SlideShare ist ein Scribd-Unternehmen logo
1 von 26
What is the Internet?
• A network of networks, joining many government,
university and private computers together and providing
an infrastructure for the use of E-mail, bulletin boards, file
archives, hypertext documents, databases and other
computational resources
• The vast collection of computer networks which form and
act as a single huge network for transport of data and
messages across distances which can be anywhere from
the same office to anywhere in the world.
What is the Internet?
• The largest network of networks in the world.
• Uses TCP/IP protocols and packet switching.
• Runs on any communications substrate.
Brief History of the Internet
• 1968 - DARPA (Defense Advanced Research Projects Agency)
contracts with BBN (Bolt, Beranek & Newman) to create
ARPANET
• 1970 - First five nodes:
– UCLA
– Stanford
– UC Santa Barbara
– U of Utah, and
– BBN
• 1974 - TCP specification by Vint Cerf
• 1984 - On January 1, the Internet with its 1000 hosts
converts en masse to using TCP/IP for its messaging
Internet Growth Trends
• 1977: 111 hosts on Internet
• 1981: 213 hosts
• 1983: 562 hosts
• 1984: 1,000 hosts
• 1986: 5,000 hosts
• 1987: 10,000 hosts
• 1989: 100,000 hosts
• 1992: 1,000,000 hosts
• 2001: 150 – 175 million hosts
• 2002: over 200 million hosts
• By 2014, about 90% of the planet will be on the Internet
TCP/IP Addresses
• Every host on the Internet must have a
unique IP address
• The IP address is a 32-bit number which
we write in dotted decimal notation
• The first part of the IP address is the
network address – the remainder is the
host ID
• A subnet mask is used to determine the
network address from a IP host address
• All hosts on the same network are
configured with the same subnet mask
Network Address Example
Host address:
192.252.12.14
Subnet mask:
255.255.255.0
To obtain the network address, AND the host
IP with its subnet mask:
Obtaining an Internet Network
Address
• IP network addresses must be unique, or
the Internet will not be stable
• The Internet Network Information Centre
(InterNIC) was originally responsible for
issuing Internet network addresses
• Today, the Internet Assigned Number
Authority (IANA) issues network
addresses to Information Service
Providers (ISPs)
• ISPs split networks up into subnets and
sell them on to their customers
Domain Name System (DNS)
• IP addresses are used to identify hosts on a
TCP/IP network
• Example: 134.220.1.9
• Numbers are not ‘friendly’ – people prefer
names
• DNS is a protocol used to map IP addresses to
textual names
• E.g. www.wlv.ac.uk maps to 134.220.1.9
DNS on the Internet
DNS names have a hierarchical structure
Example: www.wlv.ac.uk
com net fr uk us
Root Level
ac co
aston wlvstaffs
ftpwwwclun
Top-level domain
Second-level
domain
Server name
Internet Email Addresses
• The Local part is the name of a special
file stored on the mail server called the
user’s mailbox
• The Domain name is resolved using DNS
• The mail server is also known as a mail
exchanger
Local part Domain name of mail server@
mel.ralph@wlv.ac.uk
Hypertext Transfer Protocol
(HTTP)
• HTTP is the protocol used to access resources
on the World Wide Web
• A browser application is used to send a request
to the WWW server for a resource, e.g. a web
page, graphics file, audio file, etc.
• The server responds by sending the resource (a
file) to the client and closing the connection
Request
Browser app
WWW server
The
Internet
(TCP/IP)
The
Internet
(TCP/IP)
Web page
Uniform Resource Locator (URL)
• URL is the standard for specifying the
whereabouts of a resource (such as a web page)
on the Internet
• A URL has four parts:
– The protocol used to retrieve the resource
– The host where the resource is held
– The port number of the server process on the
host
– The name of the resource file
http://www.wlv.ac.uk:80/index.html
Protocol Host Port number Name of web page
URL Defaults
• A server will normally be setup to use standard
defaults
• This enables the URL to be simplified
• In the case of a Web server for example
– Default port will be 80
– Default name for home page will be index.html
• Hence the previous URL can be shortened to
http://www.wlv.ac.uk/
File Transfer Protocol (FTP)
• Protocol for copying files between client
and an FTP server
• Uses a TCP connection for reliable
transfer of files with error-checking
• Most browsers support FTP, or you can
use a dedicated FTP client program, eg.
WS_FTP
• Trivial File Transfer Protocol (TFTP) is a
lightweight version for small memory
devices
ftp://ftp.demon.co.uk/pub/
Telnet
• Telnet allows a user to run commands
and programs remotely on another
computer across the Internet
• The user runs a Telnet client program
on the local host
• A Telnet server process must be
running on the remote host
• The user must have the necessary
permissions and password to access
the remote host
Some Port Assignments
• 21 FTP
• 23 Telnet
• 25 SMTP (mail)
• 70 gopher
• 79 finger
• 80 HTTP
 Crime => Illegal activities
 Cyber => Characteristic of the
culture of computers…
Computer crime, or cybercrime,
refers to any crime that involves a
computer and a network
It is a criminal activity committed on the Internet .
Cyber Crime
 Such conducts includes:
• Illegal access
• Illegal Transactions
• System interference
• Data interference
• Misuse of devices
• Fraud
 Cyber crime offenses against the information technology
infrastructure.
Cyber Crime <=> Cyber Space <=> Net Crime
Cyber Crime
The Invisible Criminals Are Dangerous Than The Visible One…
Who is Cyber Criminal
Those who are doing crimes by using the
computer as an target or object.
i. Children and adolescents b/w 6-18
ii. Dissatisfied employees
iii. Professional hackers
iv. Crackers
Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
 
Phishing is just one of the many frauds on
the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by
customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason.
The fraudster then has access to the
customer's online bank account and to the
funds contained in that account.
Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This term
is used interchangeably with online
harassment and online abuse. Stalking
generally involves harassing or threatening
behaviour that an individual engages in
repeatedly, such as following a person,
appearing at a person's home or place of
business, making harassing phone calls,
leaving written messages or objects, or
vandalizing a person's property.
Vishing is the criminal practice of
using social engineering and
Voice over IP (VoIP) to gain
access to private personal and
financial information from the
public for the purpose of financial
reward. The term is a combination
of “Voice" and phishing. Vishing
exploits the public's trust in
landline telephone services.
 
Vishing is typically used to steal
credit card numbers or other
information used in identity theft
schemes from individuals.
VISHING
Saturday 4 May 2013
Internet

Weitere ähnliche Inhalte

Was ist angesagt?

The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
How internet works
How internet worksHow internet works
How internet worksANurag Kumar
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]jsoni2
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internetgulsheramjad
 
internet and its services
internet and its servicesinternet and its services
internet and its servicesamitpal163
 
What is internet
What is internetWhat is internet
What is internetcramars
 
World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An IntroductionSidrah Noor
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & WebpageZeeshan Alam
 
Understanding world wide web and the internet
Understanding world wide web and the internetUnderstanding world wide web and the internet
Understanding world wide web and the internetMangesh Dete
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Workssumit kumar
 

Was ist angesagt? (20)

Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Internet basics
Internet basicsInternet basics
Internet basics
 
First step to internet
First step to internet First step to internet
First step to internet
 
How internet works
How internet worksHow internet works
How internet works
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Internet
InternetInternet
Internet
 
The internet
The internetThe internet
The internet
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
World wide web ppt
World wide web pptWorld wide web ppt
World wide web ppt
 
internet and its services
internet and its servicesinternet and its services
internet and its services
 
What is internet
What is internetWhat is internet
What is internet
 
PPT On INTERNET
PPT On INTERNETPPT On INTERNET
PPT On INTERNET
 
World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An Introduction
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
Understanding world wide web and the internet
Understanding world wide web and the internetUnderstanding world wide web and the internet
Understanding world wide web and the internet
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 

Andere mochten auch

Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usessumitsc
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)Ismail Zackariya
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)Manu Nair
 
INTERNET WORKING AND ITS FEATURES
INTERNET WORKING AND ITS FEATURESINTERNET WORKING AND ITS FEATURES
INTERNET WORKING AND ITS FEATURESManeeshMathur
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internetpilarace
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, featuresKiran Kurian Philip
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologiesraniseetha
 
#BMO15 | Per una navigazione sicura | Carmen Torrisi
#BMO15 | Per una navigazione sicura | Carmen Torrisi#BMO15 | Per una navigazione sicura | Carmen Torrisi
#BMO15 | Per una navigazione sicura | Carmen TorrisiOfficina Turistica
 
Primi passi nella Rete
Primi passi nella RetePrimi passi nella Rete
Primi passi nella ReteMaestra Laura
 

Andere mochten auch (20)

Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 
The Internet
The InternetThe Internet
The Internet
 
Intro To Internet
Intro To InternetIntro To Internet
Intro To Internet
 
Internet Domain Names
Internet Domain NamesInternet Domain Names
Internet Domain Names
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
E-business
E-businessE-business
E-business
 
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)
 
World wide web
World wide webWorld wide web
World wide web
 
WORLD WIDE WEB
WORLD WIDE WEBWORLD WIDE WEB
WORLD WIDE WEB
 
E Business
E BusinessE Business
E Business
 
Internet and its working (manu)
Internet and its working (manu)Internet and its working (manu)
Internet and its working (manu)
 
On theories
On theoriesOn theories
On theories
 
INTERNET WORKING AND ITS FEATURES
INTERNET WORKING AND ITS FEATURESINTERNET WORKING AND ITS FEATURES
INTERNET WORKING AND ITS FEATURES
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, features
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
Cercare sul web
Cercare sul webCercare sul web
Cercare sul web
 
#BMO15 | Per una navigazione sicura | Carmen Torrisi
#BMO15 | Per una navigazione sicura | Carmen Torrisi#BMO15 | Per una navigazione sicura | Carmen Torrisi
#BMO15 | Per una navigazione sicura | Carmen Torrisi
 
6 - Il browser - 16/17
6 - Il browser - 16/176 - Il browser - 16/17
6 - Il browser - 16/17
 
Primi passi nella Rete
Primi passi nella RetePrimi passi nella Rete
Primi passi nella Rete
 

Ähnlich wie Internet

Basics concepts of internet.ppt
Basics concepts of internet.pptBasics concepts of internet.ppt
Basics concepts of internet.pptSahilNegi60
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfSeethaDinesh
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-worksRashmi Kaul
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technologySharmila Devi
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxsahilraturi
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Week two lecture
Week two lectureWeek two lecture
Week two lectureHarry Essel
 
Web Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesWeb Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesVigneshkumar Ponnusamy
 
How the internet works
How the internet worksHow the internet works
How the internet worksftcim
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetHimanshu Pathak
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyDr. Jayarama Reddy
 

Ähnlich wie Internet (20)

Basics concepts of internet.ppt
Basics concepts of internet.pptBasics concepts of internet.ppt
Basics concepts of internet.ppt
 
Internet
InternetInternet
Internet
 
Overview of Internet
Overview of InternetOverview of Internet
Overview of Internet
 
Internet
InternetInternet
Internet
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Internet
InternetInternet
Internet
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Internet
InternetInternet
Internet
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Unit 4
Unit 4Unit 4
Unit 4
 
Week two lecture
Week two lectureWeek two lecture
Week two lecture
 
Web Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesWeb Technologies Introduction to web technologies
Web Technologies Introduction to web technologies
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Web technology
Web technologyWeb technology
Web technology
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Internet

  • 1.
  • 2. What is the Internet? • A network of networks, joining many government, university and private computers together and providing an infrastructure for the use of E-mail, bulletin boards, file archives, hypertext documents, databases and other computational resources • The vast collection of computer networks which form and act as a single huge network for transport of data and messages across distances which can be anywhere from the same office to anywhere in the world.
  • 3. What is the Internet? • The largest network of networks in the world. • Uses TCP/IP protocols and packet switching. • Runs on any communications substrate.
  • 4. Brief History of the Internet • 1968 - DARPA (Defense Advanced Research Projects Agency) contracts with BBN (Bolt, Beranek & Newman) to create ARPANET • 1970 - First five nodes: – UCLA – Stanford – UC Santa Barbara – U of Utah, and – BBN • 1974 - TCP specification by Vint Cerf • 1984 - On January 1, the Internet with its 1000 hosts converts en masse to using TCP/IP for its messaging
  • 5. Internet Growth Trends • 1977: 111 hosts on Internet • 1981: 213 hosts • 1983: 562 hosts • 1984: 1,000 hosts • 1986: 5,000 hosts • 1987: 10,000 hosts • 1989: 100,000 hosts • 1992: 1,000,000 hosts • 2001: 150 – 175 million hosts • 2002: over 200 million hosts • By 2014, about 90% of the planet will be on the Internet
  • 6. TCP/IP Addresses • Every host on the Internet must have a unique IP address • The IP address is a 32-bit number which we write in dotted decimal notation • The first part of the IP address is the network address – the remainder is the host ID • A subnet mask is used to determine the network address from a IP host address • All hosts on the same network are configured with the same subnet mask
  • 7. Network Address Example Host address: 192.252.12.14 Subnet mask: 255.255.255.0 To obtain the network address, AND the host IP with its subnet mask:
  • 8. Obtaining an Internet Network Address • IP network addresses must be unique, or the Internet will not be stable • The Internet Network Information Centre (InterNIC) was originally responsible for issuing Internet network addresses • Today, the Internet Assigned Number Authority (IANA) issues network addresses to Information Service Providers (ISPs) • ISPs split networks up into subnets and sell them on to their customers
  • 9. Domain Name System (DNS) • IP addresses are used to identify hosts on a TCP/IP network • Example: 134.220.1.9 • Numbers are not ‘friendly’ – people prefer names • DNS is a protocol used to map IP addresses to textual names • E.g. www.wlv.ac.uk maps to 134.220.1.9
  • 10. DNS on the Internet DNS names have a hierarchical structure Example: www.wlv.ac.uk com net fr uk us Root Level ac co aston wlvstaffs ftpwwwclun Top-level domain Second-level domain Server name
  • 11. Internet Email Addresses • The Local part is the name of a special file stored on the mail server called the user’s mailbox • The Domain name is resolved using DNS • The mail server is also known as a mail exchanger Local part Domain name of mail server@ mel.ralph@wlv.ac.uk
  • 12. Hypertext Transfer Protocol (HTTP) • HTTP is the protocol used to access resources on the World Wide Web • A browser application is used to send a request to the WWW server for a resource, e.g. a web page, graphics file, audio file, etc. • The server responds by sending the resource (a file) to the client and closing the connection Request Browser app WWW server The Internet (TCP/IP) The Internet (TCP/IP) Web page
  • 13. Uniform Resource Locator (URL) • URL is the standard for specifying the whereabouts of a resource (such as a web page) on the Internet • A URL has four parts: – The protocol used to retrieve the resource – The host where the resource is held – The port number of the server process on the host – The name of the resource file http://www.wlv.ac.uk:80/index.html Protocol Host Port number Name of web page
  • 14. URL Defaults • A server will normally be setup to use standard defaults • This enables the URL to be simplified • In the case of a Web server for example – Default port will be 80 – Default name for home page will be index.html • Hence the previous URL can be shortened to http://www.wlv.ac.uk/
  • 15. File Transfer Protocol (FTP) • Protocol for copying files between client and an FTP server • Uses a TCP connection for reliable transfer of files with error-checking • Most browsers support FTP, or you can use a dedicated FTP client program, eg. WS_FTP • Trivial File Transfer Protocol (TFTP) is a lightweight version for small memory devices ftp://ftp.demon.co.uk/pub/
  • 16. Telnet • Telnet allows a user to run commands and programs remotely on another computer across the Internet • The user runs a Telnet client program on the local host • A Telnet server process must be running on the remote host • The user must have the necessary permissions and password to access the remote host
  • 17. Some Port Assignments • 21 FTP • 23 Telnet • 25 SMTP (mail) • 70 gopher • 79 finger • 80 HTTP
  • 18.
  • 19.  Crime => Illegal activities  Cyber => Characteristic of the culture of computers… Computer crime, or cybercrime, refers to any crime that involves a computer and a network It is a criminal activity committed on the Internet . Cyber Crime
  • 20.  Such conducts includes: • Illegal access • Illegal Transactions • System interference • Data interference • Misuse of devices • Fraud  Cyber crime offenses against the information technology infrastructure. Cyber Crime <=> Cyber Space <=> Net Crime Cyber Crime
  • 21. The Invisible Criminals Are Dangerous Than The Visible One… Who is Cyber Criminal Those who are doing crimes by using the computer as an target or object. i. Children and adolescents b/w 6-18 ii. Dissatisfied employees iii. Professional hackers iv. Crackers
  • 22. Cyber Crime Variants Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000.  
  • 23. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 24. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 25. Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services.   Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals. VISHING Saturday 4 May 2013

Hinweis der Redaktion

  1. 5