SlideShare a Scribd company logo
How Traffic Moves over the Internet
●   ISP
●   Internet backbones
●   Method of connection
●   Web-hosting

                           ●   s1170066 Takahiro Shinkai
                           ●   s1170069 Ryohei Suda
                           ●   s1170070 Syuhei Takahashi
                           ●   s1170087 Shingo Watanabe
ISP(Internet Service Provider)
The thing to which connectivity to the internet is offered as an offer of
Internet connectivity service is made the main service contents.
Additionally the offer which is an e-mail account as collateral service
and an offer in space for web page opening to the public, also, ISP,
personal, the business status which is managing a chosen portal site
and offers contents service all together generalizes.
Internet backbones
         ●   Internet backbone is the main
             trunk connection of the Internet.
             It consist of various network, for
             example major ISP data centers,
             universities, and government
             agencies. These are connected
             mutually with high-speed fiber-
             optic connection. So if one fails,
             the others automatically pick up
             the traffic.
         ●   Today cable TV company
             connect to an Internet backbone
             to act as its own ISP.
Method of connection

 There are a few methods of connecting to the internet.
The most common method of connecting for home user
is via a dial-up modem. Other connection option include
         DSL, cable modem, and ethernet LANs.
Web-hosting
Web-hosting service is a
type of Internet hosting
service that allows
individuals and
organizations to make
their own website
accessible via the World
Wide Web.
Many individuals and
organizations use Web-
hosting service.
References
●   Wikipedia
    –   http://en.wikipedia.org/wiki/

More Related Content

What's hot

Unit 2
Unit 2Unit 2
Net Neutrality Complete
Net Neutrality CompleteNet Neutrality Complete
Net Neutrality Complete
Siddhartha Rao
 
0850244 Network Neutrality
0850244 Network Neutrality0850244 Network Neutrality
0850244 Network Neutrality
jasonl
 
GatelessVPN technology pitch
GatelessVPN technology pitchGatelessVPN technology pitch
GatelessVPN technology pitchGVNetworks
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
Excel Asama
 
The Death of Transit and Beyond
The Death of Transit and BeyondThe Death of Transit and Beyond
The Death of Transit and Beyond
APNIC
 
Dan ionel alin
Dan ionel alinDan ionel alin
Dan ionel alinAlin Dan
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway LessonBuffalo Seminary
 
I way
I wayI way
Roam.fi Wireless Community - Timo Väliharju 2.6.2017
Roam.fi Wireless Community - Timo Väliharju 2.6.2017Roam.fi Wireless Community - Timo Väliharju 2.6.2017
Roam.fi Wireless Community - Timo Väliharju 2.6.2017
COSS
 
Internet peering, graphics only
Internet peering, graphics onlyInternet peering, graphics only
Internet peering, graphics only
Brough Turner
 
Techinfini's Case Study on Website and Internet Usages
Techinfini's Case Study on Website and Internet UsagesTechinfini's Case Study on Website and Internet Usages
Techinfini's Case Study on Website and Internet Usages
TechInfini
 
Internet backbone : Notes
Internet backbone : NotesInternet backbone : Notes
Internet backbone : Notes
Subhajit Sahu
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Gaurav Chordia
 
Peering Beneficial - IXLeeds
Peering Beneficial - IXLeedsPeering Beneficial - IXLeeds
Peering Beneficial - IXLeedsAndy Davidson
 
Protocols and methods
Protocols and methods Protocols and methods
Protocols and methods
Louise Reed
 
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...
Nicole White
 
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet ArchitectureRemote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Ruth Plater
 
Internet connection in malaysia 2
Internet connection in malaysia 2Internet connection in malaysia 2
Internet connection in malaysia 2Farzana Yusoff
 

What's hot (20)

Unit 2
Unit 2Unit 2
Unit 2
 
Net Neutrality Complete
Net Neutrality CompleteNet Neutrality Complete
Net Neutrality Complete
 
0850244 Network Neutrality
0850244 Network Neutrality0850244 Network Neutrality
0850244 Network Neutrality
 
GatelessVPN technology pitch
GatelessVPN technology pitchGatelessVPN technology pitch
GatelessVPN technology pitch
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
The Death of Transit and Beyond
The Death of Transit and BeyondThe Death of Transit and Beyond
The Death of Transit and Beyond
 
Dan ionel alin
Dan ionel alinDan ionel alin
Dan ionel alin
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
I way
I wayI way
I way
 
Roam.fi Wireless Community - Timo Väliharju 2.6.2017
Roam.fi Wireless Community - Timo Väliharju 2.6.2017Roam.fi Wireless Community - Timo Väliharju 2.6.2017
Roam.fi Wireless Community - Timo Väliharju 2.6.2017
 
Internet peering, graphics only
Internet peering, graphics onlyInternet peering, graphics only
Internet peering, graphics only
 
Techinfini's Case Study on Website and Internet Usages
Techinfini's Case Study on Website and Internet UsagesTechinfini's Case Study on Website and Internet Usages
Techinfini's Case Study on Website and Internet Usages
 
Internet backbone : Notes
Internet backbone : NotesInternet backbone : Notes
Internet backbone : Notes
 
Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.Laws governing the internet service provider & there rights and liabilities.
Laws governing the internet service provider & there rights and liabilities.
 
Peering Beneficial - IXLeeds
Peering Beneficial - IXLeedsPeering Beneficial - IXLeeds
Peering Beneficial - IXLeeds
 
Sid
SidSid
Sid
 
Protocols and methods
Protocols and methods Protocols and methods
Protocols and methods
 
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...
 
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet ArchitectureRemote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
 
Internet connection in malaysia 2
Internet connection in malaysia 2Internet connection in malaysia 2
Internet connection in malaysia 2
 

Viewers also liked

Integracion
IntegracionIntegracion
Integracionlenyker
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
Oil&Gas.Eng.Doc
Oil&Gas.Eng.DocOil&Gas.Eng.Doc
Oil&Gas.Eng.Doc
damolee007
 
1ka100
1ka1001ka100
Intro To The Valuation Council Final
Intro To The Valuation Council FinalIntro To The Valuation Council Final
Intro To The Valuation Council FinalRICS Americas
 

Viewers also liked (6)

Integracion
IntegracionIntegracion
Integracion
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Oil&Gas.Eng.Doc
Oil&Gas.Eng.DocOil&Gas.Eng.Doc
Oil&Gas.Eng.Doc
 
1ka100
1ka1001ka100
1ka100
 
Intro To The Valuation Council Final
Intro To The Valuation Council FinalIntro To The Valuation Council Final
Intro To The Valuation Council Final
 
Social media 401
Social media 401Social media 401
Social media 401
 

Similar to How Traffic Moves over The Internet

Internet Service Provider
Internet Service ProviderInternet Service Provider
Internet Service Provider
FaheemShah25
 
Presen W12
Presen W12Presen W12
Presen W12loid9
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
Hem Pokhrel
 
Internet
InternetInternet
Internet
7th Sky
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
Atika Zaimi
 
Internet, isp & web
Internet, isp & webInternet, isp & web
Internet, isp & web
Tanweer Ahmed
 
Unit.1.basic web.tech
Unit.1.basic web.techUnit.1.basic web.tech
Unit.1.basic web.tech
Mr. Ravi patel
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
Jaya Kamnani
 
Lecture-1.pptx
Lecture-1.pptxLecture-1.pptx
Lecture-1.pptx
FikriMuhammadIqbal1
 
Introduction to the Internet and Web
Introduction to the Internet and WebIntroduction to the Internet and Web
Introduction to the Internet and Web
Dinoo Gunasekera
 
WEBSITE HOSTING FOR PNG ORGANISATIONS
WEBSITE HOSTING FOR PNG ORGANISATIONSWEBSITE HOSTING FOR PNG ORGANISATIONS
WEBSITE HOSTING FOR PNG ORGANISATIONSwebhostingguy
 
CNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptxCNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptx
EnockAnderson
 
Unit ii ecommerce ppt
Unit ii ecommerce pptUnit ii ecommerce ppt
Unit ii ecommerce ppt
Murali Mohan
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 

Similar to How Traffic Moves over The Internet (20)

Internet Service Provider
Internet Service ProviderInternet Service Provider
Internet Service Provider
 
Week12 Wp
Week12 WpWeek12 Wp
Week12 Wp
 
Presen W12
Presen W12Presen W12
Presen W12
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
Internet
InternetInternet
Internet
 
How
HowHow
How
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Internet, isp & web
Internet, isp & webInternet, isp & web
Internet, isp & web
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Unit.1.basic web.tech
Unit.1.basic web.techUnit.1.basic web.tech
Unit.1.basic web.tech
 
Internet Service Provider-ISP
Internet Service Provider-ISPInternet Service Provider-ISP
Internet Service Provider-ISP
 
Lecture-1.pptx
Lecture-1.pptxLecture-1.pptx
Lecture-1.pptx
 
Introduction to the Internet and Web
Introduction to the Internet and WebIntroduction to the Internet and Web
Introduction to the Internet and Web
 
Internet ...
Internet ...Internet ...
Internet ...
 
WEBSITE HOSTING FOR PNG ORGANISATIONS
WEBSITE HOSTING FOR PNG ORGANISATIONSWEBSITE HOSTING FOR PNG ORGANISATIONS
WEBSITE HOSTING FOR PNG ORGANISATIONS
 
CNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptxCNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptx
 
Unit ii ecommerce ppt
Unit ii ecommerce pptUnit ii ecommerce ppt
Unit ii ecommerce ppt
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

How Traffic Moves over The Internet

  • 1. How Traffic Moves over the Internet ● ISP ● Internet backbones ● Method of connection ● Web-hosting ● s1170066 Takahiro Shinkai ● s1170069 Ryohei Suda ● s1170070 Syuhei Takahashi ● s1170087 Shingo Watanabe
  • 2. ISP(Internet Service Provider) The thing to which connectivity to the internet is offered as an offer of Internet connectivity service is made the main service contents. Additionally the offer which is an e-mail account as collateral service and an offer in space for web page opening to the public, also, ISP, personal, the business status which is managing a chosen portal site and offers contents service all together generalizes.
  • 3. Internet backbones ● Internet backbone is the main trunk connection of the Internet. It consist of various network, for example major ISP data centers, universities, and government agencies. These are connected mutually with high-speed fiber- optic connection. So if one fails, the others automatically pick up the traffic. ● Today cable TV company connect to an Internet backbone to act as its own ISP.
  • 4. Method of connection There are a few methods of connecting to the internet. The most common method of connecting for home user is via a dial-up modem. Other connection option include DSL, cable modem, and ethernet LANs.
  • 5. Web-hosting Web-hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Many individuals and organizations use Web- hosting service.
  • 6. References ● Wikipedia – http://en.wikipedia.org/wiki/