SlideShare a Scribd company logo
Hardware and Software requirements for
Internet
Punitha. S
20LIB12
Madurai Kamaraj University
Introduction
• The Internet is the global system of interconnected computer networks that use the Internet protocol
suite to link devices worldwide. The purpose of the internet is to communicate between computers
that are interconnected with each other. Internet is accessible to every user all over the world.
• It is a network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies.
• The Internet carries a vast range of information resources and services, such as the inter-linked
hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony
and file sharing.
• Browser is a tool used to access the internet using WWW (World Wide Web) and HTTP (Hyper Text
Transfer Protocol). In the browser, if the user types the domain name such as www.tn.gov.in, the
browser calls a protocol name DNS (Domain Name Server). DNS is used to get the IP address of the
domain names.
Evolution of Internet
• Internet evolved in 1969 and evolved many changes in several technologies and Infrastructural levels.
• Internet was started by ARPANET (Advanced Research Project Agency Network), developed by United
States. Department of Defence for communication among different government bodies, initially with
four nodes.
• In 1972, the four nodes has been developed and it grown to 23 nodes located in different countries
making it Internet.
• Invented TCP/IP protocols, DNS, WWW, browsers scripting languages.
• Internet is used as a medium to publish and access the information
• In 1985, The NSFNET was composed of multiple regional networks and peer networks
• In 1986, the NSFNET created a three-tiered network architecture.
• In 1988, updated the links to make it faster
• In 1990, Merit, IBM, and MCI started a new organization known as Advanced Network and
Services (ANS).
• By 1991, data traffic had increased tremendously, which necessitated upgrading the
NSFNET's backbone network service to T3 (45 Mbps) links.
Hardware and Software Requirements for Internet connection
• The following are the methods of connecting a computer to the Internet using software and hardware
peripherals.
• Connecting a computer using Wireless Broadband
• Connecting a computer using an Ethernet Cable
• Connecting a Computer Using Dial-Up Community
Hardware Requirement
• To connect the Internet, any one of the following is mandatory.
• Modem is used to connect Internet through Telephone connection.
• NIC- Network Interface Card(wired/ wireless) facility is the most important hardware required to
connect Internet. For example, the Laptop can be connected Internet through the wired/wireless.
• Dongle is used to connect the Internet using cellular network
• Wi-Fi router or Hotspot is used to connect the Internet using wireless network
• Electronic device which supports cellular network
• Internet Connectivity such as Dial-up connection, ISDN, DSL, Cable TV, wired and wireless
(Cellular) Network.
Software Requirement
• The operating system should support TCP (Transfer Control Protocol) / IP (Internet Protocol),
SMTP (Simple Mail Transfer Protocol),
FTP (File Transfer Protocol),
HTTP (Hyper Text Transfer Protocol) and
HTTPS (Hyper Text Transfer Protocol Secured) protocols.
• Browsers and other Internet clients access to the web applications such as Outlook, Gmail, Whatsapp,
Facebook, Twitter and etc.
Connection Types
The following methods are able to connect internet.
• Dial-up Connection
• Dial-up access is really just like a phone connection. Connection through modem and a public
telephone network. It uses analogue telephone line. Encoding & Decoding of analogue signals is
done by modem. Using a dial -up line to transmit data is similar to using the telephone to make a
call speed is only 56 kbps. dial-up connection is established when two or more data
communication devices use a Public Switched Telephone Network (PSTN) to connect to an
Internet Service Provider (ISP) from computers. Many remote locations depend on Internet dial-up
connections because broadband and cable are rare in remote areas with low population. Internet
Service Providers often provide dial-up connections, a feasible alternative for budget-conscious
subscribers.
Advantages
• Low cost
• Availability
• Disadvantages
• Low speed
• Requires phone line
• Route busy
ISDN- Integrated Services Digital Network
• ISDN is the acronym of Integrated Services Digital Network. It establishes the connection using the
phone lines (PSTN) which carry digital signals instead of analogue signals. It is a set of communication
standards for simultaneous digital transmission of data, voice, video, and other services over the
traditional circuits of the public switched telephone network. There are two techniques to deliver ISDN
services such as Basic Rate Interface (BRI) and Primary Rate Interface (PRI).
The following diagram shows accessing internet using ISDN connection
Advantages
• Multiple digital channels
• Speedy
• It can be used for other activities like videoconferencing
• Disadvantages
• It is very costly than the other typical telephone system
DSL- Digital Subscriber Line
• Digital Subscriber Line (DSL) is a high-speed Internet service for homes and businesses that competes
with cable and other forms of broadband Internet. DSL provides high-speed networking over ordinary
Telephone lines using broadband modem technology. The technology behind DSL enables Internet
and telephone service to work over the same phone line without requiring customers to disconnect
either their Voice or Internet connections.
Advantages
• DSL simultaneously keeps your Internet connection and phone lines open.
• Downloads are faster than uploads.
• DSL uses the existing wiring infrastructure of your telephone lines
• Disadvantages
• Large amount of uploading is not possible
• DSL is limited to a certain perimeter
• Compared to dial up,it is expensive
Cable TV Internet Connection (setup box)
• The cable TV network can be used for connecting a computer or a local network to the Internet,
competing directly with DSL (Digital Subscriber Line) technology. This type of network is classified
as HFC (Hybrid Fiber-Coaxial), as it uses both fiber optics and coaxial cables. The connection
between the cable TV company to the distribution points (Optical nodes) is made using fiber optics,
with distances up to 25 miles (40 km). Each optical node is typically serves between 500 and 2,000
clients (customers)
The following diagram shows that how internet is accessed using Cable TV connection
Satellite Internet Connection
• Satellite Internet access is Internet access provided through satellite communication for domestic and
enterprise usage. Data is being sent from the satellite to a user’s equipment and then translated and
decoded. Delivered through satellite dish. Equipment required-mini dish satellite receiver and satellite
modem. Upload speed 128 kbps. Download speed 400 kbps. The facility of modern consumer grade
satellite Internet service is typically provided to individual users through geostationary satellites . It
provides fairly high data speeds, along with latest satellites using Ka-band to attain downstream data
speeds up to 50 Mbps internet speed.
.
Advantages
• High speed internet access
• Does not tie up with local phone service or cable TV subscription
• Connection speed is not affected by phone or cable wiring
• Disadvantages
• More expensive than DSL and cable.
• Large setup fee. Expensive equipment upfront. Has to be set up by rained technician
Wireless Internet Connection
• It is a technology for wireless local area networking with devices based on the IEEE
802.11 standards. Devices that can use Wi-Fi technology include personal computers,
video-game consoles, phones and tablets, digital cameras, smart TVs, digital audio players
and modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN
and a wireless access point. Such an access point (or hotspot) has a range of about 20
meters (66 feet) indoors and a greater range of outdoors. Hotspot coverage can be as small
as a single room with walls that block radio waves, or as large as many square kilometres
achieved by using multiple overlapping access points
What is authentication
• Authentication is the process of identifying users that request access to a system, network, or device.
Access control often determines user identity according to credentials like username and password.
Other authentication technologies like biometrics and authentication apps are also used to authenticate
user identity.
Why Is User Authentication Important?
User authentication is a method that keeps unauthorized users from accessing sensitive information.
Common Authentication Types
Password-based authentication
• Passwords are the most common methods of authentication. Passwords can be in the form of
a string of letters, numbers, or special characters. To protect yourself you need to create
strong passwords that include a combination of all possible options.
• However, passwords are prone to phishing attacks and bad hygiene that weakens
effectiveness. An average person has about 25 different online accounts, but only 54% of
users use different passwords across their accounts.
• The truth is that there are a lot of passwords to remember. As a result, many people choose
convenience over security. Most people use simple passwords instead of creating reliable
passwords because they are easier to remember.
• The bottom line is that passwords have a lot of weaknesses and are not sufficient in protecting
online information. Hackers can easily guess user credentials by running through all possible
combinations until they find a match.
Multi-Factor authentication (MFA)
• It is an authentication method that requires
two or more independent ways to identify a
user. Examples include codes generated from
the user’s smartphone, Captcha tests,
fingerprints, voice biometrics or facial
recognition.
• MFA authentication methods and
technologies increase the confidence of users
by adding multiple layers of security. MFA
may be a good defence against most account
hacks , but it has its own pitfalls. People may
lose their phones or SIM cards and not be
able to generate an authentication code.
Certificate-based authentication
• Certificate-based authentication technologies identify users, machines or devices by using
digital certificates. A digital certificate is an electronic document based on the idea of a
driver’s license or a passport.
• The certificate contains the digital identity of a user including a public key, and the digital
signature of a certification authority. Digital certificates prove the ownership of a public key
and issued only by a certification authority.
• Users provide their digital certificates when they sign in to a server. The server verifies the
credibility of the digital signature and the certificate authority. The server then uses
cryptography to confirm that the user has a correct private key associated with the certificate.
Biometric Authentication
• Biometrics authentication is a security process that relies on the unique biological
characteristics of an individual. Here are key advantages of using biometric authentication
technologies:
• Biological characteristics can be easily compared to authorized features saved in a
database.
• Biometric authentication can control physical access when installed on gates and doors.
• You can add biometrics into your multi-factor authentication process.
• Biometric authentication technologies are used by consumers, governments and private
corporations including airports, military bases, and national borders. The technology is
increasingly adopted due to the ability to achieve a high level of security without creating
friction for the user.
Common biometric authentication methods include:
• Facial recognition
Matches the different face characteristics of an individual trying to gain access to an approved face stored in a
database. Face recognition can be inconsistent when comparing faces at different angles or comparing people who
look similar, like close relatives. Facial liveness technology prevents spoofing.
• Fingerprint scanners
Match the unique patterns on an individual’s fingerprints. Some new versions of fingerprint scanners can even
assess the vascular patterns in people’s fingers. Fingerprint scanners are currently the most popular biometric
technology for everyday consumers, despite their frequent inaccuracies. This popularity can be attributed to
iPhones.
• Speaker Recognition
Also known as voice biometrics, examines a speaker’s speech patterns for the formation of specific
shapes and sound qualities. A voice-protected device usually relies on standardized words to identify
users, just like a password.
• Eye scanners
Include technologies like iris recognition and retina scanners. Iris scanners project a bright light
towards the eye and search for unique patterns in the colored ring around the pupil of the eye. The
patterns are then compared to approved information stored in a database. Eye-based authentication
may suffer inaccuracies if a person wears glasses or contact lenses.
Token-based authentication
• Token-based authentication technologies enable users to enter their credentials once and
receive a unique encrypted string of random characters in exchange. You can then use the
token to access protected systems instead of entering your credentials all over again. The
digital token proves that you already have access permission. Use cases of token-based
authentication include RESTful APIs that are used by multiple frameworks and clients.
Conclusion
• Authentication technology is always changing. Businesses have to move beyond passwords
and think of authentication as a means of enhancing user experience. Authentication methods
like biometrics eliminate the need to remember long and complex passwords. As a result of
enhanced authentication methods and technologies, attackers will not be able to exploit
passwords, and a data breach will be prevented
THANKYOU

More Related Content

What's hot

Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
Abhishek Kesharwani
 
Isp
IspIsp
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Methods of connecting internet
Methods of connecting internetMethods of connecting internet
Methods of connecting internet
Tittu Anna
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
Mahesh Shetty
 
Mobile computing
Mobile computingMobile computing
Mobile computing
sadia Afrose
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
FellowBuddy.com
 
Unit 1 overview
Unit 1 overviewUnit 1 overview
Unit 1 overview
Neelam Rawat
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
guest029bcd
 
e-commerce
e-commercee-commerce
e-commerce
Manish Kaushik
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
Ankur Kumar
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Internet address
Internet addressInternet address
Internet address
Shubham Dwivedi
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
priya Nithya
 
e-commerce architecture
e-commerce architecturee-commerce architecture
e-commerce architecture
deepika kumar
 

What's hot (20)

Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
 
Isp
IspIsp
Isp
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Methods of connecting internet
Methods of connecting internetMethods of connecting internet
Methods of connecting internet
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Unit 1 overview
Unit 1 overviewUnit 1 overview
Unit 1 overview
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
e-commerce
e-commercee-commerce
e-commerce
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Internet address
Internet addressInternet address
Internet address
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
e-commerce architecture
e-commerce architecturee-commerce architecture
e-commerce architecture
 

Similar to Hardware and Software requirements for Internet 2.pptx

Computer network
Computer networkComputer network
Computer network
Rahul Das
 
New Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the InternetNew Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the Internet
Faindra Jabbar
 
Network
NetworkNetwork
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
rocky781582
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
HaythanSunday
 
internet connection
internet connectioninternet connection
internet connection
vijay Prakash Mishra
 
Connect a workstation to the internet ppt
Connect a workstation to the internet pptConnect a workstation to the internet ppt
Connect a workstation to the internet ppt
Getawu
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
Sagar Mehta
 
Chapter 1 one html
Chapter 1 one htmlChapter 1 one html
Chapter 1 one html
nobel mujuji
 
Chapter 1 html
Chapter 1 htmlChapter 1 html
Chapter 1 html
nobel mujuji
 
Networks - Computer Applications Technology.pptx
Networks - Computer Applications Technology.pptxNetworks - Computer Applications Technology.pptx
Networks - Computer Applications Technology.pptx
jadiealex110
 
tia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptxtia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptx
AryanBhargava7
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
TnNguyn57021
 
GR 12 CAT Network Technologies Lesson 1.pdf
GR 12 CAT Network Technologies Lesson 1.pdfGR 12 CAT Network Technologies Lesson 1.pdf
GR 12 CAT Network Technologies Lesson 1.pdf
karabomatome31
 
Internet & e mail slides
Internet & e mail slidesInternet & e mail slides
Internet & e mail slides
Dominic Kandagor
 
1791.pptx
1791.pptx1791.pptx
1791.pptx
BLACKSPAROW
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Anish Thomas
 
Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)IMRAN KHAN
 
Fundamentals of Computing Chapter 10
Fundamentals of Computing Chapter 10Fundamentals of Computing Chapter 10
Fundamentals of Computing Chapter 10
Mohd Harris Ahmad Jaal
 

Similar to Hardware and Software requirements for Internet 2.pptx (20)

Computer network
Computer networkComputer network
Computer network
 
New Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the InternetNew Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the Internet
 
Network
NetworkNetwork
Network
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
internet connection
internet connectioninternet connection
internet connection
 
Connect a workstation to the internet ppt
Connect a workstation to the internet pptConnect a workstation to the internet ppt
Connect a workstation to the internet ppt
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Chapter 1 one html
Chapter 1 one htmlChapter 1 one html
Chapter 1 one html
 
Chapter 1 html
Chapter 1 htmlChapter 1 html
Chapter 1 html
 
Networks - Computer Applications Technology.pptx
Networks - Computer Applications Technology.pptxNetworks - Computer Applications Technology.pptx
Networks - Computer Applications Technology.pptx
 
tia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptxtia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptx
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
GR 12 CAT Network Technologies Lesson 1.pdf
GR 12 CAT Network Technologies Lesson 1.pdfGR 12 CAT Network Technologies Lesson 1.pdf
GR 12 CAT Network Technologies Lesson 1.pdf
 
Internet & e mail slides
Internet & e mail slidesInternet & e mail slides
Internet & e mail slides
 
1791.pptx
1791.pptx1791.pptx
1791.pptx
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Internet ...
Internet ...Internet ...
Internet ...
 
Internet and services (95 kb)
Internet and services (95 kb)Internet and services (95 kb)
Internet and services (95 kb)
 
Fundamentals of Computing Chapter 10
Fundamentals of Computing Chapter 10Fundamentals of Computing Chapter 10
Fundamentals of Computing Chapter 10
 

More from Rbalasubramani

ISO 2709.pptx
ISO 2709.pptxISO 2709.pptx
ISO 2709.pptx
Rbalasubramani
 
Boolean operator.pptx
Boolean operator.pptxBoolean operator.pptx
Boolean operator.pptx
Rbalasubramani
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptx
Rbalasubramani
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
Rbalasubramani
 
DDS.pptx
DDS.pptxDDS.pptx
DDS.pptx
Rbalasubramani
 
LIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxLIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptx
Rbalasubramani
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptx
Rbalasubramani
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
Rbalasubramani
 
SOULppt.pptx
SOULppt.pptxSOULppt.pptx
SOULppt.pptx
Rbalasubramani
 
KOHA.pptx
KOHA.pptxKOHA.pptx
KOHA.pptx
Rbalasubramani
 
MARC -21.pptx
MARC -21.pptxMARC -21.pptx
MARC -21.pptx
Rbalasubramani
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptx
Rbalasubramani
 
Z39.50.pptx
Z39.50.pptxZ39.50.pptx
Z39.50.pptx
Rbalasubramani
 
Bibliography Services.pptx
Bibliography Services.pptxBibliography Services.pptx
Bibliography Services.pptx
Rbalasubramani
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
Rbalasubramani
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptx
Rbalasubramani
 

More from Rbalasubramani (16)

ISO 2709.pptx
ISO 2709.pptxISO 2709.pptx
ISO 2709.pptx
 
Boolean operator.pptx
Boolean operator.pptxBoolean operator.pptx
Boolean operator.pptx
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptx
 
Evaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptxEvaluation of Library Automation software ppt.pptx
Evaluation of Library Automation software ppt.pptx
 
DDS.pptx
DDS.pptxDDS.pptx
DDS.pptx
 
LIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxLIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptx
 
MGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptxMGT OF LIB.AUTOMATION.pptx
MGT OF LIB.AUTOMATION.pptx
 
RFID ppt2.pptx
RFID ppt2.pptxRFID ppt2.pptx
RFID ppt2.pptx
 
SOULppt.pptx
SOULppt.pptxSOULppt.pptx
SOULppt.pptx
 
KOHA.pptx
KOHA.pptxKOHA.pptx
KOHA.pptx
 
MARC -21.pptx
MARC -21.pptxMARC -21.pptx
MARC -21.pptx
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptx
 
Z39.50.pptx
Z39.50.pptxZ39.50.pptx
Z39.50.pptx
 
Bibliography Services.pptx
Bibliography Services.pptxBibliography Services.pptx
Bibliography Services.pptx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
alerting services.pptx
alerting services.pptxalerting services.pptx
alerting services.pptx
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 

Hardware and Software requirements for Internet 2.pptx

  • 1. Hardware and Software requirements for Internet Punitha. S 20LIB12 Madurai Kamaraj University
  • 2. Introduction • The Internet is the global system of interconnected computer networks that use the Internet protocol suite to link devices worldwide. The purpose of the internet is to communicate between computers that are interconnected with each other. Internet is accessible to every user all over the world. • It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. • The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony and file sharing. • Browser is a tool used to access the internet using WWW (World Wide Web) and HTTP (Hyper Text Transfer Protocol). In the browser, if the user types the domain name such as www.tn.gov.in, the browser calls a protocol name DNS (Domain Name Server). DNS is used to get the IP address of the domain names.
  • 3. Evolution of Internet • Internet evolved in 1969 and evolved many changes in several technologies and Infrastructural levels. • Internet was started by ARPANET (Advanced Research Project Agency Network), developed by United States. Department of Defence for communication among different government bodies, initially with four nodes. • In 1972, the four nodes has been developed and it grown to 23 nodes located in different countries making it Internet. • Invented TCP/IP protocols, DNS, WWW, browsers scripting languages. • Internet is used as a medium to publish and access the information
  • 4. • In 1985, The NSFNET was composed of multiple regional networks and peer networks • In 1986, the NSFNET created a three-tiered network architecture. • In 1988, updated the links to make it faster • In 1990, Merit, IBM, and MCI started a new organization known as Advanced Network and Services (ANS). • By 1991, data traffic had increased tremendously, which necessitated upgrading the NSFNET's backbone network service to T3 (45 Mbps) links.
  • 5. Hardware and Software Requirements for Internet connection • The following are the methods of connecting a computer to the Internet using software and hardware peripherals. • Connecting a computer using Wireless Broadband • Connecting a computer using an Ethernet Cable • Connecting a Computer Using Dial-Up Community
  • 6. Hardware Requirement • To connect the Internet, any one of the following is mandatory. • Modem is used to connect Internet through Telephone connection. • NIC- Network Interface Card(wired/ wireless) facility is the most important hardware required to connect Internet. For example, the Laptop can be connected Internet through the wired/wireless. • Dongle is used to connect the Internet using cellular network • Wi-Fi router or Hotspot is used to connect the Internet using wireless network • Electronic device which supports cellular network • Internet Connectivity such as Dial-up connection, ISDN, DSL, Cable TV, wired and wireless (Cellular) Network.
  • 7. Software Requirement • The operating system should support TCP (Transfer Control Protocol) / IP (Internet Protocol), SMTP (Simple Mail Transfer Protocol), FTP (File Transfer Protocol), HTTP (Hyper Text Transfer Protocol) and HTTPS (Hyper Text Transfer Protocol Secured) protocols. • Browsers and other Internet clients access to the web applications such as Outlook, Gmail, Whatsapp, Facebook, Twitter and etc.
  • 8. Connection Types The following methods are able to connect internet. • Dial-up Connection • Dial-up access is really just like a phone connection. Connection through modem and a public telephone network. It uses analogue telephone line. Encoding & Decoding of analogue signals is done by modem. Using a dial -up line to transmit data is similar to using the telephone to make a call speed is only 56 kbps. dial-up connection is established when two or more data communication devices use a Public Switched Telephone Network (PSTN) to connect to an Internet Service Provider (ISP) from computers. Many remote locations depend on Internet dial-up connections because broadband and cable are rare in remote areas with low population. Internet Service Providers often provide dial-up connections, a feasible alternative for budget-conscious subscribers.
  • 9. Advantages • Low cost • Availability • Disadvantages • Low speed • Requires phone line • Route busy
  • 10. ISDN- Integrated Services Digital Network • ISDN is the acronym of Integrated Services Digital Network. It establishes the connection using the phone lines (PSTN) which carry digital signals instead of analogue signals. It is a set of communication standards for simultaneous digital transmission of data, voice, video, and other services over the traditional circuits of the public switched telephone network. There are two techniques to deliver ISDN services such as Basic Rate Interface (BRI) and Primary Rate Interface (PRI).
  • 11. The following diagram shows accessing internet using ISDN connection
  • 12. Advantages • Multiple digital channels • Speedy • It can be used for other activities like videoconferencing • Disadvantages • It is very costly than the other typical telephone system
  • 13. DSL- Digital Subscriber Line • Digital Subscriber Line (DSL) is a high-speed Internet service for homes and businesses that competes with cable and other forms of broadband Internet. DSL provides high-speed networking over ordinary Telephone lines using broadband modem technology. The technology behind DSL enables Internet and telephone service to work over the same phone line without requiring customers to disconnect either their Voice or Internet connections. Advantages • DSL simultaneously keeps your Internet connection and phone lines open. • Downloads are faster than uploads. • DSL uses the existing wiring infrastructure of your telephone lines • Disadvantages • Large amount of uploading is not possible • DSL is limited to a certain perimeter • Compared to dial up,it is expensive
  • 14. Cable TV Internet Connection (setup box) • The cable TV network can be used for connecting a computer or a local network to the Internet, competing directly with DSL (Digital Subscriber Line) technology. This type of network is classified as HFC (Hybrid Fiber-Coaxial), as it uses both fiber optics and coaxial cables. The connection between the cable TV company to the distribution points (Optical nodes) is made using fiber optics, with distances up to 25 miles (40 km). Each optical node is typically serves between 500 and 2,000 clients (customers)
  • 15. The following diagram shows that how internet is accessed using Cable TV connection
  • 16. Satellite Internet Connection • Satellite Internet access is Internet access provided through satellite communication for domestic and enterprise usage. Data is being sent from the satellite to a user’s equipment and then translated and decoded. Delivered through satellite dish. Equipment required-mini dish satellite receiver and satellite modem. Upload speed 128 kbps. Download speed 400 kbps. The facility of modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites . It provides fairly high data speeds, along with latest satellites using Ka-band to attain downstream data speeds up to 50 Mbps internet speed. .
  • 17. Advantages • High speed internet access • Does not tie up with local phone service or cable TV subscription • Connection speed is not affected by phone or cable wiring • Disadvantages • More expensive than DSL and cable. • Large setup fee. Expensive equipment upfront. Has to be set up by rained technician
  • 18. Wireless Internet Connection • It is a technology for wireless local area networking with devices based on the IEEE 802.11 standards. Devices that can use Wi-Fi technology include personal computers, video-game consoles, phones and tablets, digital cameras, smart TVs, digital audio players and modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN and a wireless access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range of outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points
  • 19. What is authentication • Authentication is the process of identifying users that request access to a system, network, or device. Access control often determines user identity according to credentials like username and password. Other authentication technologies like biometrics and authentication apps are also used to authenticate user identity. Why Is User Authentication Important? User authentication is a method that keeps unauthorized users from accessing sensitive information.
  • 20. Common Authentication Types Password-based authentication • Passwords are the most common methods of authentication. Passwords can be in the form of a string of letters, numbers, or special characters. To protect yourself you need to create strong passwords that include a combination of all possible options. • However, passwords are prone to phishing attacks and bad hygiene that weakens effectiveness. An average person has about 25 different online accounts, but only 54% of users use different passwords across their accounts. • The truth is that there are a lot of passwords to remember. As a result, many people choose convenience over security. Most people use simple passwords instead of creating reliable passwords because they are easier to remember. • The bottom line is that passwords have a lot of weaknesses and are not sufficient in protecting online information. Hackers can easily guess user credentials by running through all possible combinations until they find a match.
  • 21. Multi-Factor authentication (MFA) • It is an authentication method that requires two or more independent ways to identify a user. Examples include codes generated from the user’s smartphone, Captcha tests, fingerprints, voice biometrics or facial recognition. • MFA authentication methods and technologies increase the confidence of users by adding multiple layers of security. MFA may be a good defence against most account hacks , but it has its own pitfalls. People may lose their phones or SIM cards and not be able to generate an authentication code.
  • 22. Certificate-based authentication • Certificate-based authentication technologies identify users, machines or devices by using digital certificates. A digital certificate is an electronic document based on the idea of a driver’s license or a passport. • The certificate contains the digital identity of a user including a public key, and the digital signature of a certification authority. Digital certificates prove the ownership of a public key and issued only by a certification authority. • Users provide their digital certificates when they sign in to a server. The server verifies the credibility of the digital signature and the certificate authority. The server then uses cryptography to confirm that the user has a correct private key associated with the certificate.
  • 23. Biometric Authentication • Biometrics authentication is a security process that relies on the unique biological characteristics of an individual. Here are key advantages of using biometric authentication technologies: • Biological characteristics can be easily compared to authorized features saved in a database. • Biometric authentication can control physical access when installed on gates and doors. • You can add biometrics into your multi-factor authentication process. • Biometric authentication technologies are used by consumers, governments and private corporations including airports, military bases, and national borders. The technology is increasingly adopted due to the ability to achieve a high level of security without creating friction for the user.
  • 24. Common biometric authentication methods include: • Facial recognition Matches the different face characteristics of an individual trying to gain access to an approved face stored in a database. Face recognition can be inconsistent when comparing faces at different angles or comparing people who look similar, like close relatives. Facial liveness technology prevents spoofing. • Fingerprint scanners Match the unique patterns on an individual’s fingerprints. Some new versions of fingerprint scanners can even assess the vascular patterns in people’s fingers. Fingerprint scanners are currently the most popular biometric technology for everyday consumers, despite their frequent inaccuracies. This popularity can be attributed to iPhones. • Speaker Recognition Also known as voice biometrics, examines a speaker’s speech patterns for the formation of specific shapes and sound qualities. A voice-protected device usually relies on standardized words to identify users, just like a password. • Eye scanners Include technologies like iris recognition and retina scanners. Iris scanners project a bright light towards the eye and search for unique patterns in the colored ring around the pupil of the eye. The patterns are then compared to approved information stored in a database. Eye-based authentication may suffer inaccuracies if a person wears glasses or contact lenses.
  • 25. Token-based authentication • Token-based authentication technologies enable users to enter their credentials once and receive a unique encrypted string of random characters in exchange. You can then use the token to access protected systems instead of entering your credentials all over again. The digital token proves that you already have access permission. Use cases of token-based authentication include RESTful APIs that are used by multiple frameworks and clients.
  • 26. Conclusion • Authentication technology is always changing. Businesses have to move beyond passwords and think of authentication as a means of enhancing user experience. Authentication methods like biometrics eliminate the need to remember long and complex passwords. As a result of enhanced authentication methods and technologies, attackers will not be able to exploit passwords, and a data breach will be prevented