SlideShare ist ein Scribd-Unternehmen logo
1 von 75
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Networks LANs (Local Area Networks) LANs are networks usually confined to a geographic area, such as a single building or a college campus. WANs (Wide Area Networks) Wide area networking combines multiple LANs that are geographically separate Internet The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups. Intranet An intranet is a private network utilizing Internet-type tools, but available only within that organization i.e. for large organizations. MANs (Metropolitan area Networks) This refers to a network of computers with in a City. VPN (Virtual Private Network) VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network .
OSI Reference Model Seven layers of OSI Model: The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers  
ISO OSI Layering Architecture
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 6: Presentation Layer   Performs specific functions that are requested regularly by applications Examples: encryption ASCII to Unicode, Unicode to ASCII LSB-first representations to MSB-first representations   Layer 7: Application Layer   Application layer protocols are application-dependent Implements communication between two applications of the same type Examples: FTP HTTP  SMTP (email)
Overview of Layers:
Introduction to TCP/IP Networks: They are based on an open specification that is not controlled by any vendor. What Is TCP/IP? TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is used to refer to a group of protocols related to the TCP and IP protocols such as the User Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET), and so on. TCP/IP Layering Architecture: ,[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP Protocol Architecture: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local-Area Network Connect computers within a limited physical area such  as an office, classroom, or building
Wide-Area Network WANs typically connect fewer computers than LANs and normally operate at lower speeds than LANs. WANs, however, provide the means for connecting single computers and many LANs over large distances.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communication Technologies Communication Hardware… Communication Network…
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplex:   Information flows in only one direction Half-duplex:  Information flows in two directions, but only in one direction at a    time. Full-duplex:  Information flows in two directions at the same time
Basic Signal Terminologies Bit - binary digit, either 0 or 1 Baud - one electronic state change per second Bit rate-  a method for measuring data transmission speed (bits/second) Mbps - millions of bits per second (data speed; measure of bandwidth = total information flow over a given time) on a telecommunication medium 8 bits = 1 byte Mb - million bits (quantity of data) MB - million bytes (quantity of data) Gbps - Billion bits per second (data speed) Teraflops - trillion operations per second
Data rate - bits per second Bandwidth - bandwidth or signal in cycles per second or hertz Noise - Average level of noise over the communication path. Error rate - rate at which errors occur where error in 1 or 0 bit occurs
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
(Bridge Diagram)
[object Object],[object Object],[object Object]
Modulation: In a modem, the MODULATION process involves the conversion of the digital computer signals (high/low, on/off or logic 1 and 0 states) to audio-frequency tones. Demodulation: The DEMODULATION process converts the audio tones back into digital signals that a computer can understand directly.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],To From Payload / Data 208.47.4.80:80 10.11.1.115 GET /index.html Header ,[object Object],[object Object],[object Object],[object Object],To From ,[object Object],[object Object],[object Object],[object Object],To ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To 10.11.1.115 GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To 208.47.4.80:80 10.11.1.115 GET /index.html Payload / Data ,[object Object],[object Object],[object Object],[object Object],From ,[object Object],[object Object],[object Object],[object Object],To
When the web server receives this request, it will send the web page back to my computer by breaking it down into smaller parts and sending each part in a packet Part 1 of web page Part 2 of web page 10.11.1.115 208.47.4.80 10.11.1.115 208.47.4.80 To From Payload / Data Packet 1 Packet 2
[object Object],[object Object],[object Object],[object Object],Client Server http
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],bandwidth latency link
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of Switching Technologies: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Netiquette & Ethics
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Page: A web Page is a single document written in HTML ( Hypertext Markup Language ) that includes the text of the document, its structure, any links to other documents and graphic images and other media. Homepage: Homepage is a Hypertext document a server will serve as default. URL: A URL is the space of a web browser where the address of a website is written
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Host Address Port Path/Document
[object Object],[object Object],[object Object],[object Object],[object Object],   Covered by sheath material    Outer conductor is braided shielded (ground)    Separated by insulating material    Inner conductor is solid copper metal
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Security: Need for Security:
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious software and antivirus: 1. Malware Commonly, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such programs are known as malware and come in many forms, such as viruses, Trojan horses, spyware, and worms.  2. Viruses Viruses  are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data. 3. Trojan horse A  Trojan horse  (commonly known as a  Trojan ) is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer.
4. Spyware The term  spyware  refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent. 5. Worms Worms  are programs that can replicate themselves thoughout a computer network, performing malicious tasks throughout. 6. Botnet A  botnet  is a network of "zombie" computers that have been taken over by a "bot" that performs large-scale malicious acts for the creator of the botnet.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tier Architecture of Client Server model: 2-Tier Architecture : 2-tier architecture is used to describe client/server systems where the client requests resources and the server responds directly to the request, using its own resources. This means that the server does not call on another application in order to provide part of the service.
[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-Tiered Architecture :
WWW Definition: All the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) History: 1969 - RFCs begun by S. Crocker 1972 - Email by Ray Tomlinson & Larry Roberts 1970’s - TCP by Vint Cerf & Bob Kahn 1980s – Hardware Explosion (LANs, PCs, and workstations) 1983 – Ethernet by Metcalfe 1985 – Internet used by researchers and developers
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Model diagram of WWW: CGI User C L I E N T HTTP TCP/IP SERVER Docs

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesMSA Technosoft
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentalswebhostingguy
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUSiddharaj Junnarkar
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4Raghu nath
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317Khondoker Sadia
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalBeantsingh
 

Was ist angesagt? (20)

Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Computer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTUComputer Networks-1 1st unit (10CS55) VTU
Computer Networks-1 1st unit (10CS55) VTU
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
Computer networking
Computer networkingComputer networking
Computer networking
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Osi model
Osi modelOsi model
Osi model
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh Duggal
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Computer network
Computer networkComputer network
Computer network
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 

Andere mochten auch

Alternative Treatments for Insomnia
Alternative Treatments for Insomnia Alternative Treatments for Insomnia
Alternative Treatments for Insomnia miotosanai
 
Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian miotosanai
 
토론방법의 개선법
토론방법의 개선법토론방법의 개선법
토론방법의 개선법inartistic
 
Egg bed by lomme
Egg bed by lommeEgg bed by lomme
Egg bed by lommemiotosanai
 
ХЬЮЗ-УИЛСОН, ДЖОН. НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
ХЬЮЗ-УИЛСОН, ДЖОН.  НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...ХЬЮЗ-УИЛСОН, ДЖОН.  НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
ХЬЮЗ-УИЛСОН, ДЖОН. НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...Василь Петренко
 
EGG BED BY LOMME
EGG BED BY LOMMEEGG BED BY LOMME
EGG BED BY LOMMEmiotosanai
 
Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08Paul Wright
 
IEEE Student Branch TEI Piraeus Actions
IEEE Student Branch TEI Piraeus ActionsIEEE Student Branch TEI Piraeus Actions
IEEE Student Branch TEI Piraeus Actionsieeesbteipir
 
E-learning by Prof Patrikakis
E-learning by Prof PatrikakisE-learning by Prof Patrikakis
E-learning by Prof Patrikakisieeesbteipir
 
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...Ekin Shekin
 

Andere mochten auch (18)

Alternative Treatments for Insomnia
Alternative Treatments for Insomnia Alternative Treatments for Insomnia
Alternative Treatments for Insomnia
 
Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian Alternative Treatments for Insomnia Valerian
Alternative Treatments for Insomnia Valerian
 
121.꿈
121.꿈121.꿈
121.꿈
 
125.bench
125.bench125.bench
125.bench
 
토론방법의 개선법
토론방법의 개선법토론방법의 개선법
토론방법의 개선법
 
Sleeping
SleepingSleeping
Sleeping
 
Egg bed by lomme
Egg bed by lommeEgg bed by lomme
Egg bed by lomme
 
ХЬЮЗ-УИЛСОН, ДЖОН. НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
ХЬЮЗ-УИЛСОН, ДЖОН.  НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...ХЬЮЗ-УИЛСОН, ДЖОН.  НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
ХЬЮЗ-УИЛСОН, ДЖОН. НАПАДЕНИЕ НА «ЛИБЕРТИ»: С ТАКИМИ ДРУЗЬЯМИ НИКАКИХ ВРАГОВ ...
 
EGG BED BY LOMME
EGG BED BY LOMMEEGG BED BY LOMME
EGG BED BY LOMME
 
Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08Indivisible or intersecting issotl 08
Indivisible or intersecting issotl 08
 
Sleeping
SleepingSleeping
Sleeping
 
Iletisim kurallari telefon karsilama
Iletisim kurallari telefon karsilamaIletisim kurallari telefon karsilama
Iletisim kurallari telefon karsilama
 
IEEE Student Branch TEI Piraeus Actions
IEEE Student Branch TEI Piraeus ActionsIEEE Student Branch TEI Piraeus Actions
IEEE Student Branch TEI Piraeus Actions
 
E-learning by Prof Patrikakis
E-learning by Prof PatrikakisE-learning by Prof Patrikakis
E-learning by Prof Patrikakis
 
Mesleki Bilgisayar Yabancı Dil Giriş
Mesleki Bilgisayar Yabancı Dil GirişMesleki Bilgisayar Yabancı Dil Giriş
Mesleki Bilgisayar Yabancı Dil Giriş
 
The nature of ecology
The nature of ecologyThe nature of ecology
The nature of ecology
 
Php ekşin - Temel php i̇şlemleri
Php ekşin - Temel php i̇şlemleriPhp ekşin - Temel php i̇şlemleri
Php ekşin - Temel php i̇şlemleri
 
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
geoting1-unit-13-faktor-faktor-yang-mempengaruhi-pelbagai-jenis-tumbuh-tumbuh...
 

Ähnlich wie Class_notes_InternetTechnology

BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptxKirti Verma
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworkingMd. Mashiur Rahman
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Ishant Tiwari
 
Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communicationAshwin Namewar
 
Computer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptxComputer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptxsakshamsharma7257
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1vishal choudhary
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxvishal choudhary
 

Ähnlich wie Class_notes_InternetTechnology (20)

BCE L-1 networking fundamentals 111.pptx
BCE L-1  networking fundamentals 111.pptxBCE L-1  networking fundamentals 111.pptx
BCE L-1 networking fundamentals 111.pptx
 
Mohanccna
MohanccnaMohanccna
Mohanccna
 
What is networking
What is networkingWhat is networking
What is networking
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Networking
NetworkingNetworking
Networking
 
Computer networking
Computer networkingComputer networking
Computer networking
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Data & comp. communication
Data & comp. communicationData & comp. communication
Data & comp. communication
 
Computer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptxComputer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptx
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1Introductory concepts of data communication lecture-1
Introductory concepts of data communication lecture-1
 
Introductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptxIntroductory Concepts of Data Communication-Lecture-1.pptx
Introductory Concepts of Data Communication-Lecture-1.pptx
 

Kürzlich hochgeladen

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 

Kürzlich hochgeladen (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 

Class_notes_InternetTechnology

  • 1.
  • 2. Types of Networks LANs (Local Area Networks) LANs are networks usually confined to a geographic area, such as a single building or a college campus. WANs (Wide Area Networks) Wide area networking combines multiple LANs that are geographically separate Internet The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups. Intranet An intranet is a private network utilizing Internet-type tools, but available only within that organization i.e. for large organizations. MANs (Metropolitan area Networks) This refers to a network of computers with in a City. VPN (Virtual Private Network) VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network .
  • 3. OSI Reference Model Seven layers of OSI Model: The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers  
  • 4. ISO OSI Layering Architecture
  • 5.
  • 6.
  • 7.
  • 8. Layer 6: Presentation Layer   Performs specific functions that are requested regularly by applications Examples: encryption ASCII to Unicode, Unicode to ASCII LSB-first representations to MSB-first representations   Layer 7: Application Layer   Application layer protocols are application-dependent Implements communication between two applications of the same type Examples: FTP HTTP SMTP (email)
  • 10.
  • 11.
  • 12.
  • 13. Local-Area Network Connect computers within a limited physical area such as an office, classroom, or building
  • 14. Wide-Area Network WANs typically connect fewer computers than LANs and normally operate at lower speeds than LANs. WANs, however, provide the means for connecting single computers and many LANs over large distances.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Communication Technologies Communication Hardware… Communication Network…
  • 24.
  • 25.
  • 26.
  • 27. Simplex: Information flows in only one direction Half-duplex: Information flows in two directions, but only in one direction at a time. Full-duplex: Information flows in two directions at the same time
  • 28. Basic Signal Terminologies Bit - binary digit, either 0 or 1 Baud - one electronic state change per second Bit rate- a method for measuring data transmission speed (bits/second) Mbps - millions of bits per second (data speed; measure of bandwidth = total information flow over a given time) on a telecommunication medium 8 bits = 1 byte Mb - million bits (quantity of data) MB - million bytes (quantity of data) Gbps - Billion bits per second (data speed) Teraflops - trillion operations per second
  • 29. Data rate - bits per second Bandwidth - bandwidth or signal in cycles per second or hertz Noise - Average level of noise over the communication path. Error rate - rate at which errors occur where error in 1 or 0 bit occurs
  • 30.
  • 31.
  • 32.
  • 33.
  • 35.
  • 36. Modulation: In a modem, the MODULATION process involves the conversion of the digital computer signals (high/low, on/off or logic 1 and 0 states) to audio-frequency tones. Demodulation: The DEMODULATION process converts the audio tones back into digital signals that a computer can understand directly.
  • 37.
  • 38.
  • 39.
  • 40. When the web server receives this request, it will send the web page back to my computer by breaking it down into smaller parts and sending each part in a packet Part 1 of web page Part 2 of web page 10.11.1.115 208.47.4.80 10.11.1.115 208.47.4.80 To From Payload / Data Packet 1 Packet 2
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Web Page: A web Page is a single document written in HTML ( Hypertext Markup Language ) that includes the text of the document, its structure, any links to other documents and graphic images and other media. Homepage: Homepage is a Hypertext document a server will serve as default. URL: A URL is the space of a web browser where the address of a website is written
  • 53.
  • 54.  
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Data Security: Need for Security:
  • 62.
  • 63.
  • 64.
  • 65.
  • 66. Malicious software and antivirus: 1. Malware Commonly, a computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such programs are known as malware and come in many forms, such as viruses, Trojan horses, spyware, and worms. 2. Viruses Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data. 3. Trojan horse A Trojan horse (commonly known as a Trojan ) is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer.
  • 67. 4. Spyware The term spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent. 5. Worms Worms are programs that can replicate themselves thoughout a computer network, performing malicious tasks throughout. 6. Botnet A botnet is a network of "zombie" computers that have been taken over by a "bot" that performs large-scale malicious acts for the creator of the botnet.
  • 68.
  • 69.
  • 70. Tier Architecture of Client Server model: 2-Tier Architecture : 2-tier architecture is used to describe client/server systems where the client requests resources and the server responds directly to the request, using its own resources. This means that the server does not call on another application in order to provide part of the service.
  • 71.
  • 73. WWW Definition: All the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP) History: 1969 - RFCs begun by S. Crocker 1972 - Email by Ray Tomlinson & Larry Roberts 1970’s - TCP by Vint Cerf & Bob Kahn 1980s – Hardware Explosion (LANs, PCs, and workstations) 1983 – Ethernet by Metcalfe 1985 – Internet used by researchers and developers
  • 74.
  • 75. Model diagram of WWW: CGI User C L I E N T HTTP TCP/IP SERVER Docs