The document discusses networking and the internet. It defines networking as connecting two or more computers and describes different types of network topologies including mesh, star, bus, ring, and hybrid. It also defines local, metropolitan, and wide area networks. The internet is defined as a network of interconnected networks and its origins from ARPANET are discussed. Common internet applications and connections like broadband, modems, and ISPs are also summarized.
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes and were large, expensive machines. The second generation introduced transistors, symbolic programming, and memory. The third generation saw the development of integrated circuits and interaction through keyboards and monitors. The fourth generation included microprocessors and single-chip CPUs, as well as GUIs. The fifth generation involves artificial intelligence and parallel processing.
This document provides an overview of fundamental computer principles and programming. It discusses the basic components and operations of a computer, including input, processing, output, and storage. The main components are the central processing unit, memory, storage devices, and input/output devices. It also covers the differences between hardware and software, types of software including operating systems and applications. Common applications are described like word processing, spreadsheets, and presentations.
This document provides an overview of computer fundamentals and components. It discusses how computers accept data as input, process it, and provide information as output. The main components of a computer are the input and output devices, central processing unit, memory, and storage devices. It also distinguishes between hardware, the physical parts of a computer, and software, the programs and instructions that make the hardware function. The two main types of software are system software like operating systems, and application software for specific tasks.
This document provides an introduction to computers, the Internet, and the World Wide Web. It outlines the objectives to be covered, which include basic hardware and software concepts, programming languages, object-oriented programming, and the history of C++, Java, and the Internet. The document then covers sections on computer organization, operating systems, personal and distributed computing, programming languages from machine code to high-level languages, and the histories of C, C++, and Java. It emphasizes building programs using existing reusable classes and functions from libraries to avoid reinventing components.
The document provides an overview of the Internet, including its definition, evolution, advantages, and disadvantages. It discusses different types of Internet connections such as dial-up, broadband, DSL, fiber, wireless, cable, Wi-Fi, and satellite. It also describes an Internet service provider's role in providing access to the Internet and lists some examples of ISPs in Malaysia. Finally, it defines Internet Protocol (IP) addresses and their relationship to domain names in allowing users to locate and identify computers on the network.
This document provides an overview of computer communication networks. It discusses what a computer network is, the advantages of computer networks like sharing resources and files, and the communication cycle involved. It also covers some key aspects of computer networks like performance, reliability, security, and the goals of sharing resources, high reliability, and cost savings. The document summarizes different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also discusses transmission modes in computer networks like simplex, half duplex, and full duplex modes.
This document outlines the lectures in an introduction to computer systems architecture and programming course. It covers topics like data representation, Boolean logic, data manipulation, operating systems, computer networks, and programming in Java. The lectures also include assessments and exam. The document provides historical background on the evolution of computing, from the abacus to early mechanical calculators and computers like the Difference Engine, ENIAC, and development of integrated circuits. It describes the Von Neumann architecture including stored program, instruction set, CPU components, and the Von Neumann bottleneck.
This document provides an overview of computer programming and the history of computers. It discusses:
1) The history of computers from the first to fifth generations, describing the components and technologies used in each generation.
2) A block diagram of a basic computer system including the input, output, central processing, and memory units.
3) The components that make up a computer system including the motherboard, processor, memory, storage drives, power supply, and peripherals.
4) An introduction to computer programming including definitions and the first programming languages.
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes and were large, expensive machines. The second generation introduced transistors, symbolic programming, and memory. The third generation saw the development of integrated circuits and interaction through keyboards and monitors. The fourth generation included microprocessors and single-chip CPUs, as well as GUIs. The fifth generation involves artificial intelligence and parallel processing.
This document provides an overview of fundamental computer principles and programming. It discusses the basic components and operations of a computer, including input, processing, output, and storage. The main components are the central processing unit, memory, storage devices, and input/output devices. It also covers the differences between hardware and software, types of software including operating systems and applications. Common applications are described like word processing, spreadsheets, and presentations.
This document provides an overview of computer fundamentals and components. It discusses how computers accept data as input, process it, and provide information as output. The main components of a computer are the input and output devices, central processing unit, memory, and storage devices. It also distinguishes between hardware, the physical parts of a computer, and software, the programs and instructions that make the hardware function. The two main types of software are system software like operating systems, and application software for specific tasks.
This document provides an introduction to computers, the Internet, and the World Wide Web. It outlines the objectives to be covered, which include basic hardware and software concepts, programming languages, object-oriented programming, and the history of C++, Java, and the Internet. The document then covers sections on computer organization, operating systems, personal and distributed computing, programming languages from machine code to high-level languages, and the histories of C, C++, and Java. It emphasizes building programs using existing reusable classes and functions from libraries to avoid reinventing components.
The document provides an overview of the Internet, including its definition, evolution, advantages, and disadvantages. It discusses different types of Internet connections such as dial-up, broadband, DSL, fiber, wireless, cable, Wi-Fi, and satellite. It also describes an Internet service provider's role in providing access to the Internet and lists some examples of ISPs in Malaysia. Finally, it defines Internet Protocol (IP) addresses and their relationship to domain names in allowing users to locate and identify computers on the network.
This document provides an overview of computer communication networks. It discusses what a computer network is, the advantages of computer networks like sharing resources and files, and the communication cycle involved. It also covers some key aspects of computer networks like performance, reliability, security, and the goals of sharing resources, high reliability, and cost savings. The document summarizes different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also discusses transmission modes in computer networks like simplex, half duplex, and full duplex modes.
This document outlines the lectures in an introduction to computer systems architecture and programming course. It covers topics like data representation, Boolean logic, data manipulation, operating systems, computer networks, and programming in Java. The lectures also include assessments and exam. The document provides historical background on the evolution of computing, from the abacus to early mechanical calculators and computers like the Difference Engine, ENIAC, and development of integrated circuits. It describes the Von Neumann architecture including stored program, instruction set, CPU components, and the Von Neumann bottleneck.
This document provides an overview of computer programming and the history of computers. It discusses:
1) The history of computers from the first to fifth generations, describing the components and technologies used in each generation.
2) A block diagram of a basic computer system including the input, output, central processing, and memory units.
3) The components that make up a computer system including the motherboard, processor, memory, storage drives, power supply, and peripherals.
4) An introduction to computer programming including definitions and the first programming languages.
The document discusses the history of computers from the zeroth generation to the fourth generation. It describes the key characteristics of each generation including the hardware technologies used and developments in operating systems and software. It also covers topics like computer classifications, processors, notebooks, booting processes, graphical user interfaces, basic computer organization, CPU operations, and input/output devices.
The document provides an overview of the key concepts related to the Internet, intranets, and extranets. It describes how the Internet works by connecting networks together and transmitting data through packets. It discusses the development of the World Wide Web and how browsers, search engines, and programming languages facilitate use of the Web. It also outlines common business and personal applications of the Internet and issues around privacy, security, and management that arise from its use.
The document provides an overview of the key concepts regarding the Internet, intranets, and extranets. It describes how the Internet works by connecting networks together and transmitting data through packets. It discusses the development of the World Wide Web and how it organizes Internet resources through hyperlinks. It also outlines common Internet applications like email, instant messaging, e-commerce, and social media; and how businesses can utilize tools like intranets.
Illustrate this Basic concept of Computer networks and
distributed systems, Goals of networking, General approaches of communication
within a network, Network classification, Uses & Network Software's.
This document outlines the key concepts and units for the course EC6009 - Advanced Computer Architecture. It covers five main units: (1) fundamentals of computer design, instruction level parallelism, (2) data level parallelism, (3) thread level parallelism, (4) memory and I/O, and (5) performance evaluation. The goals of the course are for students to understand performance of different architectures with respect to various parameters and techniques for improving performance like instruction level parallelism and exploiting data level parallelism.
This document discusses network topologies. It describes the bus, star, and ring network topologies. In a bus network, all computers and devices connect to a single central backbone cable. Data travels along the cable in both directions to all devices, but each device only accepts data addressed to it. Advantages are low cost and easy addition/removal of devices. A disadvantage is a cable break disables the whole network. Star and ring topologies are also introduced. The document focuses on network fundamentals including concepts, architectures, and layouts.
Computer Architecture is the set of pre-defined rules and methods that describes the functionality of computer system. In other words, a computer consists of both hardware and software and using some rules and methods for the interaction of both hardware and software of a computer is known as computer architecture. Copy the link given below and paste it in new browser window to get more information on Computer Architecture:-
http://www.transtutors.com/homework-help/computer-science/computer-architecture/
This document provides information about various internet services, including e-mail, instant messaging, VoIP, message boards, and FTP. It defines each service and provides examples. For email, it describes what email is, email addresses, and mailing lists. For instant messaging, it defines IM as a real-time internet conversation. For VoIP, it describes making phone calls over the internet. Message boards and newsgroups are described as online areas for discussion on particular topics. Finally, FTP is defined as a protocol for uploading and downloading files between computers using an FTP program. Examples of FTP programs are also provided.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
This document provides an overview of computer networks. It discusses what a network is and the need for networking. The key components of a network are workstations/nodes, servers, and network interface units. Networks have evolved over time from early networks like ARPANET to today's internet. Various transmission media and technologies are used for data communication across networks, including cables, wireless transmission, and satellite communication. The document also covers network devices, topologies, and protocols.
A network connects two or more computers together to share resources. Common network types include local area networks (LANs) within an office or building, metropolitan area networks (MANs) spanning a city, and wide area networks (WANs) connecting multiple LANs over a wide geographical area. Networks use physical cables or wireless technologies to transmit data and can be categorized based on their topology, protocols, and architecture. Benefits of networks include information and hardware sharing while risks include security issues and equipment failures.
The document provides an overview of computer networking, including definitions of key terms like computer network and network topology. It discusses why networks are needed, how they work, common network models like OSI and TCP/IP. It also covers topics like IP addressing, different network types (LAN, MAN, WAN), common network devices, applications, and security concerns.
This document provides an overview of computer networking concepts. It begins by defining a computer network and describing the key benefits of communication and resource sharing. It then covers different types of networks like LAN, WAN, WLAN, MAN, and SAN. Physical network topologies like bus, star, ring and mesh are explained. Common network hardware such as cables, connectors, switches and routers are outlined. The document also discusses network devices, protocols, IP addressing and network topologies implemented at the School of Information Communications and Technology.
A computer network connects two or more computers together to allow for sharing of resources like files, printers, and disk drives. The main components of a network include sender and receiver hosts, communication interfaces like switches and routers, communication channels like cables, and communication software. Networks can be classified based on their size and scope as local area networks (LANs), metropolitan area networks (MANs), or wide area networks (WANs). Common network topologies include bus, star, ring and mesh configurations.
A computer network connects multiple devices together to share resources and information. There are different types of networks including LANs, WANs, MANs, PANs, and VPNs. Network topology describes how devices are physically connected, with common topologies being bus, star, ring, mesh, and tree. Key networking hardware includes network interface cards, hubs, switches, bridges, and routers. Networks are measured based on latency, data transfer rate, bandwidth, and other performance parameters. Ethernet is a common standard used to connect devices via cables or wirelessly. IP addresses identify devices on the Internet or private networks.
Chapter 1 computer networking Class 12thHarsh Mathur
A computer network connects multiple devices together to share resources and exchange data. Common network types include personal area networks (PANs) covering small areas up to 10 meters, local area networks (LANs) spanning small offices or homes, and wide area networks (WANs) connecting larger geographic areas. Devices communicate over the network via wired or wireless transmission using various protocols like TCP/IP. Common networking devices that help establish and maintain connections include switches, routers, and wireless access points.
This slide deck was used for a 2-day short course at IIT Gandhinagar in Spring 2015. Being a 2-day course, it focuses more on a qualitative description of how we access the Internet.
This document provides an overview of a data communications course, including information about the professor, textbook, lecture notes, and course outline. It covers topics like the definition of data communications, the five components of a data communication system, direction of data flow (simplex, half-duplex, and full-duplex), different network types (LAN, MAN, WAN, internetwork), physical network topologies (mesh, star, bus, ring, hybrid), categories of networks, a brief history of the Internet, protocols, standards and standards organizations.
This document provides an overview of computer networks and the internet. It defines key network terms like LAN, WAN, topology, protocols, and internet connections. It describes different network topologies like star, bus, ring and their advantages. It explains internet services like www, ftp, telnet and email. It discusses how analog and digital data is transmitted over networks and the role of modems. The document is presented as part of a course on fundamental computer principles and programming.
This document provides an overview of computer networks and the TCP/IP protocol suite. It describes network criteria like performance and reliability. It discusses physical network structures like point-to-point, multipoint, mesh, star, bus and ring topologies. It also defines categories of networks such as local area networks (LANs), wide area networks (WANs) and metropolitan area networks (MANs). A key point is that the TCP/IP protocol suite, which controls the Internet, is organized into five layers: application, transport, internet, network interface and physical. The layers are described along with how a message travels through them.
The document discusses the history of computers from the zeroth generation to the fourth generation. It describes the key characteristics of each generation including the hardware technologies used and developments in operating systems and software. It also covers topics like computer classifications, processors, notebooks, booting processes, graphical user interfaces, basic computer organization, CPU operations, and input/output devices.
The document provides an overview of the key concepts related to the Internet, intranets, and extranets. It describes how the Internet works by connecting networks together and transmitting data through packets. It discusses the development of the World Wide Web and how browsers, search engines, and programming languages facilitate use of the Web. It also outlines common business and personal applications of the Internet and issues around privacy, security, and management that arise from its use.
The document provides an overview of the key concepts regarding the Internet, intranets, and extranets. It describes how the Internet works by connecting networks together and transmitting data through packets. It discusses the development of the World Wide Web and how it organizes Internet resources through hyperlinks. It also outlines common Internet applications like email, instant messaging, e-commerce, and social media; and how businesses can utilize tools like intranets.
Illustrate this Basic concept of Computer networks and
distributed systems, Goals of networking, General approaches of communication
within a network, Network classification, Uses & Network Software's.
This document outlines the key concepts and units for the course EC6009 - Advanced Computer Architecture. It covers five main units: (1) fundamentals of computer design, instruction level parallelism, (2) data level parallelism, (3) thread level parallelism, (4) memory and I/O, and (5) performance evaluation. The goals of the course are for students to understand performance of different architectures with respect to various parameters and techniques for improving performance like instruction level parallelism and exploiting data level parallelism.
This document discusses network topologies. It describes the bus, star, and ring network topologies. In a bus network, all computers and devices connect to a single central backbone cable. Data travels along the cable in both directions to all devices, but each device only accepts data addressed to it. Advantages are low cost and easy addition/removal of devices. A disadvantage is a cable break disables the whole network. Star and ring topologies are also introduced. The document focuses on network fundamentals including concepts, architectures, and layouts.
Computer Architecture is the set of pre-defined rules and methods that describes the functionality of computer system. In other words, a computer consists of both hardware and software and using some rules and methods for the interaction of both hardware and software of a computer is known as computer architecture. Copy the link given below and paste it in new browser window to get more information on Computer Architecture:-
http://www.transtutors.com/homework-help/computer-science/computer-architecture/
This document provides information about various internet services, including e-mail, instant messaging, VoIP, message boards, and FTP. It defines each service and provides examples. For email, it describes what email is, email addresses, and mailing lists. For instant messaging, it defines IM as a real-time internet conversation. For VoIP, it describes making phone calls over the internet. Message boards and newsgroups are described as online areas for discussion on particular topics. Finally, FTP is defined as a protocol for uploading and downloading files between computers using an FTP program. Examples of FTP programs are also provided.
This is a notes about basic introduction of OSI Model & TCP/IP Model. It contain details about the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
This document provides an overview of computer networks. It discusses what a network is and the need for networking. The key components of a network are workstations/nodes, servers, and network interface units. Networks have evolved over time from early networks like ARPANET to today's internet. Various transmission media and technologies are used for data communication across networks, including cables, wireless transmission, and satellite communication. The document also covers network devices, topologies, and protocols.
A network connects two or more computers together to share resources. Common network types include local area networks (LANs) within an office or building, metropolitan area networks (MANs) spanning a city, and wide area networks (WANs) connecting multiple LANs over a wide geographical area. Networks use physical cables or wireless technologies to transmit data and can be categorized based on their topology, protocols, and architecture. Benefits of networks include information and hardware sharing while risks include security issues and equipment failures.
The document provides an overview of computer networking, including definitions of key terms like computer network and network topology. It discusses why networks are needed, how they work, common network models like OSI and TCP/IP. It also covers topics like IP addressing, different network types (LAN, MAN, WAN), common network devices, applications, and security concerns.
This document provides an overview of computer networking concepts. It begins by defining a computer network and describing the key benefits of communication and resource sharing. It then covers different types of networks like LAN, WAN, WLAN, MAN, and SAN. Physical network topologies like bus, star, ring and mesh are explained. Common network hardware such as cables, connectors, switches and routers are outlined. The document also discusses network devices, protocols, IP addressing and network topologies implemented at the School of Information Communications and Technology.
A computer network connects two or more computers together to allow for sharing of resources like files, printers, and disk drives. The main components of a network include sender and receiver hosts, communication interfaces like switches and routers, communication channels like cables, and communication software. Networks can be classified based on their size and scope as local area networks (LANs), metropolitan area networks (MANs), or wide area networks (WANs). Common network topologies include bus, star, ring and mesh configurations.
A computer network connects multiple devices together to share resources and information. There are different types of networks including LANs, WANs, MANs, PANs, and VPNs. Network topology describes how devices are physically connected, with common topologies being bus, star, ring, mesh, and tree. Key networking hardware includes network interface cards, hubs, switches, bridges, and routers. Networks are measured based on latency, data transfer rate, bandwidth, and other performance parameters. Ethernet is a common standard used to connect devices via cables or wirelessly. IP addresses identify devices on the Internet or private networks.
Chapter 1 computer networking Class 12thHarsh Mathur
A computer network connects multiple devices together to share resources and exchange data. Common network types include personal area networks (PANs) covering small areas up to 10 meters, local area networks (LANs) spanning small offices or homes, and wide area networks (WANs) connecting larger geographic areas. Devices communicate over the network via wired or wireless transmission using various protocols like TCP/IP. Common networking devices that help establish and maintain connections include switches, routers, and wireless access points.
This slide deck was used for a 2-day short course at IIT Gandhinagar in Spring 2015. Being a 2-day course, it focuses more on a qualitative description of how we access the Internet.
This document provides an overview of a data communications course, including information about the professor, textbook, lecture notes, and course outline. It covers topics like the definition of data communications, the five components of a data communication system, direction of data flow (simplex, half-duplex, and full-duplex), different network types (LAN, MAN, WAN, internetwork), physical network topologies (mesh, star, bus, ring, hybrid), categories of networks, a brief history of the Internet, protocols, standards and standards organizations.
This document provides an overview of computer networks and the internet. It defines key network terms like LAN, WAN, topology, protocols, and internet connections. It describes different network topologies like star, bus, ring and their advantages. It explains internet services like www, ftp, telnet and email. It discusses how analog and digital data is transmitted over networks and the role of modems. The document is presented as part of a course on fundamental computer principles and programming.
This document provides an overview of computer networks and the TCP/IP protocol suite. It describes network criteria like performance and reliability. It discusses physical network structures like point-to-point, multipoint, mesh, star, bus and ring topologies. It also defines categories of networks such as local area networks (LANs), wide area networks (WANs) and metropolitan area networks (MANs). A key point is that the TCP/IP protocol suite, which controls the Internet, is organized into five layers: application, transport, internet, network interface and physical. The layers are described along with how a message travels through them.
The Pacific Research Platform: a Science-Driven Big-Data Freeway SystemLarry Smarr
The Pacific Research Platform (PRP) is a multi-institutional partnership that establishes a high-capacity "big data freeway system" spanning the University of California campuses and other research universities in California to facilitate rapid data access and sharing between researchers and institutions. Fifteen multi-campus application teams in fields like particle physics, astronomy, earth sciences, biomedicine, and visualization drive the technical design of the PRP over five years. The goal of the PRP is to extend campus "Science DMZ" networks to allow high-speed data movement between research labs, supercomputer centers, and data repositories across campus, regional
This document provides an overview of networking concepts including:
- Networks allow for a world without boundaries by enabling global communities and human networks.
- Network components include end devices where data originates/is received, and intermediary devices like switches and routers that interconnect devices and manage data flow.
- Data is transmitted through various network media like wires, fiber optic cables, and wireless transmission using electromagnetic waves.
This document discusses Internet exchange points (IXPs) and their role in internet infrastructure. It notes that IXPs allow different networks to interconnect and exchange traffic, reducing costs. While most IXPs operate neutrally, some are influenced by governments seeking to control internet access. The document also discusses consolidation among backbone and last-mile providers. It provides data on the major IXPs in the US and notes increasing vertical integration among content providers, data centers, and networks. In conclusion, it suggests ensuring IXPs continue enabling market forces while addressing governance and competition challenges.
The document provides an overview of chapter 1 from the CCNA Routing and Switching Introduction to Networks course. It discusses how networks are used in everyday life and how they have changed the way people interact, learn, work and play. It also describes the basic components of networks, including end devices, intermediary devices, network media, and topologies. Additionally, it differentiates between local area networks (LANs), which span a small geographic area, and wide area networks (WANs), which interconnect LANs over a wider geographical area.
From Jisc's campus network engineering for data-intensive science workshop on 19 October 2016.
https://www.jisc.ac.uk/events/campus-network-engineering-for-data-intensive-science-workshop-19-oct-2016
This document provides an overview of computer communications and networking concepts. It begins with an introduction to the evolution of computer networks from early messenger systems to the development of ARPANET and the Internet. It then discusses key network categories including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers data transmission modes, network topologies, and common networking protocols and standards such as the OSI model and TCP/IP. Overall, the document serves as an introductory guide to fundamental computer networking concepts.
The document provides an overview of chapter 1 from the CCNA Routing and Switching Introduction to Networks 6.0 instructor materials. It covers four main sections: 1) globally connected networks and how they impact daily life, 2) LANs, WANs, and the Internet including different network components and topologies, 3) the network as a platform including converged networks and the four requirements for a reliable network, and 4) trends changing the network environment such as BYOD and cloud computing. Each section includes objectives and content to introduce foundational networking concepts.
This document provides an introduction to networks and networking concepts. It discusses what a network is, how networks have evolved over time to support new ways of communicating, working and learning. Specific networking topics covered include the internet, intranets and extranets, different types of network connections for homes and businesses, the basic components that make up networks including end devices, servers, clients and intermediary devices. Diagrams and examples are provided to illustrate networking concepts and how information flows through networks.
This document provides an overview of computer network fundamentals, including data transmission modes, network topologies, and network categories. It discusses the three main data transmission modes - simplex, half-duplex, and full-duplex - and describes their characteristics and examples. The document also defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and explores their key applications and advantages and disadvantages.
This document discusses network technologies and provides information on computer networks. It defines a computer network as a type of digital telecommunications network that enables the exchange of resources between various types of networks. The document outlines different types of networks including personal area networks (PAN), local area networks (LAN), and wide area networks (WAN). It provides details on each type of network and discusses the advantages and disadvantages of using networks.
The document discusses various topics related to computer networks and the Internet. It begins by defining what a network is and provides examples of point-to-point and multipoint connections. It then covers different network topologies like mesh, star, bus, ring and hybrid. The next sections discuss local area networks (LANs), metropolitan area networks (MANs) and wide area networks (WANs). It also distinguishes between a network and the Internet. The document concludes by explaining important Internet concepts like HTTP, URLs, and IP addresses.
This document provides an overview of the topics to be covered in a data communications and networking course. The course will cover network topologies, transmission modes, network models, signaling, encoding, multiplexing, error detection, data link protocols, LANs/WANs, internetworking, security, compression, TCP/IP, and application services. It defines key terms like data communication, networks, protocols, standards, and the Internet. The first two chapters will provide an introduction to the topics and discuss network models.
For Complete Learning- http://www.thelearnet.com/
UNIT I
Introduction Concepts: Goals and Applications of Networks, Network structure and architecture, The OSI reference model, services, Network Topology Design, connecting devices,
Physical Layer: Transmission Media, Line coding scheme, Basic idea of modulation and multiplexing, Switching methods.
Medium Access sub layer: Medium Access sub layer - Channel Allocations, LAN protocols - ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE standards
UNIT II
Data Link Layer: HDLC and point to point protocol, Error detection and correction, Flow control (sliding window protocol)
Network Layer: Network Layer –IP addressing, Internetworking, Address mapping, introduction to IPv6, transition from IPv4 to IPv6, routing.
UNIT III
Transport Layer: Transport Layer - Design issues, connection management, Flow control, TCP window management, congestion control-slow start algorithm
Session Layer: Design issues, remote procedure call.
Presentation Layer: Design issues, Data compression techniques, cryptography
Application Layer: Application Layer: File Transfer, Access and Management, Electronic mail, Virtual Terminals
This document provides information about computer networks and networking concepts. It discusses the history of ARPANET, the first packet switching network and predecessor to the Internet. It then defines what a computer network is and lists common goals of computer networks like sharing resources, performance, reliability, and scalability. The document also outlines some common applications of computer networks and provides details on typical network hardware, software, and cabling technologies.
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
The document summarizes the evolution of computer networking from early networks like ARPANET in 1969 to the modern Internet. It discusses key concepts like distributed processing, network criteria of performance, reliability and security. It also covers network transmission technologies including unicast, broadcast and multicast. Different types of networks are defined, from local area networks (LANs) to wide area networks (WANs). Common network devices like hubs, switches and routers are also explained.
The document provides information about presentations that cover chapter objectives from a Network+ Guide to Networks textbook. It states that the presentations include the objectives listed at the beginning of each chapter and figures from the chapters. Instructors can customize the presentations for their class needs and additional images can be found on the instructor companion site.
Similar to Comp 107 unit 7 and 8 (networking, internet and intranet) (1) (20)
The document provides information about HTML tags and their usage for formatting web pages. It discusses common tags for headings, paragraphs, lists, links, images, and tables. It also covers frames, colors, fonts and other attributes that can be used to control presentation. The last part introduces Cascading Style Sheets (CSS) as an alternative to some HTML tags for specifying styles.
The document discusses key concepts in internet fundamentals and applications, including:
- Hypertext, which allows non-linear text with links connecting nodes of information.
- How clicking a URL like www.yahoo.com causes the browser to request the page from the server over TCP/IP.
- The difference between thin clients like web browsers that do only presentation, versus thick clients that do processing locally like desktop apps.
- Common elements of web pages like URLs, HTML, CSS, and how they define page structure and presentation separately.
Microsoft Office is a suite of desktop applications and services that was first announced in 1988 and initially included Word, Excel, and PowerPoint. It runs on Windows and Mac operating systems. Microsoft Word allows for mail merge, tables of content, tables, objects, page breaks and sections, bookmarks and hyperlinks. Excel offers formatting, functions like Vlookup and IF, charts, and sorting/filtering. PowerPoint enables transitions, animations, and design features.
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes and were large, expensive machines. The second generation introduced transistors, symbolic programming, and memory. The third generation saw the development of integrated circuits and interaction through keyboards and monitors. The fourth generation included microprocessors and single-chip CPUs, as well as GUIs. The fifth generation involves artificial intelligence and parallel processing.
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes and were large, expensive machines. The second generation introduced transistors, symbolic programming, and memory. The third generation saw the development of integrated circuits and interaction through keyboards and monitors. The fourth generation included microprocessors and single-chip CPUs, as well as GUIs. The fifth generation focuses on artificial intelligence through techniques like parallel processing and natural language input.
The document discusses electronic commerce (e-commerce), defining it as the paperless exchange of business information using electronic networks and technologies. It notes that e-commerce not only automates manual processes but helps organizations transition to fully digital environments. The document then covers drivers of e-commerce like data networks and competition. It outlines different models of e-commerce and types of e-commerce transactions. Advantages for both consumers and businesses are discussed, such as convenience and expanded reach. Potential disadvantages are also addressed.
Comp 107 unit 7 and 8 (networking, internet and intranet)Mijanur Rahman
The document discusses networking and the internet. It defines networking as connecting two or more computers and describes different types of network topologies including mesh, star, bus, ring, and hybrid. It also defines local, metropolitan, and wide area networks. The internet is defined as a network of interconnected networks that allows communication globally. Common internet applications are discussed like email, FTP, telnet, and the world wide web. Data transmission and the role of modems in modulating and demodulating signals are also summarized.
The document discusses operating systems and their functions. It describes how operating systems manage programs and devices, allocate memory, provide security and error detection, and more. It also discusses different types of operating systems like single-user, multi-user, and real-time operating systems. Utility programs that assist with tasks like searching, compressing files, backup and restoration are also outlined. Finally, components of the Windows operating system like the desktop, start menu, control panel and accessories are defined.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Comp 107 unit 7 and 8 (networking, internet and intranet) (1)
1. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Unit 7 and 8
Introduction to Networking, Internet
and Intranet
By
Liang
2. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Data Transfer
• Data transmission, digital transmission, or
digital communications is the physical transfer
of data (a digital bit stream) over a point-to-
point or point-to-multipoint communication
channel.
3. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Examples
• Examples of such channels are copper wires,
optical fibres, wireless communication
channels, storage media and computer buses.
• The data are represented as an
electromagnetic signal, such as an electrical
voltage, radiowave, microwave, or infrared
signal.
4. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Network
• Network
one computer connected to more then one
computer is called Network
11/6/2016
Liang-Lincoln University
4
5. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Advantages of networking
• Connectivity and Communication
• Data Sharing
• Hardware Sharing
• Internet Access
• Internet Access Sharing
• Data Security and Management
• Performance Enhancement and Balancing
• Entertainment
11/6/2016
Liang -Lincoln University
5
6. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Network
• Network: A set of devices (nodes) connected by communication links
• Node: Computer, printer, or any device capable of sending and/or
receiving data
• To be considered effective and efficient, a network must meet a
number of criteria
11/6/2016
Liang -Lincoln University
6
7. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Type of Connection
11/6/2016
Liang -Lincoln University
7
8. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Type of Connection
• Point-to-point
– Dedicated link between two devices
– The entire capacity of the channel is reserved
– Eg. Microwave link, TV remote control
• Multipoint
– More than two devices share a single link
– Capacity of the channel is either
• Spatially shared: Devices can use the link simultaneously
• Timeshare: Users take turns
11/6/2016
Liang -Lincoln University
8
9. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Physical Topology
11/6/2016
Liang -Lincoln University
9
10. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Mesh Topology
• Dedicated point-to-point link to
every other nodes
• A mesh network with n nodes
has n(n-1)/2 links. Each node
has n-1 I/O ports (links)
• Advantages: No traffic
problems, robust, security, easy
fault identification & isolation
• Disadvantages: Difficult
installation/reconfiguration,
space, cost
11/6/2016
Liang -Lincoln University
10
11. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Star Topology
• Dedicated point-to-point link only to a central controller, called a hub
• Hub acts as an exchange: No direct traffic between devices
• Advantages: Less expensive, robust
• Disadvantages: dependency of the whole on one single point, the hub
11/6/2016
Liang -Lincoln University
11
12. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Bus Topology
• One long cable that links all nodes
• tap, drop line, cable end
• limit on the # of devices, distance between nodes
• Advantages: Easy installation, cheap
• Disadvantages: Difficult reconfiguration, no fault isolation, a fault or
break in the bus stops all transmission
11/6/2016
Liang -Lincoln University
12
13. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Ring Topology
• Dedicated point-to-point link only with the two nodes on each sides
• One direction, repeater
• Advantages: Easy reconfiguration, fault isolation
• Disadvantage: Unidirectional traffic, a break in the ring cab disable the
entire network
11/6/2016
Liang -Lincoln University
13
14. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Hybrid Topology
• Example: Main star topology with each branch connecting several stations
in a bus topology
• To share the advantages from various topologies
11/6/2016
Liang -Lincoln University
1-14
15. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Categories of Networks
11/6/2016
Liang -Lincoln University
15
16. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Local Area Network (LAN)
• Usually privately owned
• A network for a single office, building, or campus a few Km
• Common LAN topologies: bus, ring, star
• An isolated LAN connecting 12 computers to a hub in a closet
11/6/2016
Liang -Lincoln University
16
17. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Metropolitan Area Network (MAN)
• Designed to extend to an entire city
• Cable TV network, a company’s connected LANs
• Owned by a private or a public company
11/6/2016
Liang -Lincoln University
17
18. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Wide Area Network(WAN)
• Long distance transmission, e.g., a country, a continent, the world
• Enterprise network: A WAN that is owned and used by one company
11/6/2016
Liang -Lincoln University
18
19. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internetwork
• Internetwork (internet) : two or more networks are
connected by internetworking devices
• Internetworking devices: router, gateway, etc.
• The Internet: a specific worldwide network
11/6/2016
Liang -Lincoln University
19
20. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internetwork Example• A heterogeneous network : four WANs and two LANs
11/6/2016
Liang -Lincoln University
20
21. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Network Vs Internet
Internet
Network of network is called Internet
11/6/2016 Liang -Lincoln University 21
22. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internet
• Internet programming language
• E-mail
• SMS(short message service)
• Social networking sites
• Websites
• Browser
• Blog - Share your life's stories, videos and photos
• VOIP - Voice over Internet Protocol(Call from computer,
telemarketer)
11/6/2016
Liang -Lincoln University
22
23. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internet(con’t)
• Rss(Really simple Syndication) - TechNet
provides RSS feeds for its security bulletins,
advisories, magazine features, and other
security-related alerts for IT professionals. Eg,
short cut other
pages.
23
24. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
The Internet
• Internet is a network of interconnected
computers that is now global
• Internet born in 1969 - called ARPANET
• 1969 ARPANET was connection of computers
at UCLA, Stanford, UCSB, Univ. of Utah
11/6/2016
Liang -Lincoln University
24
25. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
The Advanced Research Projects Agency
Network
• In 1969, the U.S. Defence Department funded
a project to develop a network, which can
withstand the bombing. Basically the idea was
to develop a very secure network which can
work even after a nuclear attack. This project
was known as ARPANET.
11/6/2016
Liang -Lincoln University
25
26. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internet Connections
Broadband
A connection in which transfer speeds are faster than 768
kilobits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the
Internet to your home computer) may not be the
same as uploads (sending data from your home
computer to the Internet)
11/6/2016
Liang -Lincoln University
26
27. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Data
• Analog data
– Voice
– Images
• Digital data
– Text
– Digitized voice or images
11/6/2016
Liang -Lincoln University
27
28. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Modem
11/6/2016
Liang -Lincoln University
28
29. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Analog Signaling
• represented by sine waves
11/6/2016
Liang -Lincoln University
29
time
(sec)
amplitude(volts)
1 cycle
frequency (hertz)
= cycles per second
phase
difference
30. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Three Components of Data
Communication
• Data
– Analog: Continuous value data (sound, light, temperature)
– Digital: Discrete value (text, integers, symbols)
• Signal
– Analog: Continuously varying electromagnetic wave
– Digital: Series of voltage pulses (square wave)
11/6/2016
Liang -Lincoln University
30
31. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Modem
Process
• Modulation
– Digital to analog conversion
• Demodulation
– Analog to Digital Conversion
Liang -Lincoln University
32. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Modem Internet Connections
• Dial-up connection via modem (56K)
• Cable modems
– Network card and cable modem required
– Always-on and 25 times faster than dial-up
11/6/2016
Liang -Lincoln University
32
33. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
ISP (Internet Service Provider)
If you want to connect to the Internet, you need
to subscribe via an Internet Service Provider.
The ISP gives you a connection to the Internet
either via your telephone line or via a special
digital high speed line. An example of a
popular ISP is AOL (America On-Line).
11/6/2016
Liang -Lincoln University
33
34. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internet Service Provider (ISP)
• Provides internet access to businesses,
organizations and individuals
• Provides telecommunications equipment
• User ID and password required
• Connects you to backbone
• E-mail account monthly fee
• Should have local access telephone
numbers
11/6/2016
Liang -Lincoln University
34
35. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
SERVICES OF INTERNET
• WWW
• FTP
• Telnet
• E-mail
11/6/2016
Liang -Lincoln University
35
36. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
What is the difference between the World Wide Web (WWW) and
the Internet?
WWW is the acronym for the World Wide Web. It is also commonly
known as ‘The Web’. The WWW is hypertext based information retrieval
tool
• The World Wide Web (WWW) is just a small part of the
Internet as a whole.
• The Internet, relates to all the hardware and software
involved, and as well as including the WWW, also includes
FTP (File Transfer Protocol – more about this later), email
and newsgroups.
• The WWW is basically the text and pictures which you can
view using your web browser, such as Microsoft Internet
Explorer, or Netscape Navigator.
11/6/2016
Liang -Lincoln University
36
37. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
World Wide Web Basics
• Files interconnected via hypertext
• Web pages make up a web site
• Home Page
• Links or hyperlinks
• Web servers
11/6/2016
Liang -Lincoln University
37
38. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
FTP (File Transfer Protocol)
File Transfer Protocol, is an Internet utility software used to upload
and download files. It gives access to directories or folders on remote
computers and allows software, data and text files to be transferred
between different kinds of computers.
• FTP is just a way of transferring data from one place to another
over the Internet. If is often used for downloading large files
from a web site. You do not really need to know anything
about how it works, in most cases you will click on a link
within a web page, and your web browser (such as Microsoft
Internet Explorer) will take care of the FTP transfer for you, all
you have to decide is where to store the file which you wish to
download.
11/6/2016 Liang -Lincoln University 38
39. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
The basic objectives of FTP are
• to give flexibility and promote sharing of computer
programs, files and data
• to transfer data reliably and more efficiently over
network
• to encourage implicit or indirect use of remote
computers using Internet
• to shield a user from variations in file storage
systems among hosts
11/6/2016
Liang -Lincoln University
39
40. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Telnet (Remote Computing)
• Telnet (Remote Computing)
Telnet or remote computing is telecommunication utility software,
which uses available telecommunication facility and allows you to
become a user on a remote computer. Once you gain access to the
remote computer, you can use it for the intended purpose. The
TELNET works in a very step by step procedure. The commands
typed on the client computer are sent to the local Internet Service
Provider (ISP), and then from the ISP to the remote computer that
you have gained access. Most of the ISP provides facility to TELENET
into your own account from another city and check your e-mail
while you are traveling or away on business
11/6/2016
Liang -Lincoln University
40
41. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
E-Mail (Electronic Mail)
E-mail or Electronic mail is a paperless method of sending messages,
notes or letters from one person to another or even many
people at the same time via Internet. E-mail is very fast compared to
the normal post. E-mail messages usually take only few seconds to
arrive at their destination
Features of E-mail:
• One-to-one or one-to-many communications
• Instant communications
• Physical presence of recipient is not required
• Most inexpensive mail services, 24-hours a day and seven days a week
• Encourages informal communications
11/6/2016
Liang -Lincoln University
41
42. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Voice Messaging
Voice Messaging
It is a new communication approach which is similar to electronic mail except
that it is audio message rather than text messages that are processed.
A sender speaks into a telephone rather than typing, giving the name of the
recipient and the message. That sender's voice signal is then digitalised
and stored.
The system can then either deliver the message at a specified time in future
or it can be retrieved from a database by the recipient.
11/6/2016
Liang -Lincoln University
42
43. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internet Important Terms
• HTTP
• URL
• Hyperlink
• Browser
• Cookies
• Internet cache
• SECURITY
11/6/2016
Liang -Lincoln University
43
44. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
HTTP (Hypertext Transfer Protocol)
• HTTP stands for Hypertext Transfer Protocol.
This is the language your web browser uses to
request pages & graphics from the web server.
You can see that your web browser is using
the HTTP protocol when it is shown at the
start of a web address such as
http://www.yahoo.com
11/6/2016
Liang -Lincoln University
44
45. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
URL (Uniform Resource Locator)
• The URL (Uniform Resource Locator) is just
another name for a web address.
• The URL consists of the name of the protocol
(usually HTTP or FTP) followed by the address of
the computer you want to connect to, e.g. a URL
of “ftp://ftp.cdrom.com” would instruct your web
browser to use the FTP protocol to connect to the
computer called ftp.cdrom.com.
11/6/2016
Liang -Lincoln University
45
46. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
World Wide Web Basics
• URL
– No spaces and Case sensitive
– HTTP (Hypertext Transfer Protocol)
• HTML (Hypertext Markup Language)
– .htm or .html file extension
11/6/2016 Liang -Lincoln University 46
Document name
and filename
extension
Folder
name
Web
server
name
Web
protocol
standard
http://www.cnn.com/showbiz/movies.htm
47. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Network Addresses
Hostname
A name made up of words separated by dots that
uniquely identifies a computer on the Internet
IP address
An address made up of four one-byte numeric values
separated by dots that uniquely identifies a computer
on the Internet
11/6/2016
Liang -Lincoln University
47
48. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Domain Name System
Host number
The part of the IP address that specifies a particular
host (machine) on the network
Domain name
The part of a hostname that specifies a specific
organization or group
Top-level domain (TLD)
The last section of a domain name that specifies the
type of organization or its country of origin
11/6/2016
Liang -Lincoln University
48
49. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Domain Name System(cont’)
11/6/2016
Liang -Lincoln University
49
50. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Domain Name System (cont’)
11/6/2016
Liang -Lincoln University
50
Figure 15.10 Top-level domains, including some relatively new ones
51. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Domain Name System(cont’)
Organizations based in countries other than the United States
use a top-level domain that corresponds to their two-letter
country codes
11/6/2016
Liang -Lincoln University
51
Figure 15.11
Some of the top-level domain names
based on country codes
Do you
email
someone
in another
country?
52. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Domain Name Addressing
• Domain names can include any number of parts separated by
periods, however most domain names currently in use have
only three or four parts.
• Domain names follow hierarchical model that you can follow
from top to bottom if you read the name from the right to the
left.
• For example, the domain name gsb.uchicago.edu is the
computer connected to the Internet at the Graduate School of
Business (gsb), which is an academic unit of the University of
Chicago (uchicago), which is an educational institution (edu).
• No other computer on the Internet has the same domain name.
11/6/2016
Liang -Lincoln University
52
53. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Uniform Resource Locators
• The IP address and the domain name each identify a particular
computer on the Internet.
• However, they do not indicate where a Web page’s HTML
document resides on that computer.
• To identify a Web pages exact location, Web browsers rely on
Uniform Resource Locator (URL).
• URL is a four-part addressing scheme that tells the Web
browser:
What transfer protocol to use for transporting the file
The domain name of the computer on which the file resides
The pathname of the folder or directory on the computer on
which the file resides
The name of the file
11/6/2016
Liang -Lincoln University
53
54. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Structure of a Uniform Resource Locators
11/6/2016
Liang -Lincoln University
54
http://www.chicagosymphony.org/civicconcerts/index.htm
protocol
Domain name
pathname
filename
http => Hypertext Transfer Protocol
55. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Hyperlink
A hyperlink is a piece of text (or a graphic) on a
Web page, which when clicked on will
automatically:
- Take you to a different part of the same page
- Take you to a different page within the Web
site
11/6/2016
Liang -Lincoln University
55
56. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
What is a web browser?
Web browsing applications include ‘Internet
Explorer’ (from Microsoft) and ‘Netscape
Navigator/Communicator’. In both cases there
are many different versions, and you will find
that the later versions offer much more
versatility as well as a better range of built-in
features. The web browser allows you to view
web pages
11/6/2016
Liang -Lincoln University
56
57. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Cookies
• Some web sites can store hidden information about you on your hard disk
using cookies.
• This information is stored in small text file. Cookies can be
useful, for instance, a site may store your preferences about a web site, so
that when you re-visit the site your preferences can be accessed
automatically.
• Cookies are used by some web sites to identify you; this
saves you having to “log in” to the web site each time you visit.
11/6/2016
Liang -Lincoln University
57
58. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
What is an Internet cache?
Each time you display a web site within your web browser, a copy of the
information (both text and pictures) is saved on your hard disk. The reason
for this is that the next time you want to re-visit the site, the information is
quickly loaded from the copy on your hard disk, rather than slowly from the
actual Internet site.
• As pictures are stored in the cache, if you are visiting a site which has many
separate web pages, with say a company logo on each page, then all
subsequent pages from that site will load a little faster as the logo graphics
will load from the cache, not via the Internet Eg. temp folder
11/6/2016
Liang -Lincoln University
58
59. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
SECURITY CONSIDERATIONS
• What is a digital certificate?
• A digital certificate is used to encrypt information for secure transmission
across the Internet. A digital certificate can be used to create a digital
signature for an email, the signature guarantees the identity of sender, and it
also ensures that the message cannot be tampered with in transit. A digital
certificate can be purchased from a certificate authority such as
www.verisign.com who will verify your identity. Digital certificates are used
by Internet based shopping web sites to encrypt your credit card details so
they cannot be intercepted as they travel the Internet. You can view the
digital certificate for a secure web site by double clicking on the padlock in
the web browser status bar, e.g. https://www.paypal.com
11/6/2016 Liang -Lincoln University 59
60. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
SECURITY CONSIDERATIONS(Cont’)
What is encryption?
•Encryption is a means of 'scrambling' an email message. It is used to make
a message more secure, so that only the intended recipient of the
message will be able to read the message. There are many means of
enabling this encryption, both via hardware and software.
11/6/2016
Liang -Lincoln University
60
61. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
SECURITY CONSIDERATIONS(Cont’)
• What is a firewall?
• A fire wall consists of software and hardware protection against invasion
via the Internet. In most larger companies any connection to the Internet
automatically goes through a firewall which would have been installed and
customized by the companies technical IT team. In most cases you will be
unaware of the firewall existence.
11/6/2016
Liang -Lincoln University
61
62. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College
Internet vs intranet
• Intranet is an internal private computer network or connection of
one or more computer networks, whose use and access is restricted
to an organization and its employees or members.. Such an
intranet, mostly operates through a website, run by a local server,
acting as a resource sharing medium. You could call it a scaled-
down private Internet.
• Internet is a network of more than billion computers spread
worldwide! It uses an ever improving set of Internet protocols
(HTTP, FTP, SMTP, etc.) to transfer data. Unlike the intranet, the
Internet and the information sharing service called the 'World Wide
Web',
11/6/2016
Liang -Lincoln University
62
63. Subject Name Code Credit Hours
Copyright @ 2016 Lincoln University College 63
The End
Questions?
63