SlideShare a Scribd company logo
1 of 64
Download to read offline
Bioinformatics almost completely depends on Computers and Internet.
Growth and development of Bioinformatics and Computer Science has
occurred simultaneously.
Internet has become an integral part of human life today.
Let us Understand How does Internet Work.
Internet
has
shrunk
the
world
A network connects computers by means of cabling systems,
specialized software, and devices that manage data traffic.
•Networks are collections of computers,
software, and hardware that are all connected
to help their users work together.
•A network enables users to share files and
resources, such as printers, as well as send
messages electronically (e-mail) to each other.
•Computer networks fall into two main types:
client/server networks and peer-to-peer
networks.
Service
Provider
List of top 30
Internet Service
Providers:
There were
358 internet
service
providers (ISPs)
offering
broadband and
narrow
band internet
services in
India.
Top 30 Internet Service Providers
(ISP) of the World.
India stands at No.3
List of top 10 broadband service providers in India
• DEN broadband
• Airtel
• BSNL
• Hathway
• Hayai
• Act Fibernet
• You broadband
• Spectranet
• AsiaNet
• Jetspot Fibre
A supercomputer is a
computer that
performs at or near
the currently highest
operational rate for
computers.
Supercomputers are
used for scientific and
engineering
applications that
must handle very
large databases or do
a great amount of
computation.
Ak e[F
N
US Department of Energy and IBM unveiled Summit,
America’s latest supercomputer at present.
Two supercomputers from India, Pratyush and Mihir, ranked
in at 67th and 120th spot on the world’s top list.
Mobile Phone Revolution or Revolution by Mobile Phones?
Mobile Phones are connected by S I M (Subscriber Identity Module)
Internet of Things provides a layer of digital intelligence that will improve on the “smartness” of everything man uses today.
On October 29th 1969, the first message was sent from computer to computer on
ARPANET. It was in 1971 when Ray Tomlinson invented and developed electronic mail,
as we know it today, by creating ARPANET's networked email system.
Electronic
Mails
Units of Data
· 8 Bits = 1 Byte
· 1024 Bytes = 1 Kilobyte
· 1024 Kilobytes = 1 Megabyte
· 1024 Megabytes = 1 Gigabyte
· 1024 Gigabytes = 1 Terabyte
· 1024 Terabytes = 1 Petabyte
· 1024 Petabytes = 1 Exabyte
· 1024 Exabytes = 1 Zettabyte
· 1024 Zettabytes = 1 Yottabyte
· 1024 Yottabytes = 1 Brontobyte
· 1024 Brontobytes = 1 Geopbyte
The Network Information Center, also known
as InterNIC from 1993 until 1998, was the
organization primarily responsible for
Domain Name System domain name
allocations and X.500 directory services.
Thereafter, the responsibility was assumed
by the Internet Corporation for Assigned
Names and Numbers (ICANN).
Types of
Networks
PAN
MAN
LAN
WAN
Area Networks
P-private
L-Local
W-Wide
M-Metropolitan
Types of
Connectivity
Las Vegas branch
LA Head Office
Types of Networks and Connectivity
NETWORK
STANDARDS AND
Efficiency and Fidelity
of Network Depends on
Networking Standards
• Standards play a significant role in the field of computer networks.
• Special-purpose development of communications hard- and software must
be avoided because of its high costs and the need to interconnect devices
from various vendors.
• Standards are designed in a highly formal, structured way to reduce
complexity most networks are organized as layers or levels.
• The purpose of each layer is to offer certain services to higher layers, which
these higher layers can use without knowing how they are implemented.
• Only the same layers of two computers communicate through a so called
protocol, which is a set of rules for communication at one layer.
Internet Protocols
Protocol Layers
OSI
Layers
Network
Layers
Internet
Protocol
IP Packet
Internet
Application
Protocol
Internet service provider.
An Internet service provider (ISP) also called Internet
access provider or IAP is a business or organization that
provides to consumers access to the Internet and
related services. ISPs can be started by just about any
individual or group with sufficient money and
expertise. In addition to Internet access via various
technologies such as dial-up and DSL, they may provide
a combination of services including Internet transit,
domain name registration and hosting and web hosting.
Intranet: A Secure Internet-like Network for
Organizations
With advancements in browser-based software
for the Internet, many private organizations have
implemented intranets. An intranet is a private
network utilizing Internet-type tools, but available
only within that organization. For large
organizations, an intranet provides easy access to
corporate information for designated employees.
Extranet: A Secure Means for Sharing
Information with Partners
While an intranet is used to disseminate confidential
information within a corporation, an extranet is
commonly used by companies to share data in a secure
fashion with their business partners. Internet-type
tools are used by content providers to update the
extranet. Encryption and user authentication means
are provided to protect the information, and to ensure
that designated people with the proper access
privileges are allowed to view it.
Hypertext Transfer Protocol (HTTP) is a method used
to transfer or convey information on the World Wide
Web. Its original purpose was to provide a way to
publish and retrieve HTML pages. HTTP is a
request/response protocol between clients and
servers. The originating client, such as a web browser,
spider, or other end-user tool, is referred to as the
user agent. The destination server, which stores or
creates resources such as HTML files and images, is
called the origin server.
World Wide Web (WWW) is the combination of four
basic ideas:
• Hypertext: a format of information which allows, in a computer environment,
one to move from one part of a document to another or from one document to
another through internal connections among these documents (called
"hyperlinks");
• Resource Identifiers: unique identifiers used to locate a particular resource
(computer file, document or other resource) on the network - this is commonly
known as a URL or URI, although the two have subtle technical differences;
• The Client-server model of computing: a system in which client software or a
client computer makes requests of server software or a server computer that
provides the client with resources or services, such as data or files; and
• Markup language: characters or codes embedded in text which indicates
structure, semantic meaning, or advice on presentation.
URL Stands for "Uniform Resource Locator."
A URL is the address of a specific Web site or file on the Internet. It cannot have spaces
or certain other characters and uses forward slashes to denote different directories.
Some examples of URLs are http://www.cnet.com/, http://web.mit.edu/, and
ftp://info.microsoft.com/. As you can see, not all URLs begin with "http". The first part
of a URL indicates what kind of resource it is addressing.
Here is a list of the different resource prefixes:
• http - a hypertext directory or document (such as a Web page)
• ftp - a directory of files or an actual file available to download
• gopher - a gopher document or menu
• telnet - a Unix-based computer system that you can log into
• news - a newsgroup
• WAIS - a database or document on a Wide Area Information Search database
• file - a file located on your hard drive or some other local drive
Domain names are used in URLs to identify
particular Web pages.
Look at the URL and in particular the domain name for clues to its origin.
Every domain name has a suffix that indicates what type of organization owns it.
.com indicates a commercial business, e.g. www.amazon.com
.edu indicates an educational institution, e.g.. www.bangaloreuniversity.edu
.ac also indicates educational institution e.g. www.sjc.ac.in
.gov indicates a governmental institution e.g. www.karnataka.gov
.org indicates an organization e.g. www.biovistas.org
.mil indicates military e.g. www.navy.mil United States Navy
Navigation through Web
The Web is vast and disorganized, and the overwhelming majority
of what is there is irrelevant to you. Further, the Web changes
constantly; new resources appear, old resources become outdated
or disappear and the paths and techniques used to access
resources change. The following approaches the most useful for
identifying biological resources on the web:
Search Engines: There are several websites from which you can
launch searches.
Google is the most commonly used search engine. One of the
newest searches services; still listed as Beta. Provides a much
shorter, more focused list of sites than most other services.
Entrez: It is a search engine to find bioinformatics web locations.
Virtual Private Network (VPN)
A VPN is the easiest and most effective way for
people to protect their internet traffic and hide
their identities online. As you connect to a secure
VPN server, your internet traffic goes through
an encrypted tunnel that nobody can see into,
including hackers, governments, and your
internet service provider.
Virtual Private Network (VPN)
A virtual private network (VPN) gives you online
privacy and anonymity by creating a private network
from a public internet connection. VPNs mask your
internet protocol (IP) address so your online actions are
virtually untraceable. Currently, a handful of
governments either regulate or outright ban VPNs.
Those currently include Belarus, China, Iraq, North
Korea, Oman, Russia, and the U.A.E.
Google Access
Only 4%
Google
Cannot Access
96%
The dark net accounts 96% on the
Internet, also known as the "dark web,"
is a component of the greater "deep
web," a network of encrypted Internet
content that is not accessible via
traditional search engines like, Google.

More Related Content

What's hot

Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
VNSGU
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
FarhanMalik93
 
Internet Services Update Presentation
Internet Services Update PresentationInternet Services Update Presentation
Internet Services Update Presentation
webhostingguy
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
raniseetha
 

What's hot (19)

Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet features (2nd topic)
Internet features (2nd topic)Internet features (2nd topic)
Internet features (2nd topic)
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt
 
Intro to internet 1
Intro to internet 1Intro to internet 1
Intro to internet 1
 
ICT, Internet and WWW
ICT, Internet and WWWICT, Internet and WWW
ICT, Internet and WWW
 
Intro To Internet
Intro To InternetIntro To Internet
Intro To Internet
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
ITFT- Basic internet concept
ITFT- Basic internet conceptITFT- Basic internet concept
ITFT- Basic internet concept
 
Internet Services Update Presentation
Internet Services Update PresentationInternet Services Update Presentation
Internet Services Update Presentation
 
internet and its services
internet and its servicesinternet and its services
internet and its services
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
ict22 lec1
ict22 lec1ict22 lec1
ict22 lec1
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
The Internet
The InternetThe Internet
The Internet
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
 

Similar to Computer networking Dr. Jayarama Reddy

INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
Arvin Dey
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
ftz 420
 

Similar to Computer networking Dr. Jayarama Reddy (20)

Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
Acsess and Use Internet To access and use
Acsess and Use Internet To access and  useAcsess and Use Internet To access and  use
Acsess and Use Internet To access and use
 
INTERNET.pptx
INTERNET.pptxINTERNET.pptx
INTERNET.pptx
 
unit-5 (2).pdf
unit-5 (2).pdfunit-5 (2).pdf
unit-5 (2).pdf
 
Ebusiness
EbusinessEbusiness
Ebusiness
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
 
Components of the Internet and the World Wide Web
Components of the Internet and the World Wide WebComponents of the Internet and the World Wide Web
Components of the Internet and the World Wide Web
 
Internet
InternetInternet
Internet
 
Chapter1-HTML.docx
Chapter1-HTML.docxChapter1-HTML.docx
Chapter1-HTML.docx
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
 
The internet
The internetThe internet
The internet
 
The internet
The internetThe internet
The internet
 
Internet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptxInternet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptx
 
Week two lecture
Week two lectureWeek two lecture
Week two lecture
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 
Tics
TicsTics
Tics
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 

More from Dr. Jayarama Reddy

Plant Tissue Culture as an Industry by Dr. Jayarama Reddy
Plant Tissue Culture as an Industry by Dr. Jayarama ReddyPlant Tissue Culture as an Industry by Dr. Jayarama Reddy
Plant Tissue Culture as an Industry by Dr. Jayarama Reddy
Dr. Jayarama Reddy
 
Plant Tissue Culture and Entreupernarship
Plant Tissue Culture and Entreupernarship Plant Tissue Culture and Entreupernarship
Plant Tissue Culture and Entreupernarship
Dr. Jayarama Reddy
 
Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27
Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27
Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27
Dr. Jayarama Reddy
 

More from Dr. Jayarama Reddy (6)

Plant Tissue Culture as an Industry by Dr. Jayarama Reddy
Plant Tissue Culture as an Industry by Dr. Jayarama ReddyPlant Tissue Culture as an Industry by Dr. Jayarama Reddy
Plant Tissue Culture as an Industry by Dr. Jayarama Reddy
 
Plant Tissue Culture and Entreupernarship
Plant Tissue Culture and Entreupernarship Plant Tissue Culture and Entreupernarship
Plant Tissue Culture and Entreupernarship
 
Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27
Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27
Biotransformation by Dr. Jayarama Reddy, St. Joseph's College, Bengaluru-27
 
Bioreactors by Dr. Jayarama Reddy St. Joseph's College, Bengaluru-27
Bioreactors by Dr. Jayarama Reddy St. Joseph's College, Bengaluru-27Bioreactors by Dr. Jayarama Reddy St. Joseph's College, Bengaluru-27
Bioreactors by Dr. Jayarama Reddy St. Joseph's College, Bengaluru-27
 
Programming languages in bioinformatics by dr. jayarama reddy
Programming languages in bioinformatics by dr. jayarama reddyProgramming languages in bioinformatics by dr. jayarama reddy
Programming languages in bioinformatics by dr. jayarama reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 

Recently uploaded

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
University of Hertfordshire
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
RohitNehra6
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
LeenakshiTyagi
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
gindu3009
 

Recently uploaded (20)

Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
fundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomologyfundamental of entomology all in one topics of entomology
fundamental of entomology all in one topics of entomology
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 

Computer networking Dr. Jayarama Reddy

  • 1.
  • 2. Bioinformatics almost completely depends on Computers and Internet. Growth and development of Bioinformatics and Computer Science has occurred simultaneously. Internet has become an integral part of human life today. Let us Understand How does Internet Work.
  • 4. A network connects computers by means of cabling systems, specialized software, and devices that manage data traffic.
  • 5. •Networks are collections of computers, software, and hardware that are all connected to help their users work together. •A network enables users to share files and resources, such as printers, as well as send messages electronically (e-mail) to each other. •Computer networks fall into two main types: client/server networks and peer-to-peer networks.
  • 7.
  • 8. List of top 30 Internet Service Providers: There were 358 internet service providers (ISPs) offering broadband and narrow band internet services in India. Top 30 Internet Service Providers (ISP) of the World. India stands at No.3
  • 9. List of top 10 broadband service providers in India • DEN broadband • Airtel • BSNL • Hathway • Hayai • Act Fibernet • You broadband • Spectranet • AsiaNet • Jetspot Fibre
  • 10. A supercomputer is a computer that performs at or near the currently highest operational rate for computers. Supercomputers are used for scientific and engineering applications that must handle very large databases or do a great amount of computation. Ak e[F N
  • 11. US Department of Energy and IBM unveiled Summit, America’s latest supercomputer at present.
  • 12. Two supercomputers from India, Pratyush and Mihir, ranked in at 67th and 120th spot on the world’s top list.
  • 13. Mobile Phone Revolution or Revolution by Mobile Phones? Mobile Phones are connected by S I M (Subscriber Identity Module)
  • 14. Internet of Things provides a layer of digital intelligence that will improve on the “smartness” of everything man uses today.
  • 15. On October 29th 1969, the first message was sent from computer to computer on ARPANET. It was in 1971 when Ray Tomlinson invented and developed electronic mail, as we know it today, by creating ARPANET's networked email system. Electronic Mails
  • 16. Units of Data · 8 Bits = 1 Byte · 1024 Bytes = 1 Kilobyte · 1024 Kilobytes = 1 Megabyte · 1024 Megabytes = 1 Gigabyte · 1024 Gigabytes = 1 Terabyte · 1024 Terabytes = 1 Petabyte · 1024 Petabytes = 1 Exabyte · 1024 Exabytes = 1 Zettabyte · 1024 Zettabytes = 1 Yottabyte · 1024 Yottabytes = 1 Brontobyte · 1024 Brontobytes = 1 Geopbyte
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. The Network Information Center, also known as InterNIC from 1993 until 1998, was the organization primarily responsible for Domain Name System domain name allocations and X.500 directory services. Thereafter, the responsibility was assumed by the Internet Corporation for Assigned Names and Numbers (ICANN).
  • 25.
  • 26.
  • 28.
  • 30.
  • 31.
  • 32. Las Vegas branch LA Head Office Types of Networks and Connectivity
  • 33.
  • 34.
  • 35. NETWORK STANDARDS AND Efficiency and Fidelity of Network Depends on
  • 36.
  • 37. Networking Standards • Standards play a significant role in the field of computer networks. • Special-purpose development of communications hard- and software must be avoided because of its high costs and the need to interconnect devices from various vendors. • Standards are designed in a highly formal, structured way to reduce complexity most networks are organized as layers or levels. • The purpose of each layer is to offer certain services to higher layers, which these higher layers can use without knowing how they are implemented. • Only the same layers of two computers communicate through a so called protocol, which is a set of rules for communication at one layer.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 49.
  • 51. Internet service provider. An Internet service provider (ISP) also called Internet access provider or IAP is a business or organization that provides to consumers access to the Internet and related services. ISPs can be started by just about any individual or group with sufficient money and expertise. In addition to Internet access via various technologies such as dial-up and DSL, they may provide a combination of services including Internet transit, domain name registration and hosting and web hosting.
  • 52. Intranet: A Secure Internet-like Network for Organizations With advancements in browser-based software for the Internet, many private organizations have implemented intranets. An intranet is a private network utilizing Internet-type tools, but available only within that organization. For large organizations, an intranet provides easy access to corporate information for designated employees.
  • 53. Extranet: A Secure Means for Sharing Information with Partners While an intranet is used to disseminate confidential information within a corporation, an extranet is commonly used by companies to share data in a secure fashion with their business partners. Internet-type tools are used by content providers to update the extranet. Encryption and user authentication means are provided to protect the information, and to ensure that designated people with the proper access privileges are allowed to view it.
  • 54. Hypertext Transfer Protocol (HTTP) is a method used to transfer or convey information on the World Wide Web. Its original purpose was to provide a way to publish and retrieve HTML pages. HTTP is a request/response protocol between clients and servers. The originating client, such as a web browser, spider, or other end-user tool, is referred to as the user agent. The destination server, which stores or creates resources such as HTML files and images, is called the origin server.
  • 55. World Wide Web (WWW) is the combination of four basic ideas: • Hypertext: a format of information which allows, in a computer environment, one to move from one part of a document to another or from one document to another through internal connections among these documents (called "hyperlinks"); • Resource Identifiers: unique identifiers used to locate a particular resource (computer file, document or other resource) on the network - this is commonly known as a URL or URI, although the two have subtle technical differences; • The Client-server model of computing: a system in which client software or a client computer makes requests of server software or a server computer that provides the client with resources or services, such as data or files; and • Markup language: characters or codes embedded in text which indicates structure, semantic meaning, or advice on presentation.
  • 56. URL Stands for "Uniform Resource Locator." A URL is the address of a specific Web site or file on the Internet. It cannot have spaces or certain other characters and uses forward slashes to denote different directories. Some examples of URLs are http://www.cnet.com/, http://web.mit.edu/, and ftp://info.microsoft.com/. As you can see, not all URLs begin with "http". The first part of a URL indicates what kind of resource it is addressing. Here is a list of the different resource prefixes: • http - a hypertext directory or document (such as a Web page) • ftp - a directory of files or an actual file available to download • gopher - a gopher document or menu • telnet - a Unix-based computer system that you can log into • news - a newsgroup • WAIS - a database or document on a Wide Area Information Search database • file - a file located on your hard drive or some other local drive
  • 57. Domain names are used in URLs to identify particular Web pages. Look at the URL and in particular the domain name for clues to its origin. Every domain name has a suffix that indicates what type of organization owns it. .com indicates a commercial business, e.g. www.amazon.com .edu indicates an educational institution, e.g.. www.bangaloreuniversity.edu .ac also indicates educational institution e.g. www.sjc.ac.in .gov indicates a governmental institution e.g. www.karnataka.gov .org indicates an organization e.g. www.biovistas.org .mil indicates military e.g. www.navy.mil United States Navy
  • 58. Navigation through Web The Web is vast and disorganized, and the overwhelming majority of what is there is irrelevant to you. Further, the Web changes constantly; new resources appear, old resources become outdated or disappear and the paths and techniques used to access resources change. The following approaches the most useful for identifying biological resources on the web: Search Engines: There are several websites from which you can launch searches. Google is the most commonly used search engine. One of the newest searches services; still listed as Beta. Provides a much shorter, more focused list of sites than most other services. Entrez: It is a search engine to find bioinformatics web locations.
  • 59. Virtual Private Network (VPN) A VPN is the easiest and most effective way for people to protect their internet traffic and hide their identities online. As you connect to a secure VPN server, your internet traffic goes through an encrypted tunnel that nobody can see into, including hackers, governments, and your internet service provider.
  • 60.
  • 61. Virtual Private Network (VPN) A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable. Currently, a handful of governments either regulate or outright ban VPNs. Those currently include Belarus, China, Iraq, North Korea, Oman, Russia, and the U.A.E.
  • 62.
  • 64. The dark net accounts 96% on the Internet, also known as the "dark web," is a component of the greater "deep web," a network of encrypted Internet content that is not accessible via traditional search engines like, Google.