SlideShare a Scribd company logo
Basics concept of Network and Internet
Submitted To:-
Dr. Ankit Srivastava
Submitted By:-
Mansi Gupta
M.sc. 2nd sem.
Dr. APJ Abdul Kalam Institute of Forensic Science &
Criminology
• Overview of network.
• Architecture of Computer Network.
• Topology of Computer network.
• Types of Computer Network.
• OSI Model.
• TCP/IP Model.
• Concept of Internet.
• Internet Service Provider.
• Electronic Mail
CONTENT:
• A network is a collection of computers, servers, mainframes, network devices, peripherals, or other
devices connected to one another to allow the sharing of data.
• An excellent example of a network is the internet, which connects millions of people all over the world.
• Let’s take a Simple example, the picture given below shows that the sender and receiver are connected to
one another through a transmission media to share the data.
Network
Five basic components
of networkTransmissi
on
Media
Sender
Message
Receiver
Protocol
Message is the
data or
information which
needs to be
transferred from
one device to
another over a
computer network
A protocol is a
set of rules
that are
agreed by
both sender
& receiver.
Transmission
media help
to transfer
data from
one device
to another
such as
wires,cables,
radiowave.
Sender is a
device that had
the data and
needs to send
the data to other
device
connected to the
network.
A receiver is the
device which is
expecting the
data from other
device on the
network.
1 Performance
2.Data Sharing
3. Backup
4.Reliability
5. Scalability
6. Security
Performance of a
computer network
is measured in
terms of response
time. The response
time of sending
data from one node
to another should
be minimal.
Computer
network is use to
share the data
between systems
connected with
each other
through a
transmission
media.
It have a
central
server that
keeps the
backup of all
the data.
There should
not be any
failure in the
network or if
it occurs the
recovery from
a failure.
A computer
network should
be scalable
means it should
always allow to
add new nodes
to the already
existing
network.
A computer
network should be
secure so that the
data transmitting
over a network
should be safe
from unauthorized
access.
Feature of Computer
Network
Peer to peer
Computer Network
Architecture
A Computer Architecture is a design in which all the computers are connected in a computer network are
organized. Two most popular computer architecture are peer to peer and client- server architecture.
Peer to peer architecture: Client-Server architecture:
In which nodes are interconnected with
each other and share resources with each
other without the central controlling
server.
A central computer acts as hub and serves all
the requests from client computer. All the
shared data is stored in the server computer
shared with client computer when a request
is made.
Client
Server
Hardware Components
for the Networks
1. Cables: A wire that is used to connect more than
one computer or other devices such as printers and
scanner to each other.
2. Network Interface Card: NIC is used to format the
data, send the data and receive the data at the receiving
node.
3. Hub: Hub acts as a device that connects all the
computer in a network to each other. Any request
that comes from a client computer first received by
hub and then hub transmit this request over a
network. 4. Router: It is a device that forwards data
packets between computer networks. Router
joins multiple computer networks to each other.
Computer Network
Topology
Geometric representation of how the computer are connected to each other is known as topology. There are
five types of topology.
Types of Network Topology
Mesh
Topology
Star
Topology
Bus
Topology
Ring
Topology
Hybrid
Topology
Bus Topology
Mesh Topology Star Topology
Hybrid TopologyRing Topology
Computer Network
A computer network is a group of computers connected with each other through a transmission medium
such as cable, wires etc. Types of computer network
PAN
The network used to connect
different devices like connect
pc, mobile, PDA to one another.
This type of network has not
wide range.
LAN
Local area network is a group
of computers connected with
each other in a small places
such as school, hospital,
apartment etc.
In metropolitan
network various LAN
are connected with
each other through
telephone lines.
MAN WAN
Wide area network
provides long distance
transmission of data. The
size of the WAN is larger
than LAN and MAN. A
WAN can cover country,
continent.
CRITERIA LAN MAN WAN
Distance • Limited
• 2500m-2miles
• Limited
• 200km
• Unlimited
Speed • High
• Excess of 10mbps
• -10, 100 and 1000 are
standards.
• High
• 100mbps
• Slower
• 1-5mbps
Media • Twisted-pair wires
• Fibres optic cable
• Wireless
• Twisted-pair wires
• Fibres optic cable
• Coascial cable
• Fibres optic cable
• Wireless to include
satellite
Example • Ethernet
• Wifi
• Cable TV network • Internet
OSI MODEL
• OSI Model stands for Open System
Inerconnection model.
• OSI Model defines how data is transferred
from one computer to another computer.
• It describes how information from a software
application in one computer moves through a
physical medium to the software application in
another computer.
• OSI consists of seven layers, and each layer
performs a particular network function.
• OSI model was introduced by ISO in 1980.
The OSI Model was first
defined in raw in 1978 by
Hubert Zimmermann but draft
standard was published by ISO
in 1980.
Seven layers of OSI Model-
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application Layer
Sender
Receiver
Software Layers
Hardware Layer
Heart of OSI
• Application layer is used by computer applications such as Google chrome, outlook, firefox , Skype etc.
• Application layer defines the protocols that are used by computer applications for example
- HTTP and HTTPS protocol are used by web browser such as chrome, firefox etc.
- FTP protocol is used for file transfer between two or more computers.
- SMTP protocol is used for emails.
• There are dozens of other protocol that forms the application layer.
Application Layer:
Function of presentation layer:
Translation
Encryption
Compression
1. The data received from application layer is in form of characters and
numbers such as 2367, CCBH. This layer converts these characters and
number into machine understandable format.
2. SSL is used by the presentation layer for encryption and decryption.
3. Compress the data to small size so that it can be transferred faster.
Presentation Layer:
Authentication
Authorization
Session management
1. Before a computer can be connected to server, the computer has to
provide user name and password for the authentication.
2. Session layer checks whether the connected computer is authorized
to access of data.
3. Session also checks that the data which is received from the server
in the form of data packets belongs to which application.
Session Layer:
Functions:
Segementation
Flow Control
Error Control
1. Data received from Session Layer is divided into small data units called segments.
Each segment contains the sender and receiver port number and sequence
number.
2. It controls the flow of data. It checks the capability of the receiver device receiving
capability before transmitting data.
3. Transport layer also performs error control using automatic repeat request.
Transport Layer:
Functions:
Logical Addressing
Routing
Path
Determination
1. Network layer assigns the sender and receiver IP address to the data packets
before transmitting them so that the data packet reach the correct destination.
2. Routing is a method of transferring data packet from source to destination.
3. Network layer determines the optimal path for data transmission so that data
can be transmitted faster to the receiver. OSPF , BGP protocols are best possible
path for data delivery.
Network Layer:
Functions:
1. Data link layer receives the data from network layer.
2. Logical Addressing and Physical Addressing are two types of addressing done to the packets
transfers from one computer to another computer.
3. Data unit in the data link is called frame. A frame is transferred from one computer to another and
transmission is done through a transmission media such as wire, cable etc.
Data Link Layer:
Digital Transmission
1 Physical Layer is to transfer data in form of signals. A data can be
either analog or digital.
2. Physical layer must need to convert the data to its digital signal.
3. It converts digital data to digital signal. A digital data is in form of
binary sequences in the form of signals that can be transferred.
Physical Layer:
Functions:
TCP / IP Model
• The TCP/IP Model is developed before than OSI Model.
• It was developed by Defence Project Research Agency.
• TCP/IP stands for Transmission Control Protocol/ Internet Protocol.
• TCP/IP Model has four layers different from OSI Model.
Host -to-network
Layer
Network Layer
Transport Layer
Application Layer
Layers in TCP/IP Model
Application
Presentation
Sessions
SMTP FTP DNS ……HTTP
Transport SCTP TCP UDP
Network IP
ICMP IGMP
ARPRARP
Host-to-network
Data Link
Physical
1. Physical and Data Link Layer:
Physical and Data Link Layers in TCP/IP model does not
define any protocol , they support all the standard
protocols. They are combined know as Host –to-
network layer.
A network in TCP/IP internetwork can be LAN orWAN.
2. Network Layer:
In the network layer, the TCP/IP model
supports internetworking protocol know as IP.
The IP uses four protocols internally:
• ARP
• RARP
• ICMP
• IGMP
3. Transport Layer:
Transport layer in TCP Model can be represented by
three protocols:
• TCP
• UDP
• SCTP
These three protocols in transport layer are responsible
for delivery of messages from one process to another.
4. Application Layer:
This is the top most layer of TCP/IP model. It is
used for intercation between user and application.
There are several protocols used by the application
layer for user interaction such as:
• HTTP
• SNMP
• SMTP
• DNS
• FTP etc.
Internet
The internet is a global network of billion of
computers and other electronic devices.
With the internet, it’s possible to access
almost any information, communicate with
anyone else in the world, and do much
more.
When someone says a computer is online,
it’s just another way of saying it is connected
to the internet.
The internet is an increasingly important
part of everyday life for people around the
world.
Internet Governs by:
Internet has no president or chief operating officer and it is governed by a number of authorities.
Internet
Society
(ISOC)
Internet
Engineering
Task Force
(IETF)
Internet
Architecture
Board
(IAB)
A voluntary membership organisation
with an objective to promote global
interchange of information.
IAB authority is a group of invited
volunteers. The IAB sets standard
and provide internet addresses.
IETF discusses the technical and
operational problems in internet.
No one pays to use the internet, instead everyone pays for it's part.
Working of Internet:
Computer A sends message to computer B’s IP address.
Message is broken into smaller pieces called Packets.
Packets are sent along packet routing network to correct IP
Address.
Packets are subject to Transfer Control Protocol to maintain
Quality.
Packets are received and reassembled at Computer B’s IP
Address.
Internet Service Provider:
A company that provides a subscription service to
enable the user or organisation to access the
internet is ISP. An ISP has a network of computers
permanently linked to the internet.
If anyone wants to surf the web, use e-mail, or chat
online, then he needs an internet provider through
which computer can communicate with the rest of
the world. ISP
Web Email VOIPS
Types of ISPs:
Hosting ISPs:
Offer email, FTP,
web- hosting
services, virtual
machines, cloud
and physical
servers.
Transit ISPs:
Provide large
amounts of
bandwidth needed
to connect hosting
IPSs and access IPSs
together.
Access ISPs:
Employ a variety
of technologies to
facilitate
consumer
connection to
their network.
Virtual ISPs:
Purchase services
from other ISPs to
allow customers
internet access.
Free ISPs:
Provide service free
of charge and often
display ads while
users are
connected.
Examples of ISPs in India:
Main Applications of Internet:
Remote
Login
E-MAILS
NEWS
FILE TRANSFER
RESEARCH
Remote
Login
• It is the transmission of text-based messages
among networked computers.
• Ray Tomlinson is universally credited as the
creator of email as part of a program for
ARPANET in 1971.
• Meanwhile in 1978, a 14- year old boy, Shiva
Ayyadurai began his work on email system for
the university of Medicine and Dentistry of
New Jersey.
Electronic Mail
Ray Tomlinson
Email Address:
• An email address is a unique address, which identifies a location to send and receive email. It contains
username followed by an @ symbol and then domain name, i.e, username@domainname.
• Example: mansig094@gmail.com abc@yahooo.co.in
Username Domain name
Type of organisation
Country name
• Domain name it is the unique name that identifies an interest site or website. Domain name
always have two or more parts separated by dots. The part on the left is most specific and the
part on the right is the most general.
.com: Commercial institution
.edu: Educational institutions
.gov: Government sites
.mil: Military sites
.net: Gateways
.org: Private Organisations
Suffix indicates Organisation
Australia: .au
China: .cn
Germany: .de
India: .in
United States: .uk
United Kingdom: .us
Suffix indicates Geographic area
Structure of Email:
Types of Email Account:
POP
ACCOUNT
IMAP
ACCOUNT
EMAIL
BOUNCER
Types of Email Services:
Priced
Web-based
Email
Services
Priced
Web-based
Email
Services
Free web-
based email
Services
1. NTA UGC NET/ SET/ JRF Paper 1 Teaching and Research Aptitude by KVS Madaan.
2. https://beginnersbook.com/2019/03/introduction-to-computer-network/
3. https://store.hp.com/us/en/tech-takes/how-does-the-internet-work
Reference
Basics concept of network and internet   mansi

More Related Content

What's hot

Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Anjan Mahanta
 
Computer Network
Computer NetworkComputer Network
data communication and networks
data communication and networksdata communication and networks
data communication and networks
Hafiz Noman
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
Chandan Gupta Bhagat
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
GLIM Digital
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
UC San Diego
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Basma Gamal
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
Satyendra Mohan
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Nicholas Riungu
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
Sisir Ghosh
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
Ravi Yasas
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
Janani Ramasamy
 
Standards for providing Internet Services over Wireless Networks
Standards for providing Internet Services over Wireless NetworksStandards for providing Internet Services over Wireless Networks
Standards for providing Internet Services over Wireless Networks
Manos Anastasiadis
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
santoshkumar3075
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
IMRAN KHAN
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
Ehsan Ullah Kakar
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
Kirti Ahirrao
 

What's hot (20)

Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
data communication and networks
data communication and networksdata communication and networks
data communication and networks
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Standards for providing Internet Services over Wireless Networks
Standards for providing Internet Services over Wireless NetworksStandards for providing Internet Services over Wireless Networks
Standards for providing Internet Services over Wireless Networks
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 

Similar to Basics concept of network and internet mansi

computer network basics
computer network basicscomputer network basics
computer network basics
MohammedAdhil11
 
Computer Network and commpunitcation 1.pptx
Computer Network  and commpunitcation 1.pptxComputer Network  and commpunitcation 1.pptx
Computer Network and commpunitcation 1.pptx
lamobokro
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
Note1
Note1Note1
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
FA20BCS061GHANAKAMAL
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Ishant Tiwari
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Gaurav Mehndiratta
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
Gulrez Khan
 
Note 1
Note 1Note 1
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
ssuserf7cd2b
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
Bwsrang Basumatary
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
PataniMenu
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
DeepVala5
 
Dc2 t1
Dc2 t1Dc2 t1
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
Zakirul Islam
 

Similar to Basics concept of network and internet mansi (20)

computer network basics
computer network basicscomputer network basics
computer network basics
 
Computer Network and commpunitcation 1.pptx
Computer Network  and commpunitcation 1.pptxComputer Network  and commpunitcation 1.pptx
Computer Network and commpunitcation 1.pptx
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Note1
Note1Note1
Note1
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Note 1
Note 1Note 1
Note 1
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 

Basics concept of network and internet mansi

  • 1. Basics concept of Network and Internet Submitted To:- Dr. Ankit Srivastava Submitted By:- Mansi Gupta M.sc. 2nd sem. Dr. APJ Abdul Kalam Institute of Forensic Science & Criminology
  • 2. • Overview of network. • Architecture of Computer Network. • Topology of Computer network. • Types of Computer Network. • OSI Model. • TCP/IP Model. • Concept of Internet. • Internet Service Provider. • Electronic Mail CONTENT:
  • 3. • A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data. • An excellent example of a network is the internet, which connects millions of people all over the world. • Let’s take a Simple example, the picture given below shows that the sender and receiver are connected to one another through a transmission media to share the data. Network
  • 4. Five basic components of networkTransmissi on Media Sender Message Receiver Protocol Message is the data or information which needs to be transferred from one device to another over a computer network A protocol is a set of rules that are agreed by both sender & receiver. Transmission media help to transfer data from one device to another such as wires,cables, radiowave. Sender is a device that had the data and needs to send the data to other device connected to the network. A receiver is the device which is expecting the data from other device on the network.
  • 5. 1 Performance 2.Data Sharing 3. Backup 4.Reliability 5. Scalability 6. Security Performance of a computer network is measured in terms of response time. The response time of sending data from one node to another should be minimal. Computer network is use to share the data between systems connected with each other through a transmission media. It have a central server that keeps the backup of all the data. There should not be any failure in the network or if it occurs the recovery from a failure. A computer network should be scalable means it should always allow to add new nodes to the already existing network. A computer network should be secure so that the data transmitting over a network should be safe from unauthorized access. Feature of Computer Network
  • 6. Peer to peer Computer Network Architecture A Computer Architecture is a design in which all the computers are connected in a computer network are organized. Two most popular computer architecture are peer to peer and client- server architecture. Peer to peer architecture: Client-Server architecture: In which nodes are interconnected with each other and share resources with each other without the central controlling server. A central computer acts as hub and serves all the requests from client computer. All the shared data is stored in the server computer shared with client computer when a request is made. Client Server
  • 7. Hardware Components for the Networks 1. Cables: A wire that is used to connect more than one computer or other devices such as printers and scanner to each other. 2. Network Interface Card: NIC is used to format the data, send the data and receive the data at the receiving node. 3. Hub: Hub acts as a device that connects all the computer in a network to each other. Any request that comes from a client computer first received by hub and then hub transmit this request over a network. 4. Router: It is a device that forwards data packets between computer networks. Router joins multiple computer networks to each other.
  • 8. Computer Network Topology Geometric representation of how the computer are connected to each other is known as topology. There are five types of topology. Types of Network Topology Mesh Topology Star Topology Bus Topology Ring Topology Hybrid Topology
  • 9. Bus Topology Mesh Topology Star Topology Hybrid TopologyRing Topology
  • 10. Computer Network A computer network is a group of computers connected with each other through a transmission medium such as cable, wires etc. Types of computer network PAN The network used to connect different devices like connect pc, mobile, PDA to one another. This type of network has not wide range. LAN Local area network is a group of computers connected with each other in a small places such as school, hospital, apartment etc. In metropolitan network various LAN are connected with each other through telephone lines. MAN WAN Wide area network provides long distance transmission of data. The size of the WAN is larger than LAN and MAN. A WAN can cover country, continent.
  • 11. CRITERIA LAN MAN WAN Distance • Limited • 2500m-2miles • Limited • 200km • Unlimited Speed • High • Excess of 10mbps • -10, 100 and 1000 are standards. • High • 100mbps • Slower • 1-5mbps Media • Twisted-pair wires • Fibres optic cable • Wireless • Twisted-pair wires • Fibres optic cable • Coascial cable • Fibres optic cable • Wireless to include satellite Example • Ethernet • Wifi • Cable TV network • Internet
  • 12. OSI MODEL • OSI Model stands for Open System Inerconnection model. • OSI Model defines how data is transferred from one computer to another computer. • It describes how information from a software application in one computer moves through a physical medium to the software application in another computer. • OSI consists of seven layers, and each layer performs a particular network function. • OSI model was introduced by ISO in 1980. The OSI Model was first defined in raw in 1978 by Hubert Zimmermann but draft standard was published by ISO in 1980.
  • 13. Seven layers of OSI Model- Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Sender Receiver Software Layers Hardware Layer Heart of OSI
  • 14. • Application layer is used by computer applications such as Google chrome, outlook, firefox , Skype etc. • Application layer defines the protocols that are used by computer applications for example - HTTP and HTTPS protocol are used by web browser such as chrome, firefox etc. - FTP protocol is used for file transfer between two or more computers. - SMTP protocol is used for emails. • There are dozens of other protocol that forms the application layer. Application Layer:
  • 15. Function of presentation layer: Translation Encryption Compression 1. The data received from application layer is in form of characters and numbers such as 2367, CCBH. This layer converts these characters and number into machine understandable format. 2. SSL is used by the presentation layer for encryption and decryption. 3. Compress the data to small size so that it can be transferred faster. Presentation Layer:
  • 16. Authentication Authorization Session management 1. Before a computer can be connected to server, the computer has to provide user name and password for the authentication. 2. Session layer checks whether the connected computer is authorized to access of data. 3. Session also checks that the data which is received from the server in the form of data packets belongs to which application. Session Layer: Functions:
  • 17. Segementation Flow Control Error Control 1. Data received from Session Layer is divided into small data units called segments. Each segment contains the sender and receiver port number and sequence number. 2. It controls the flow of data. It checks the capability of the receiver device receiving capability before transmitting data. 3. Transport layer also performs error control using automatic repeat request. Transport Layer: Functions:
  • 18. Logical Addressing Routing Path Determination 1. Network layer assigns the sender and receiver IP address to the data packets before transmitting them so that the data packet reach the correct destination. 2. Routing is a method of transferring data packet from source to destination. 3. Network layer determines the optimal path for data transmission so that data can be transmitted faster to the receiver. OSPF , BGP protocols are best possible path for data delivery. Network Layer: Functions:
  • 19. 1. Data link layer receives the data from network layer. 2. Logical Addressing and Physical Addressing are two types of addressing done to the packets transfers from one computer to another computer. 3. Data unit in the data link is called frame. A frame is transferred from one computer to another and transmission is done through a transmission media such as wire, cable etc. Data Link Layer:
  • 20. Digital Transmission 1 Physical Layer is to transfer data in form of signals. A data can be either analog or digital. 2. Physical layer must need to convert the data to its digital signal. 3. It converts digital data to digital signal. A digital data is in form of binary sequences in the form of signals that can be transferred. Physical Layer: Functions:
  • 21. TCP / IP Model • The TCP/IP Model is developed before than OSI Model. • It was developed by Defence Project Research Agency. • TCP/IP stands for Transmission Control Protocol/ Internet Protocol. • TCP/IP Model has four layers different from OSI Model. Host -to-network Layer Network Layer Transport Layer Application Layer Layers in TCP/IP Model
  • 22. Application Presentation Sessions SMTP FTP DNS ……HTTP Transport SCTP TCP UDP Network IP ICMP IGMP ARPRARP Host-to-network Data Link Physical
  • 23. 1. Physical and Data Link Layer: Physical and Data Link Layers in TCP/IP model does not define any protocol , they support all the standard protocols. They are combined know as Host –to- network layer. A network in TCP/IP internetwork can be LAN orWAN. 2. Network Layer: In the network layer, the TCP/IP model supports internetworking protocol know as IP. The IP uses four protocols internally: • ARP • RARP • ICMP • IGMP 3. Transport Layer: Transport layer in TCP Model can be represented by three protocols: • TCP • UDP • SCTP These three protocols in transport layer are responsible for delivery of messages from one process to another. 4. Application Layer: This is the top most layer of TCP/IP model. It is used for intercation between user and application. There are several protocols used by the application layer for user interaction such as: • HTTP • SNMP • SMTP • DNS • FTP etc.
  • 24. Internet The internet is a global network of billion of computers and other electronic devices. With the internet, it’s possible to access almost any information, communicate with anyone else in the world, and do much more. When someone says a computer is online, it’s just another way of saying it is connected to the internet. The internet is an increasingly important part of everyday life for people around the world.
  • 25. Internet Governs by: Internet has no president or chief operating officer and it is governed by a number of authorities. Internet Society (ISOC) Internet Engineering Task Force (IETF) Internet Architecture Board (IAB) A voluntary membership organisation with an objective to promote global interchange of information. IAB authority is a group of invited volunteers. The IAB sets standard and provide internet addresses. IETF discusses the technical and operational problems in internet. No one pays to use the internet, instead everyone pays for it's part.
  • 26. Working of Internet: Computer A sends message to computer B’s IP address. Message is broken into smaller pieces called Packets. Packets are sent along packet routing network to correct IP Address. Packets are subject to Transfer Control Protocol to maintain Quality. Packets are received and reassembled at Computer B’s IP Address.
  • 27. Internet Service Provider: A company that provides a subscription service to enable the user or organisation to access the internet is ISP. An ISP has a network of computers permanently linked to the internet. If anyone wants to surf the web, use e-mail, or chat online, then he needs an internet provider through which computer can communicate with the rest of the world. ISP Web Email VOIPS
  • 28. Types of ISPs: Hosting ISPs: Offer email, FTP, web- hosting services, virtual machines, cloud and physical servers. Transit ISPs: Provide large amounts of bandwidth needed to connect hosting IPSs and access IPSs together. Access ISPs: Employ a variety of technologies to facilitate consumer connection to their network. Virtual ISPs: Purchase services from other ISPs to allow customers internet access. Free ISPs: Provide service free of charge and often display ads while users are connected.
  • 29. Examples of ISPs in India:
  • 30. Main Applications of Internet: Remote Login E-MAILS NEWS FILE TRANSFER RESEARCH Remote Login
  • 31. • It is the transmission of text-based messages among networked computers. • Ray Tomlinson is universally credited as the creator of email as part of a program for ARPANET in 1971. • Meanwhile in 1978, a 14- year old boy, Shiva Ayyadurai began his work on email system for the university of Medicine and Dentistry of New Jersey. Electronic Mail Ray Tomlinson
  • 32. Email Address: • An email address is a unique address, which identifies a location to send and receive email. It contains username followed by an @ symbol and then domain name, i.e, username@domainname. • Example: mansig094@gmail.com abc@yahooo.co.in Username Domain name Type of organisation Country name • Domain name it is the unique name that identifies an interest site or website. Domain name always have two or more parts separated by dots. The part on the left is most specific and the part on the right is the most general. .com: Commercial institution .edu: Educational institutions .gov: Government sites .mil: Military sites .net: Gateways .org: Private Organisations Suffix indicates Organisation Australia: .au China: .cn Germany: .de India: .in United States: .uk United Kingdom: .us Suffix indicates Geographic area
  • 34. Types of Email Account: POP ACCOUNT IMAP ACCOUNT EMAIL BOUNCER Types of Email Services: Priced Web-based Email Services Priced Web-based Email Services Free web- based email Services
  • 35. 1. NTA UGC NET/ SET/ JRF Paper 1 Teaching and Research Aptitude by KVS Madaan. 2. https://beginnersbook.com/2019/03/introduction-to-computer-network/ 3. https://store.hp.com/us/en/tech-takes/how-does-the-internet-work Reference