Skip to main content

In simple words, Internet Protocol is connectionless and unreliable protocol.

IP specifies the format of packets, also called datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission 

Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system.

In simple words, Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of successfully transmission of data. In order to make it reliable, it must be paired with reliable protocol such as TCP at the transport layer.


Points to remember:
  • ·         The length of datagram is variable.
  • ·         The Datagram is divided into two parts: header and data.
  • ·         The length of header is 20 to 60 bytes.
  • ·         The header contains information for routing and delivery of the packet.

User Datagram Protocol (UDP)
Like IP, UDP is connectionless and unreliable protocol. It doesn’t require making a connection with the host to exchange data. Since UDP is unreliable protocol, there is no mechanism for ensuring that data sent is received.

UDP transmits the data in form of a datagram. The UDP datagram consists of five parts 

Points to remember:
  • ·         UDP is used by the application that typically transmit small amount of data at one time.
  • ·         UDP provides protocol port used i.e. UDP message contains both source and destination port number, that makes it possible for UDP software at the destination to deliver the message to correct application program.


File Transfer Protocol (FTP)
·         FTP is used to copy files from one host to another. FTP offers the mechanism for the same in following manner:
·         FTP creates two processes such as Control Process and Data Transfer Process at both ends i.e. at client as well as at server.
·         FTP establishes two different connections: one is for data transfer and other is for control information.
·         Control connection is made between control processes while Data Connection is made betweenthe client and the server.
·         FTP uses port 21 for the control connection and Port 20 for the data connection.
Trivial File Transfer Protocol (TFTP)

Trivial File Transfer Protocol is also used to transfer the files but it transfers the files without authentication. Unlike FTP, TFTP does not separate control and data information. Since there is no authentication exists, TFTP lacks in security features therefore it is not recommended to use TFTP.

Key points
  • ·         TFTP makes use of UDP for data transport. Each TFTP message is carried in separate UDP datagram.
  • ·         The first two bytes of a TFTP message specify the type of message.
  • ·         The TFTP session is initiated when a TFTP client sends a request to upload or download a file.
  • ·         The request is sent from an ephemeral UDP port to the UDP port 69 of an TFTP server.


Hyper Text Transfer Protocol (HTTP)

HTTP is a communication protocol. It defines mechanism for communication between browser and the web server. It is also called request and response protocol because the communication between browser and server takes place in request and response pairs.
  • ·         HTTP Request
  • ·         HTTP request comprises of lines which contains:
  • ·         Request line
  • ·         Header Fields
  • ·         Message body

Key Points
  • ·         The first line i.e. the Request line specifies the request method i.e. Get or Post.
  • ·         The second line specifies the header which indicates the domain name of the server from where index.htm is retrieved.


HTTP Response
Like HTTP request, HTTP response also has certain structure. HTTP response contains:
  • ·         Status line
  • ·         Headers
  • ·         Message body

Comments

Popular posts from this blog

SAP S/4HANA: Next Generation Business suite

SAP delivered a massive wave of simplification and innovation in the core of SAP S/4HANA. With this delivery, enterprises can drive unprecedented business value with innovative use-cases - in core financial and operational areas such as in logistics taking full advantage of a simplified data model and a responsive user experience. SAVIC SAP S/4HANA migration templates helps SAP Business Suite customer can move from different start releases to SAP S/4HANA, on-premise edition. For certain start releases, a one-step procedure is available, which includes the installation of the SAP S/4HANA Core and, if necessary, the migration of the database to SAP HANA. As part of the move to SAP S/4HANA, on-premise edition, SAVIC Migration approach helps customers to adapt current implemented solution to comply with the scope and data structures of SAP S/4HANA.   Optimize IT operations, and innovate business processes faster to become a best-run business.

SAVIC is certified by SAP in the program SAP S/4HANA Demo21

Mumbai India, 26 January 2017 , –SAVIC, a leading global IT company in Digital Business Transformation (DBT) received Certificate of Accomplishment in recognition of their commitmentin the S/4HANA Demo21, build your own SAP S/4HANA, Edition for SAP Business All-in-One Demo Environment, release 1610 FPS0 0 . Through this achievement, the study will be possible, training, proof of concept (POC), development and demonstration of new features in SAP S/4HANA.  For  SAVIC Technologies Private Limited , Shakir VP of the SAP Excellence Centre at India, “Achieving this certification represents an important milestone in our partnership with SAP, not only because it demonstrates that we have the appropriate environment for S/4HANA Demo21 but also our strategy to develop our consultants’ expertise in S/4HANA”. About SAVIC SAVIC  Technologies Pvt Ltd is a global IT service Company providing Strategic Business Consulting and IT Services. The services offered ...

Procure to Pay (P2P) Cycle- by Amod Bhat SAP Consultant at SAVIC Technologies

Procure to Pay, also known as P2P , is the process of obtaining the raw materials needed for manufacturing a product or providing a service, and making payment for these. Every manufacturing concern or service provider needs to run this cycle efficiently if they are to continuously manage their cash flow, build goodwill with suppliers and make profits. Steps of the Procure to Pay (P2P) Cycle: *   The process begins with planning what materials are required, when they are required, and the price that the company can afford to pay for them. *   Then the company prepares a list of vendors that they think can provide the materials for them. *   The company asks each of the vendors to submit a quotation, which includes the price, terms of delivery, quality of materials, and any other information that they need for making their decision. This stage could also involve negotiating with the vendors for the best deal. *   Once a vendor has been chosen, t...