2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย
Manish Jha- Research Scholar- Internet Basics Requriement
1. Prepared by Mr.Manish Jha
Section Officer and faculty, University
of Petroleum & Energy
Studies,Dehradun
2. ๏จ Modem- A device that enables a computer to transmit
data over telephone lines.
๏จ Connector- A device that mating and demating
electrical power connection.
๏จ Cables- It consists of bundle of wires with connector
on the ends.
๏จ Adaptor- It is a physical device that allow to interface
between one hardware to another interface hardware.
๏จ Circuits- is a specific path between to points by which
signals can be carried out.
๏จ Switches- It is a network device that select a path or
circuit to send unit of data to its next destination.
๏จ Leased Lines- It is a telephone line connection that has
been used for private purpose
3. ๏จ 1. Hardware and Software Requirement
๏จ 2. Protocol
๏จ Transmission Media
๏จ E-Mail
4. ๏จ Protocol is a set of rules and procedure for
communicating.
๏จ There are many protocols
๏จ Some Protocol works only at particular OSI.
๏จ Protocol can also work together is a suit.
๏จ How Protocol Works โ Data is transmitted over
the network and to be break down in a
systematic steps. Each steps its own rules and
procedure.
6. ๏จ The protocol steps must be carried out in a consistent order
that is the same on every computer in the network. In the
sending computer, these steps must be executed from the
top down. In the receiving computer, these steps must be
carried out from the bottom up.
๏จ The Sending Computer
๏จ Protocols at the sending computer:
๏จ Break the data into smaller sections, called packets, that the
protocol can handle.
๏จ Add addressing information to the packets so that the
destination computer on the network can determine that the
data belongs to it.
๏จ Prepare the data for transmission through the NIC and out
onto the network cable.
7. ๏จ The Receiving Computer- Protocols at the receiving
computer carry out the same series of steps in reverse order.
They:
๏จ Take the data packets off the cable.
๏จ Bring the data packets into the computer through the NIC.
๏จ Strip the data packets of all the transmitting information
that was added by the sending computer.
๏จ Copy the data from the packets to a buffer for reassembly.
๏จ Pass the reassembled data to the application in a usable
form.
๏จ Both sending and receiving computers need to perform each
step in the same way so that the data will have the same
structure when it is received as it did when it was sent.
8. ๏จ TCP/IP โ It consists of multiple protocols, each of
which transfer data across the network in a different
form at with different option such as error checking.
๏จ X.25- It uses packet switching. Difference :-
๏จ TCP/IP has only end-to-end error checking and flow
control; X.25 has error checking from node to node.
๏จ To compensate for the fact that a TCP/IP network is
completely passive, TCP/IP has a more complicated
flow control and window mechanism than X.25 has.
๏จ X.25 has tightly specified the electrical and link levels;
TCP/IP is designed to travel over many different kinds
of media, with many different types of link service.
9. ๏จ Other protocols written specifically for the
TCP/IP suite include:
๏จ SMTP (Simple Mail Transfer Protocol) E-
mail.
๏จ FTP (File Transfer Protocol) For exchanging
files among computers running TCP/IP.
๏จ SNMP (Simple Network Management
Protocol) For network management.
10. Types of Internet Protocol ?-
A. Electronic Mail- SMTP,IMAP (Internet Message Access
Protocol), POP3 (POST OFFICE PROTOCOL3)
B. FTP
C. HTTP- It allows to shown the web page in web
broswer.
D. Telnet
E. Gopher
F. Usenet
What is Domain ?
Role on Domain Name System .
Role of DHCP- ( Dynamic Host Configuration Protocol)
12. ๏จ Domain Name Server
๏จ Itโs a network service that translate โnamesโ
into IP Address.
๏จ Domain Name & Host Name
๏จ .com Yahoo -
๏จ .com google
๏จ ac.in upes
๏จ Host Name
13. ๏จ IP uses 32 bits
๏จ 1 byte= 8 bits
๏จ 4 bytes= 32 bits
๏จ IP consists of 4 numbers and number always
between 0 to 255.
๏จ It consists of two components โOne
component is network portion of the address.
๏จ Second component is Host portion of the
address.
14. Types of OSI Layers :
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
15. OSI- Open System Interconnection was
developed in 1984 by ISO (International
Standard Organization) . OSI model is a set of
seven layers that ensure that must travel from
one device to another device over the
network. In earlier it was called
internetworking.
Application Layer โ This layer actually interact
with the operating system or application
whenever user transfer file,read message and
perform other network activities
16. Presentation Layer takes the data provided by the Application layer and
converts it into a standard format that the other layers can understand.
SESSION LAYER : The session layer tracks connections, also called sessions.
The session layer should keep track of multiple file downloads requested
by a particular FTP application, or multiple telnet connections from a
single terminal client, or web page retrievals from a web server.
TRANSPORT LAYER :-
๏จ DATA LINK LAYER
๏จ The data link layer provides error-free transfer of data frames from one
node to another over the physical layer, allowing layers above it to
assume virtually error-free transmission over the link. To do this, the data
link layer provides:
17. ๏จ The upper layers of the OSI model represent
software that implements network services like
encryption and connection management.
๏จ The lower layers of the OSI model implement
more primitive, hardware-oriented functions
like routing, addressing, and flow control.
18. ๏จ PHYSICAL LAYER
๏จ The physical layer, the lowest layer of the OSI
model, is concerned with the transmission and
reception of the unstructured raw bit stream over a
physical medium. It describes the
electrical/optical, mechanical, and functional
interfaces to the physical medium, and carries the
signals for all of the higher layers.
Network Layer of the OSI model known as OSI
Network Layer has a role to carry data from the
source address to destination address . Like,
TCP/IP address.
19. ๏จ Cloud computing is basically an Internet-based
network made up of large numbers of
๏จ servers - mostly based on open standards, modular
and inexpensive. Clouds contain
๏จ vast amounts of information and provide a variety
of services to large numbers of
๏จ people. The benefits of cloud computing are
Reduced Data Leakage, Decrease evidence
๏จ acquisition time, they eliminate or reduce service
downtime, they Forensic readiness, they
๏จ Decrease evidence transfer time
20.
21. ๏จ History
๏จ The Cloud is a metaphor for the Internet, derived from its
common depiction in network diagrams
๏จ (or more generally components which are managed by
others) as a cloud outline.
๏จ The underlying concept dates back to 1960 when John
McCarthy opined that "computation may
๏จ someday be organized as a public utility" (indeed it shares
characteristics with service bureaus
๏จ which date back to the 1960s) and the term The Cloud was
already in commercial use around
๏จ the turn of the 21st century. Cloud computing solutions had
started to appear on the market,
๏จ though most of the focus at this time was on Software as a
service.
22. ๏จ Types of services:
๏จ These services are broadly divided into three
categories:
๏จ Infrastructure-as-a-Service (IaaS)
๏จ Platform-as-a-Service (PaaS)
๏จ Software-as-a-Service (SaaS).
23. ๏จ Types by visibility:
๏จ Public Cloud
๏จ Hybrid Cloud
๏จ Private Cloud
24. ๏จ Public Clouds
๏จ A public cloud is one in which the services and infrastructure are
provided off-site over the Internet. These clouds offer the greatest level of
efficiency in shared resources; however, they are also more vulnerable
than private clouds. A public cloud is the obvious choice
๏จ when :-
๏จ Our standardized workload for applications is used by lots of people,
such as e-mail.
๏จ we need to test and develop application code.
๏จ we have SaaS (Software as a Service) applications from a vendor who has
a well-implemented security strategy.
๏จ We need incremental capacity (the ability to add computer capacity for
peak times).
๏จ We are doing collaboration projects.
๏จ We are doing an ad-hoc software development project using a Platform as
a Service (PaaS) offering cloud.