SlideShare ist ein Scribd-Unternehmen logo
1 von 75
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Networks LANs (Local Area Networks) LANs are networks usually confined to a geographic area, such as a single building or a college campus. WANs (Wide Area Networks) Wide area networking combines multiple LANs that are geographically separate Internet The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups. Intranet An intranet is a private network utilizing Internet-type tools, but available only within that organization i.e. for large organizations. MANs (Metropolitan area Networks) This refers to a network of computers with in a City. VPN (Virtual Private Network) VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network .
OSI Reference Model Seven layers of OSI Model: The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers  
ISO OSI Layering Architecture
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 6: Presentation Layer   Performs specific functions that are requested regularly by applications Examples: encryption ASCII to Unicode, Unicode to ASCII LSB-first representations to MSB-first representations   Layer 7: Application Layer   Application layer protocols are application-dependent Implements communication between two applications of the same type Examples: FTP HTTP  SMTP (email)
Overview of Layers:
Introduction to TCP/IP Networks: They are based on an open specification that is not controlled by any vendor. What Is TCP/IP? TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is used to refer to a group of protocols related to the TCP and IP protocols such as the User Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET), and so on. TCP/IP Layering Architecture: ,[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP Protocol Architecture: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local-Area Network Connect computers within a limited physical area such  as an office, classroom, or building
Wide-Area Network WANs typically connect fewer computers than LANs and normally operate at lower speeds than LANs. WANs, however, provide the means for connecting single computers and many LANs over large distances.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communication Technologies Communication Hardware… Communication Network…
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplex:   Information flows in only one direction Half-duplex:  Information flows in two directions, but only in one direction at a    time. Full-duplex:  Information flows in two directions at the same time
Basic Signal Terminologies Bit - binary digit, either 0 or 1 Baud - one electronic state change per second Bit rate-  a method for measuring data transmission speed (bits/second) Mbps - millions of bits per second (data speed; measure of bandwidth = total information flow over a given time) on a telecommunication medium 8 bits = 1 byte Mb - million bits (quantity of data) MB - million bytes (quantity of data) Gbps - Billion bits per second (data speed) Teraflops - trillion operations per second
Data rate - bits per second Bandwidth - bandwidth or signal in cycles per second or hertz Noise - Average level of noise over the communication path. Error rate - rate at which errors occur where error in 1 or 0 bit occurs
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
(Bridge Diagram)
[object Object],[object Object],[object Object]
Modulation: In a modem, the MODULATION process involves the conversion of the digital computer signals (high/low, on/off or logic 1 and 0 states) to audio-frequency tones. Demodulation: The DEMODULATION process converts the audio tones back into digital signals that a computer can understand directly.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],To From Payload / Data 208.47.4.80:80 10.11.1.115 GET /index.html Header ,[object Object],[object Object],[object Object],[object Object],To From ,[object Object],[object Object],[object Object],[object Object],To ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To 10.11.1.115 GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To 208.47.4.80:80 10.11.1.115 GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To
When the web server receives this request, it will send the web page back to my computer by breaking it down into smaller parts and sending each part in a packet Part 1 of web page Part 2 of web page 10.11.1.115 208.47.4.80 10.11.1.115 208.47.4.80 To From Payload / Data Packet 1 Packet 2
[object Object],[object Object],[object Object],[object Object],Client Server http
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],bandwidth latency link
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of Switching Technologies: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Netiquette & Ethics
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Page: A web Page is a single document written in HTML ( Hypertext Markup Language ) that includes the text of the document, its structure, any links to other documents and graphic images and other media. Homepage: Homepage is a Hypertext document a server will serve as default. URL: A URL is the space of a web browser where the address of a website is written
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Host Address Port Path/Document
[object Object],[object Object],[object Object],[object Object],[object Object],   Covered by sheath material    Outer conductor is braided shielded (ground)    Separated by insulating material    Inner conductor is solid copper metal
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Security: Need for Security:
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious software and antivirus: 1. Malware Commonly, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such programs are known as malware and come in many forms, such as viruses, Trojan horses, spyware, and worms.  2. Viruses Viruses  are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data. 3. Trojan horse A  Trojan horse  (commonly known as a  Trojan ) is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer.
4. Spyware The term  spyware  refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent. 5. Worms Worms  are programs that can replicate themselves thoughout a computer network, performing malicious tasks throughout. 6. Botnet A  botnet  is a network of "zombie" computers that have been taken over by a "bot" that performs large-scale malicious acts for the creator of the botnet.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tier Architecture of Client Server model: 2-Tier Architecture : 2-tier architecture is used to describe client/server systems where the client requests resources and the server responds directly to the request, using its own resources. This means that the server does not call on another application in order to provide part of the service.
[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-Tiered Architecture :
WWW Definition: All the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) History: 1969 - RFCs begun by S. Crocker 1972 - Email by Ray Tomlinson & Larry Roberts 1970’s - TCP by Vint Cerf & Bob Kahn 1980s – Hardware Explosion (LANs, PCs, and workstations) 1983 – Ethernet by Metcalfe 1985 – Internet used by researchers and developers
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Model diagram of WWW: CGI User C L I E N T HTTP TCP/IP SERVER Docs

Weitere ähnliche Inhalte

Was ist angesagt?

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
webhostingguy
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
Siddharaj Junnarkar
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
Raghu nath
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
farhan516
 

Was ist angesagt? (20)

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
Computer networking
Computer networkingComputer networking
Computer networking
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Osi model
Osi modelOsi model
Osi model
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh Duggal
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Computer network
Computer networkComputer network
Computer network
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 

Andere mochten auch

Alternative Treatments for Insomnia
Alternative Treatments for Insomnia Alternative Treatments for Insomnia
Alternative Treatments for Insomnia
miotosanai
 
Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian
miotosanai
 
토론방법의 개선법
토론방법의 개선법토론방법의 개선법
토론방법의 개선법
inartistic
 
Egg bed by lomme
Egg bed by lommeEgg bed by lomme
Egg bed by lomme
miotosanai
 
EGG BED BY LOMME
EGG BED BY LOMMEEGG BED BY LOMME
EGG BED BY LOMME
miotosanai
 
Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08
Paul Wright
 
E-learning by Prof Patrikakis
E-learning by Prof PatrikakisE-learning by Prof Patrikakis
E-learning by Prof Patrikakis
ieeesbteipir
 
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
Ekin Shekin
 

Andere mochten auch (18)

Alternative Treatments for Insomnia
Alternative Treatments for Insomnia Alternative Treatments for Insomnia
Alternative Treatments for Insomnia
 
Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian
 
121.꿈
121.꿈121.꿈
121.꿈
 
125.bench
125.bench125.bench
125.bench
 
토론방법의 개선법
토론방법의 개선법토론방법의 개선법
토론방법의 개선법
 
Sleeping
SleepingSleeping
Sleeping
 
Egg bed by lomme
Egg bed by lommeEgg bed by lomme
Egg bed by lomme
 
ХЬЮЗ-УИЛСОН, ДЖОН. НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
ХЬЮЗ-УИЛСОН, ДЖОН.  НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...ХЬЮЗ-УИЛСОН, ДЖОН.  НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
ХЬЮЗ-УИЛСОН, ДЖОН. НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
 
EGG BED BY LOMME
EGG BED BY LOMMEEGG BED BY LOMME
EGG BED BY LOMME
 
Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08
 
Sleeping
SleepingSleeping
Sleeping
 
Iletisim kurallari telefon karsilama
Iletisim kurallari telefon karsilamaIletisim kurallari telefon karsilama
Iletisim kurallari telefon karsilama
 
IEEE Student Branch TEI Piraeus Actions
IEEE Student Branch TEI Piraeus ActionsIEEE Student Branch TEI Piraeus Actions
IEEE Student Branch TEI Piraeus Actions
 
E-learning by Prof Patrikakis
E-learning by Prof PatrikakisE-learning by Prof Patrikakis
E-learning by Prof Patrikakis
 
Mesleki Bilgisayar Yabancı Dil Giriş
Mesleki Bilgisayar Yabancı Dil GirişMesleki Bilgisayar Yabancı Dil Giriş
Mesleki Bilgisayar Yabancı Dil Giriş
 
The nature of ecology
The nature of ecologyThe nature of ecology
The nature of ecology
 
Php ekşin - Temel php i̇şlemleri
Php ekşin - Temel php i̇şlemleriPhp ekşin - Temel php i̇şlemleri
Php ekşin - Temel php i̇şlemleri
 
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
 

Ähnlich wie Class_notes_InternetTechnology

What is networking
What is networkingWhat is networking
What is networking
babyparul
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
kchanaka3
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Gaurav Mehndiratta
 
Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communication
Ashwin Namewar
 

Ähnlich wie Class_notes_InternetTechnology (20)

BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
 
Mohanccna
MohanccnaMohanccna
Mohanccna
 
What is networking
What is networkingWhat is networking
What is networking
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Networking
NetworkingNetworking
Networking
 
Computer networking
Computer networkingComputer networking
Computer networking
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communication
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptx
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1
 
Computer networks
Computer networksComputer networks
Computer networks
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Class_notes_InternetTechnology

  • 1.
  • 2. Types of Networks LANs (Local Area Networks) LANs are networks usually confined to a geographic area, such as a single building or a college campus. WANs (Wide Area Networks) Wide area networking combines multiple LANs that are geographically separate Internet The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups. Intranet An intranet is a private network utilizing Internet-type tools, but available only within that organization i.e. for large organizations. MANs (Metropolitan area Networks) This refers to a network of computers with in a City. VPN (Virtual Private Network) VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network .
  • 3. OSI Reference Model Seven layers of OSI Model: The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers  
  • 4. ISO OSI Layering Architecture
  • 5.
  • 6.
  • 7.
  • 8. Layer 6: Presentation Layer   Performs specific functions that are requested regularly by applications Examples: encryption ASCII to Unicode, Unicode to ASCII LSB-first representations to MSB-first representations   Layer 7: Application Layer   Application layer protocols are application-dependent Implements communication between two applications of the same type Examples: FTP HTTP SMTP (email)
  • 10.
  • 11.
  • 12.
  • 13. Local-Area Network Connect computers within a limited physical area such as an office, classroom, or building
  • 14. Wide-Area Network WANs typically connect fewer computers than LANs and normally operate at lower speeds than LANs. WANs, however, provide the means for connecting single computers and many LANs over large distances.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Communication Technologies Communication Hardware… Communication Network…
  • 24.
  • 25.
  • 26.
  • 27. Simplex: Information flows in only one direction Half-duplex: Information flows in two directions, but only in one direction at a time. Full-duplex: Information flows in two directions at the same time
  • 28. Basic Signal Terminologies Bit - binary digit, either 0 or 1 Baud - one electronic state change per second Bit rate- a method for measuring data transmission speed (bits/second) Mbps - millions of bits per second (data speed; measure of bandwidth = total information flow over a given time) on a telecommunication medium 8 bits = 1 byte Mb - million bits (quantity of data) MB - million bytes (quantity of data) Gbps - Billion bits per second (data speed) Teraflops - trillion operations per second
  • 29. Data rate - bits per second Bandwidth - bandwidth or signal in cycles per second or hertz Noise - Average level of noise over the communication path. Error rate - rate at which errors occur where error in 1 or 0 bit occurs
  • 30.
  • 31.
  • 32.
  • 33.
  • 35.
  • 36. Modulation: In a modem, the MODULATION process involves the conversion of the digital computer signals (high/low, on/off or logic 1 and 0 states) to audio-frequency tones. Demodulation: The DEMODULATION process converts the audio tones back into digital signals that a computer can understand directly.
  • 37.
  • 38.
  • 39.
  • 40. When the web server receives this request, it will send the web page back to my computer by breaking it down into smaller parts and sending each part in a packet Part 1 of web page Part 2 of web page 10.11.1.115 208.47.4.80 10.11.1.115 208.47.4.80 To From Payload / Data Packet 1 Packet 2
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Web Page: A web Page is a single document written in HTML ( Hypertext Markup Language ) that includes the text of the document, its structure, any links to other documents and graphic images and other media. Homepage: Homepage is a Hypertext document a server will serve as default. URL: A URL is the space of a web browser where the address of a website is written
  • 53.
  • 54.  
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Data Security: Need for Security:
  • 62.
  • 63.
  • 64.
  • 65.
  • 66. Malicious software and antivirus: 1. Malware Commonly, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such programs are known as malware and come in many forms, such as viruses, Trojan horses, spyware, and worms. 2. Viruses Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data. 3. Trojan horse A Trojan horse (commonly known as a Trojan ) is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer.
  • 67. 4. Spyware The term spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent. 5. Worms Worms are programs that can replicate themselves thoughout a computer network, performing malicious tasks throughout. 6. Botnet A botnet is a network of "zombie" computers that have been taken over by a "bot" that performs large-scale malicious acts for the creator of the botnet.
  • 68.
  • 69.
  • 70. Tier Architecture of Client Server model: 2-Tier Architecture : 2-tier architecture is used to describe client/server systems where the client requests resources and the server responds directly to the request, using its own resources. This means that the server does not call on another application in order to provide part of the service.
  • 71.
  • 73. WWW Definition: All the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) History: 1969 - RFCs begun by S. Crocker 1972 - Email by Ray Tomlinson & Larry Roberts 1970’s - TCP by Vint Cerf & Bob Kahn 1980s – Hardware Explosion (LANs, PCs, and workstations) 1983 – Ethernet by Metcalfe 1985 – Internet used by researchers and developers
  • 74.
  • 75. Model diagram of WWW: CGI User C L I E N T HTTP TCP/IP SERVER Docs