a
means of sharing resources more effectively.
Example: Mimicking the browser with telnet (client)
talking to a web server (server)
telnet www.google.com 80
GET / HTTP/1.1
Host: www.google.com
35. Purpose of an IP address
Unique Identification of
Source
Sometimes used for security or policy-based
filtering of data
Destination
So the networks know where to send the data
Network Independent Format
IP over anything
36. Purpose of an IP Address
Identifies a machines connection to a network
Physically moving a machine from one network
to another requires changing the IP address
TCP/IP uses unique 32-bit addresses
37. Basic Structure of an IP Address
133 27 162 125
10000101 00011011 10100010 01111101
85 1B A2 7D
32 bit number (4 octet number):
(e.g. 133.27.162.125)
Decimal Representation:
Binary Representation:
Hexadecimal Representation:
38. IP Address Allocation
Private IP address ranges:
10/8 (10.0.0.0 10.255.255.255)
192.168/16 (192.168.0.0 192.168.255.255)
172.16/12 (172.16.0.0 172.31.255.255)
Public IP address space
Assigned by an appropriate authority such as RIPE, ARIN, AFRINIC,
etc. or Local Internet Registries (LIRs)
Public Address space for the Africa Region available from AfriNIC
Choose a small block from whatever range you have, and
subnet your networks (to avoid problems with broadcasts)
39. Addressing in Internetworks
The problem we have
More than one physical network
Different Locations
Larger number of computers
Need structure in IP addresses
network part identifies which network in the
internetwork (e.g. the Internet)
host part identifies host on that network
40. Address Structure Revisited
Hierarchical Division in IP Address:
Network Part (Prefix)
損 describes which physical network
Host Part (Host Address)
損 describes which host on that network
Boundary can be anywhere
損 very often NOT at a multiple of 8 bits
Network Host
205 . 154 . 8 1
11001101 10011010 00001000 00000001
41. Network Masks
Network Masks help define which bits are used to
describe the Network Part and which for hosts
Different Representations:
decimal dot notation: 255.255.224.0
binary: 11111111 11111111 11100000 00000000
hexadecimal: 0xFFFFE000
number of network bits: /19
Binary AND of 32 bit IP address with 32 bit netmask
yields network part of address
42. Classless Addressing
IP address with the subnet mask defines the
range of addresses in the block
E.g 10.1.1.32/28 (subnet mask 255.255.255.240)
defines the range 10.1.1.32 to 10.1.1.47
10.1.1.32 is the network address
10.1.1.47 is the broadcast address
10.1.1.33 ->46 assignable addresses
43. Forwarding
Computers can only send packets directly to other
computers on their subnet
If the destination computer is not on the same subnet,
packets are sent via a gateway
defaultrouter option in /etc/rc.conf sets the default
gateway for this system.
IP forwarding on a FreeBSD box
turned on with the gateway_enable option in /etc/rc.conf
otherwise the box will not forward packets from one
interface to another.
44. How DNS fits
Computers use IP Addresses but Humans find
names easier to remember
DNS provides a mapping of IP Addresses to
names and vice versa
Computers may be moved between networks,
in which case their IP address will change BUT
their names can remain the same
#11: When we talk about open systems networking, we mean a network protocol that is based on well known and standardized protocols and is readily available
#12: The OSI model whichas been widely adopted as a standard for networking closely resembles the TCP/IP model and uses the underlying principle of divide-and conquer.
#22: This diagram shows the mapping between the OSI and the TCP/IP model. The OSI models further divides the application layer in the TCP/IP into separate layers, each with its own function