This document provides an overview of computer networks and the internet. It defines key network terms like LAN, WAN, topology, protocols, and internet connections. It describes different network topologies like star, bus, ring and their advantages. It explains internet services like www, ftp, telnet and email. It discusses how analog and digital data is transmitted over networks and the role of modems. The document is presented as part of a course on fundamental computer principles and programming.
demonstrate understanding of the requirements for creating a network.
Key Concepts: network – network topology
• Explain the principles of networking, describe types of networks, explain basic networking concepts and technologies, describe the physical components of a network.
• describe network topological, Identify Ethernet standards
demonstrate understanding of the requirements for creating a network.
Key Concepts: network – network topology
• Explain the principles of networking, describe types of networks, explain basic networking concepts and technologies, describe the physical components of a network.
• describe network topological, Identify Ethernet standards
How to Promote and Market Your Student Newspaper or Creating a Public Relatio...Texas Wesleyan University
College student media miss an opportunity to grab more readers and more attention when they don\'t have IMC plans. This presentation helps build a basic plan to increase circulation and readership.
Newspaper Display Advertising is the most common used advertising platform in the world. Every newspaper contains many ads inside them and provides useful information to the customers
Stacy Landreth Grau, a professor of professional practice at TCU's Neeley School of Business, gave this presentation at a marketing and branding workshop for the Texas Center for Community Journalism on March 10, 2011.
DECISION MAKING PROCESS ON PURCHASING A NEWSPAPER Gyaneshwar Reddy
The reading habits are changing as a result of the advent of networked electronic services. With an increasing amount of time spent in reading electronic documents, a screen-based reading behaviour is emerging. Without opening the pages of books or newspapers, e-documents enable to read about interesting topics, fresh news, and any kind of information. Without going to a library or a bookstore, we can find books to read. Hence research is required to answer the question whether the Internet is threat or a supplement to the traditional reading habits with reference to the advantages and shortcomings of Internet based reading habits.
Real estate has proven itself to be an assured revenue model for the media, especially the newspaper industry in particular. It has helped the industry to tackle the financial crisis many at times. Many newspapers across the globe have incorporated their own real estate platform and stayed afloat in the unworthy business scenarios.
This presentation is from Raconteur's invite-only event at The Ivy Club, London on February 13, 2015 to senior marketers and brand strategists on the ROI of print, emphasising the value of high quality, sector-niche, long-form print journalism.
Marketing Portfolio for Ad Portal MarketingRobert Langius
Marketing Portfolio for Ad Portal Marketing: Clients included Jan Marini, Cutera, Syneron, and many others. marketing portfolio
Marketing Collateral:
Ads By Campaign Billboard Advertising
Brochures & Inserts
Counter displays
Postcards
Folded Flyers
Posters
Business Cards
Direct Mail
Newsletters
Email Marketing
Newspaper ads
Magazine Ads
Referral Cards
Appointment Cards
Brochure & Pocket Folders
How to Promote and Market Your Student Newspaper or Creating a Public Relatio...Texas Wesleyan University
College student media miss an opportunity to grab more readers and more attention when they don\'t have IMC plans. This presentation helps build a basic plan to increase circulation and readership.
Newspaper Display Advertising is the most common used advertising platform in the world. Every newspaper contains many ads inside them and provides useful information to the customers
Stacy Landreth Grau, a professor of professional practice at TCU's Neeley School of Business, gave this presentation at a marketing and branding workshop for the Texas Center for Community Journalism on March 10, 2011.
DECISION MAKING PROCESS ON PURCHASING A NEWSPAPER Gyaneshwar Reddy
The reading habits are changing as a result of the advent of networked electronic services. With an increasing amount of time spent in reading electronic documents, a screen-based reading behaviour is emerging. Without opening the pages of books or newspapers, e-documents enable to read about interesting topics, fresh news, and any kind of information. Without going to a library or a bookstore, we can find books to read. Hence research is required to answer the question whether the Internet is threat or a supplement to the traditional reading habits with reference to the advantages and shortcomings of Internet based reading habits.
Real estate has proven itself to be an assured revenue model for the media, especially the newspaper industry in particular. It has helped the industry to tackle the financial crisis many at times. Many newspapers across the globe have incorporated their own real estate platform and stayed afloat in the unworthy business scenarios.
This presentation is from Raconteur's invite-only event at The Ivy Club, London on February 13, 2015 to senior marketers and brand strategists on the ROI of print, emphasising the value of high quality, sector-niche, long-form print journalism.
Marketing Portfolio for Ad Portal MarketingRobert Langius
Marketing Portfolio for Ad Portal Marketing: Clients included Jan Marini, Cutera, Syneron, and many others. marketing portfolio
Marketing Collateral:
Ads By Campaign Billboard Advertising
Brochures & Inserts
Counter displays
Postcards
Folded Flyers
Posters
Business Cards
Direct Mail
Newsletters
Email Marketing
Newspaper ads
Magazine Ads
Referral Cards
Appointment Cards
Brochure & Pocket Folders
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
Department of Computer Application- Advanced computer network
Locations
Resource-Sharing Functions and Benefits
Resource sharing
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Cryptographic Building Blocks
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
1. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
COMP 107
FUNDAMENTAL COMPUTER
PRINCIPLE
&
PROGRAMMING
Chapter II
By
D.Balaganesh
Credit Hours
2. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Network
• Network
one computer connected to more then one
computer is called Network
1/26/2014
Balaganesh -Lincoln University
2
3. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Advantages of networking
•
•
•
•
•
•
•
•
Connectivity and Communication
Data Sharing
Hardware Sharing
Internet Access
Internet Access Sharing
Data Security and Management
Performance Enhancement and Balancing
Entertainment
1/26/2014
Balaganesh -Lincoln University
3
4. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Network
• Network: A set of devices (nodes) connected by communication links
• Node: Computer, printer, or any device capable of sending and/or
receiving data
• To be considered effective and efficient, a network must meet a
number of criteria
1/26/2014
Balaganesh -Lincoln University
1-4
6. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Type of Connection
• Point-to-point
– Dedicated link between two devices
– The entire capacity of the channel is reserved
– Ex) Microwave link, TV remote control
• Multipoint
– More than two devices share a single link
– Capacity of the channel is either
• Spatially shared: Devices can use the link simultaneously
• Timeshare: Users take turns
1/26/2014
Balaganesh -Lincoln University
1-6
8. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Mesh Topology
• Dedicated point-to-point link to
every other nodes
• A mesh network with n nodes
has n(n-1)/2 links. A node has
n-1 I/O ports (links)
• Advantages: No traffic
problems, robust, security, easy
fault identification & isolation
• Disadvantages: Difficult
installation/reconfiguration,
space, cost
1/26/2014
Balaganesh -Lincoln University
1-8
9. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Star Topology
•
•
•
•
Dedicated point-to-point link only to a central controller, called a hub
Hub acts as an exchange: No direct traffic between devices
Advantages: Less expensive, robust
Disadvantages: dependency of the whole on one single point, the hub
1/26/2014
Balaganesh -Lincoln University
1-9
10. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Bus Topology
•
•
•
•
•
One long cable that links all nodes
tap, drop line, cable end
limit on the # of devices, distance between nodes
Advantages: Easy installation, cheap
Disadvantages: Difficult reconfiguration, no fault isolation, a fault or
break in the bus stops all transmission
1/26/2014
Balaganesh -Lincoln University
1-10
11. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Ring Topology
•
•
•
•
Dedicated point-to-point link only with the two nodes on each sides
One direction, repeater
Advantages: Easy reconfiguration, fault isolation
Disadvantage: Unidirectional traffic, a break in the ring cab disable the
entire network
1/26/2014
Balaganesh -Lincoln University
1-11
12. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Hybrid Topology
•
•
Example: Main star topology with each branch connecting several stations
in a bus topology
To share the advantages from various topologies
1/26/2014
Balaganesh -Lincoln University
1-12
14. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
LAN
•
•
•
•
Usually privately owned
A network for a single office, building, or campus a few Km
Common LAN topologies: bus, ring, star
An isolated LAN connecting 12 computers to a hub in a closet
1/26/2014
Balaganesh -Lincoln University
1-14
15. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
MAN
• Designed to extend to an entire city
• Cable TV network, a company’s connected LANs
• Owned by a private or a public company
1/26/2014
Balaganesh -Lincoln University
1-15
16. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
WAN
• Long distance transmission, e.g., a country, a continent, the world
• Enterprise network: A WAN that is owned and used by one company
1/26/2014
Balaganesh -Lincoln University
1-16
17. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internetwork
• Internetwork (internet) : two or more networks are
connected by internetworking devices
• Internetworking devices: router, gateway, etc.
• The Internet: a specific worldwide network
1/26/2014
Balaganesh -Lincoln University
1-17
18. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
•
Credit Hours
Internetwork WANs and two LANs
Example
A heterogeneous network : four
1/26/2014
Balaganesh -Lincoln University
1-18
19. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Network Vs Internet
Internet
Network of network is called Internet
1/26/2014
Balaganesh -Lincoln University
19
20. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
•
•
•
•
•
•
•
•
Credit Hours
Internet programming language
E-mail
Internet
SMS(short message service)
Social networking sites
Websites
Blog
- Share your life's stories, videos and photos
VOIP
- Voice over Internet Protocol
Podcast - type of digital media consisting of an episodic series of audio,
video, PDF
• Rss(Really simple Syndication) its security bulletins, advisories, magazine
related alerts for IT professionals.
1/26/2014
TechNet provides RSS feeds for
features, and other security-
Balaganesh -Lincoln University
20
21. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
The Internet
• Internet is a network of interconnected
computers that is now global
• Internet born in 1969 - called ARPANET
• 1969 ARPANET was connection of computers
at UCLA, Stanford, UCSB, Univ. of Utah
1/26/2014
Balaganesh -Lincoln University
21
22. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
The Advanced Research Projects Agency
Network
• In 1969, the U.S. Defence Department funded
a project to develop a network, which can
withstand the bombing. Basically the idea was
to develop a very secure network which can
work even after a nuclear attack. This project
was known as ARPANET.
1/26/2014
Balaganesh -Lincoln University
22
23. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internet Connections
Various technologies available to connect a home computer to
the Internet
Phone modem converts computer data into an analog audio signal
for transfer over a telephone line, and then a modem at the
destination converts it back again into data
Digital subscriber line (DSL) uses regular copper phone lines to
transfer digital data to and from the phone company’s central office
Cable modem uses the same line that your cable TV signals come in
on to transfer the data back and forth
23
1/26/2014
Balaganesh -Lincoln University
25. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internet Connections
Broadband
A connection in which transfer speeds are faster than
768 kilobits per second
– DSL connections and cable modems are
broadband connections
– The speed for downloads (getting data from the
Internet to your home computer) may not be the
same as uploads (sending data from your home
computer to the Internet)
25
1/26/2014
Balaganesh -Lincoln University
26. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Data
• Analog data
– Voice
– Images
• Digital data
– Text
– Digitized voice or images
1/26/2014
Balaganesh -Lincoln University
26
28. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Analog Signaling
amplitude (volts)
1 cycle
• represented by sine waves
phase
difference
time
(sec)
frequency (hertz)
= cycles per second
1/26/2014
Balaganesh -Lincoln University
28
29. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Three Components of Data
Communication
Credit Hours
• Data
– Analog: Continuous value data (sound, light, temperature)
– Digital: Discrete value (text, integers, symbols)
• Signal
– Analog: Continuously varying electromagnetic wave
– Digital: Series of voltage pulses (square wave)
• Transmission
– Analog: Works the same for analog or digital signals
– Digital: Used only with digital signals
1/26/2014
Balaganesh -Lincoln University
29
30. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Modem
• Anlog
• Digital
• Modulation
– Digital to analog conversion
• Demodulation
– Analog to Digital Conversion
Modulation and demodulation is called Modem
31. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Modem Internet Connections
• Dial-up connection via modem (56K)
• Cable modems
– Network card and cable modem required
– Always-on and 25 times faster than dial-up
1/26/2014
Balaganesh -Lincoln University
32. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
•
Credit Hours
Faster Internet Connections
ISDN (Integrated Services Digital
Network)
– 64K or 128K
– Always-on and expensive
• DSL (Digital Subscriber Line)
– Up to 125 times faster than dialup
• DSS (Digital Satellite Service)
– 500K
1/26/2014
Need proximity to a telephone switching station
Balaganesh -Lincoln University
33. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
ISP (Internet Service Provider)
If you want to connect to the Internet, you need
to subscribe via an Internet Service Provider.
The ISP gives you a connection to the Internet
either via your telephone line or via a special
digital high speed line. An example of a
popular ISP is AOL (America On-Line).
1/26/2014
Balaganesh -Lincoln University
33
34. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internet Service Provider (ISP)
• Provides internet access to businesses,
•
•
•
•
•
1/26/2014
organizations and individuals
Provides telecommunications equipment
User ID and password required
Connects you to backbone
E-mail account monthly fee
Should have local access telephone
numbers
Balaganesh -Lincoln University
35. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
SERVICES OF INTERNET
•
•
•
•
WWW
FTP
Telnet
E-mail
1/26/2014
Balaganesh -Lincoln University
35
36. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
What is the difference between the World Wide Web (WWW) and
the Internet?
WWW is the acronym for the World Wide Web. It is also commonly
known as ‘The Web’. The WWW is hypertext based information retrieval
tool
• The World Wide Web (WWW) is just a small part of
the Internet as a whole.
• The Internet, relates to all the hardware and software
involved, and as well as including the WWW, also
includes FTP (File Transfer Protocol – more about this
later), email and newsgroups.
• The WWW is basically the text and pictures which you
can view using your web browser, such as Microsoft
1/26/2014
36
Internet Explorer, orBalaganesh -Lincoln University
Netscape Navigator.
37. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
•
•
•
•
•
1/26/2014
World Wide Web Basics
Files interconnected via hypertext
Web pages make up a web site
Home Page
Links or hyperlinks
Web servers
Balaganesh -Lincoln University
Credit Hours
38. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
FTP (File Transfer Protocol)
File Transfer Protocol, is an Internet utility software used to upload
and download files. It gives access to directories or folders on remote
computers and allows software, data and text files to be transferred
between different kinds of computers.
• FTP is just a way of transferring data from one place to another
over the Internet. If is often used for downloading large files
from a web site. You do not really need to know anything
about how it works, in most cases you willclick on a link within
a web page, and your web browser (such as Microsoft
Internet Explorer) will take care of the FTP transfer for you, all
you have to decide is where to store the file which you wish to
1/26/2014
Balaganesh -Lincoln University
38
download.
39. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
The basic objectives of FTP are
• to give flexibility and promote sharing of computer
programs, files and data
• to transfer data reliably and more efficiently over
network
• to encourage implicit or indirect use of remote
computers using Internet
• to shield a user from variations in file storage
systems among hosts
1/26/2014
Balaganesh -Lincoln University
39
40. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Telnet (Remote Computing)
• Telnet (Remote Computing)
Telnet or remote computing is telecommunication utility software,
which uses available telecommunication facility and allows you to
become a user on a remote computer. Once you gain access to the
remote computer, you can use it for the intended purpose. The
TELNET works in a very step by step procedure. The commands
typed on the client computer are sent to the local Internet Service
Provider (ISP), and then from the ISP to the remote computer that
you have gained access. Most of the ISP provides facility to TELENET
into your own account from another city and check your e-mail
while you are traveling or away on business
1/26/2014
Balaganesh -Lincoln University
40
41. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
E-Mail (Electronic Mail)
E-mail or Electronic mail is a paperless method of sending messages,
notes or letters from one person to another or even many
people at the same time via Internet. E-mail is very fast compared to
the normal post. E-mail messages usually take only few seconds to
arrive at their destination
Features of E-mail:
• One-to-one or one-to-many communications
• Instant communications
• Physical presence of recipient is not required
• Most inexpensive mail services, 24-hours a day and seven days a week
• Encourages informal communications University
1/26/2014
Balaganesh -Lincoln
41
42. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Voice Messaging
Voice Messaging
It is a new communication approach which is similar to electronic mail except
that it is audio message rather than text messages that are processed. A
sender
speaks into a telephone rather than typing, giving the name of the recipient
and
the message. That sender's voice signal is then digitalised and stored. The
system
can then either deliver the message at a specified time in future or it can be
retrieved from a database by the recipient.
1/26/2014
Balaganesh -Lincoln University
42
43. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
E-Commerce
Electronic commerce or e-commerce as it is popularly known refers to the
paperless exchange of business information using Electronic Data
Interchange,
Electronic mail, Electronic Bulletin Boards, Electronic Fund Transfer and other
network based technologies. Electronic Commerce (EC) not only automates
manual process and paper transactions, but it also helps organisations to
move
into a fully electronic environment and change the way they usually operate.
1/26/2014
Balaganesh -Lincoln University
43
44. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internet Important Terms
•
•
•
•
•
•
•
HTTP
URL
Hyperlink
Browser
Cookies
Internet cache
SECURITY
1/26/2014
Balaganesh -Lincoln University
44
45. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
HTTP (Hypertext Transfer Protocol)
• HTTP stands for Hypertext Transfer Protocol.
This is the language your web browser uses to
request pages & graphics from the web server.
You can see that your web browser is using
the HTTP protocol when it is shown at the
start of a web address such as
http://www.yahoo.com
1/26/2014
Balaganesh -Lincoln University
45
46. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
URL (Uniform Resource Locator)
• The URL (Uniform Resource Locator) is just
another name for a web address.
• The URL consists of the name of the protocol
(usually HTTP or FTP) followed by the address
of the computer you want to connect to, e.g. a
URL of “ftp://ftp.cdrom.com” would instruct
your web browser to use the FTP protocol to
connect to the computer called
ftp.cdrom.com.
1/26/2014
Balaganesh -Lincoln University
46
47. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
• URLWorld
Credit Hours
Wide Web Basics
– No spaces and Case sensitive
– HTTP (Hypertext Transfer Protocol)
• HTML (Hypertext Markup Language)
– .htm or .html file extension
http://www.cnn.com/showbiz/movies.htm
Web
protocol
1/26/2014
standard
Web
Folder
server
name
name Balaganesh -Lincoln University
Document name
and filename
extension
48. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Network Addresses
Hostname
A name made up of words separated by dots that
uniquely identifies a computer on the Internet
IP address
An address made up of four one-byte numeric values
separated by dots that uniquely identifies a computer
on the Internet
Is there a correspondence between the parts
of a hostname and an IP address?
1/26/2014
Balaganesh -Lincoln University
48
49. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Host number
Domain Name System
The part of the IP address that specifies a particular
host (machine) on the network Yes, but what is it?
Domain name
The part of a hostname that specifies a specific
organization or group
Top-level domain (TLD)
The last section of a domain name that specifies the
type of organization or its country of origin
1/26/2014
Balaganesh -Lincoln University
49
50. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Domain Name System
matisse.csc.villanova.edu
Computer
name
Domain name
1/26/2014
TLD
Balaganesh -Lincoln University
50
51. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Domain Name System
Figure 15.10 Top-level domains, including some relatively new ones
1/26/2014
Balaganesh -Lincoln University
51
52. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Domain Namethan the United States
System
Organizations based in countries other
use a top-level domain that corresponds to their two-letter
country codes
Do you
email
someone
in another
country?
Figure 15.11
Some of the top-level domain names
based on country codes
1/26/2014
Balaganesh -Lincoln University
52
53. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Domain Name System
Domain name system (DNS)
A distributed system for managing hostname resolution
Domain name server
A computer that attempts to translate a hostname into
an IP address
Should the tables containing hostname/IP
mappings be sorted or unsorted? Why?
1/26/2014
Balaganesh -Lincoln University
53
54. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Domain Name Addressing
• Domain names can include any number of parts separated by
periods, however most domain names currently in use have
only three or four parts.
• Domain names follow hierarchical model that you can follow
from top to bottom if you read the name from the right to the
left.
• For example, the domain name gsb.uchicago.edu is the
computer connected to the Internet at the Graduate School of
Business (gsb), which is an academic unit of the University of
Chicago (uchicago), which is an educational institution (edu).
• No other computer on the Internet has the same domain name.
1/26/2014
Balaganesh -Lincoln University
54
55. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Uniform Resource Locators
Credit Hours
• The IP address and the domain name each identify a particular
computer on the Internet.
• However, they do not indicate where a Web page’s HTML
document resides on that computer.
• To identify a Web pages exact location, Web browsers rely on
Uniform Resource Locator (URL).
• URL is a four-part addressing scheme that tells the Web
browser:
What transfer protocol to use for transporting the file
The domain name of the computer on which the file resides
The pathname of the folder or directory on the computer on
which the file resides
The name of the file
1/26/2014
Balaganesh -Lincoln University
55
56. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Structure of a Uniform Resource Locators
pathname
protocol
http://www.chicagosymphony.org/civicconcerts/index.htm
Domain name
filename
http => Hypertext Transfer Protocol
1/26/2014
Balaganesh -Lincoln University
56
57. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Hyperlink
A hyperlink is a piece of text (or a graphic) on a
Web page, which when clicked on will
automatically:
- Take you to a different part of the same page
- Take you to a different page within the Web
site
1/26/2014
Balaganesh -Lincoln University
57
58. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
What is a web browser?
Web browsing applications include ‘Internet
Explorer’ (from Microsoft) and ‘Netscape
Navigator/Communicator’. In both cases there
are many different versions, and you will find
that the later versions offer much more
versatility as well as a better range of built-in
features. The web browser allows you to view
web pages
1/26/2014
Balaganesh -Lincoln University
58
59. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
• What are cookies?
• Some web sites can store hidden information about you on your hard disk
using cookies. This information is stored in small text file. Cookies can be
useful, for instance, a site may store your preferences about a web site, so
that when you re-visit the site your preferences can be accessed
automatically. Cookies are used by some web sites to identify you; this saves
you having to “log in” to the web site each time you visit.
1/26/2014
Balaganesh -Lincoln University
59
60. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
What is an Internet cache?
Each time you display a web site within your web browser, a copy of the
information (both text and pictures) is saved on your hard disk. The reason
for this is that the next time you want to re-visit the site, the information is
quickly loaded from the copy on your hard disk, rather than slowly from the
actual Internet site.
• As pictures are stored in the cache, if you are visiting a site which has many
separate web pages, with say a company logo on each page, then all
subsequent pages from that site will load a little faster as the logo graphics
will load from the cache, not via the Internet
1/26/2014
Balaganesh -Lincoln University
60
61. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
SECURITY CONSIDERATIONS
• What is a digital certificate?
• A digital certificate is used to encrypt information for secure transmission
across the Internet. A digital certificate can be used to create a digital
signature for an email, the signature guarantees the identity of sender, and it
also ensures that the message cannot be tampered with in transit. A digital
certificate can be purchased from a certificate authority such as
www.verisign.com who will verify your identity. Digital certificates are used
by Internet based shopping web sites to encrypt your credit card details so
they cannot be intercepted as they travel the Internet. You can view the
digital certificate for a secure web site by double clicking on the padlock in
the web browser status bar, e.g. https://www.paypal.com
1/26/2014
Balaganesh -Lincoln University
61
62. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
• What is encryption?
• Encryption is a means of 'scrambling' an email message. It is used to make
a
message more secure, so that only the intended recipient of the message will
be able to read the message. There are many means of enabling this
encryption, both via hardware and software. A famous encryption program is
called PGP(Pretty Good Privacy)
1/26/2014
Balaganesh -Lincoln University
62
63. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
• What is a firewall?
• A fire wall consists of software and hardware protection against invasion
via
the Internet. In most larger companies any connection to the Internet
automatically goes through a firewall which would have been installed and
customised by the companies technical IT team. In most cases you will be
unaware of the firewall existence.
1/26/2014
Balaganesh -Lincoln University
63
64. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internet vs Interanet
• Intranet is an internal private computer network or
connection of one or more computer networks, whose
use and access is restricted to an organization and its
employees or members.. Such an intranet, mostly
operates through a website, run by a local server,
acting as a resource sharing medium. You could call it a
scaled-down private Internet.
• Internet is a network of more than billion computers
spread worldwide! It uses an ever improving set of
Internet protocols (HTTP, FTP, SMTP, etc.) to transfer
data. Unlike the intranet, the Internet and the
information sharing service called the 'World Wide
1/26/2014
Balaganesh -Lincoln University
64
Web',
65. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Modem Internet Connections
• Dial-up connection via modem (56K)
• Cable modems
– Network card and cable modem required
– Always-on and 25 times faster than dial-up
1/26/2014
Balaganesh -Lincoln University
66. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
•
Credit Hours
Faster Internet Connections
ISDN (Integrated Services Digital
Network)
– 64K or 128K
– Always-on and expensive
• DSL (Digital Subscriber Line)
– Up to 125 times faster than dialup
• DSS (Digital Satellite Service)
– 500K
1/26/2014
Need proximity to a telephone switching station
Balaganesh -Lincoln University
67. Subject Name
Code
FUNDAMENTAL COMPUTER PRINCIPLE & PROGRAMMING
Credit Hours
Internet vs Interanet
• Intranet is an internal private computer network or
connection of one or more computer networks, whose
use and access is restricted to an organization and its
employees or members.. Such an intranet, mostly
operates through a website, run by a local server,
acting as a resource sharing medium. You could call it a
scaled-down private Internet.
• Internet is a network of more than billion computers
spread worldwide! It uses an ever improving set of
Internet protocols (HTTP, FTP, SMTP, etc.) to transfer
data. Unlike the intranet, the Internet and the
information sharing service called the 'World Wide
1/26/2014
Balaganesh -Lincoln University
67
Web',