SlideShare a Scribd company logo
How Traffic Moves over the
        Internet
    Web presentation GROUP C
                    AOL
                  firewall
       ISP(Internet Service Provider)
                    POP




                                        How Traffic Moves over the Internet – p.1/6
AOL
AOL is one of the services of the personal computer
communication and the Internet connection service.
It is possible to use it even by the developing country
and the remote place if there are an analog line and a




modem.



                                        How Traffic Moves over the Internet – p.2/6
firewall
System that prevents it from invading computer
network from the outside.
Fire wall has hardware type and software type.It is
mostly installed into the computer with software and



used.




                                      How Traffic Moves over the Internet – p.3/6
ISP(Internet Service Provider)
It is assumed to be the main content of service to of-
fer Conectibiti to the Internet (connectivity) as an offer
of the Internet connection service. As other, incidental
service, the portal site by an offer of space for the of-
fer of the E-mail account and web page opening to the
public and original ISP is managed, and generalized by
business conditions that also offer the content service.




                                          How Traffic Moves over the Internet – p.4/6
POP
In computing, the Post Office Protocol version 3
(POP3) is an application-layer Internet standard pro-
tocol used by local e-mail clients to retrieve e-mail
from a remote server over a TCP/IP connection.




                                      How Traffic Moves over the Internet – p.5/6
References
  •   FirewallForest
URL:http://eazyfox.homelinux.org/Security/Security09
 • Wikipedia

URL:http://ja.wikipedia.org/wiki/
 • ELECTRONIC MAIL ARCHITECTURE

URL:http://homepages.uel.ac.uk/u0315352/electronic




                                     How Traffic Moves over the Internet – p.6/6

More Related Content

What's hot

How the internet_works
How the internet_worksHow the internet_works
How the internet_worksarun nalam
 
Internet, Behind the Scenes
Internet, Behind the ScenesInternet, Behind the Scenes
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
Salauddin Rubel
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Worksftz 420
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
Computing Cage
 
Voice over IP, Data Communication & Networking
Voice over IP, Data Communication & NetworkingVoice over IP, Data Communication & Networking
Voice over IP, Data Communication & Networking
ShivangiSingh241
 
Fundamental Internet Concept
Fundamental Internet ConceptFundamental Internet Concept
Fundamental Internet Conceptj093760
 
Application layer
Application layerApplication layer
Application layer
AnithaRaj31
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
Srihari
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
Shishpal Vishnoi
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
vlsaroj
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Abiud Orina
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
Anil Pokhrel
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networkshariprasadnr
 
computer networks layers
computer networks layerscomputer networks layers
computer networks layers
Student
 
Overview of Internet
Overview of InternetOverview of Internet
Overview of Internet
Dr. Himanshu Gupta
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
sambhenilesh
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
Kritika Purohit
 
Application layer
Application layerApplication layer
Application layer
Ahmed_Hamed_Attia
 

What's hot (20)

How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Internet, Behind the Scenes
Internet, Behind the ScenesInternet, Behind the Scenes
Internet, Behind the Scenes
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Overview of tcp ip
Overview of tcp ipOverview of tcp ip
Overview of tcp ip
 
Voice over IP, Data Communication & Networking
Voice over IP, Data Communication & NetworkingVoice over IP, Data Communication & Networking
Voice over IP, Data Communication & Networking
 
Fundamental Internet Concept
Fundamental Internet ConceptFundamental Internet Concept
Fundamental Internet Concept
 
Application layer
Application layerApplication layer
Application layer
 
Web technology-guide
Web technology-guideWeb technology-guide
Web technology-guide
 
Pop
PopPop
Pop
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
basic it presentation........
basic it presentation........basic it presentation........
basic it presentation........
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
 
computer networks layers
computer networks layerscomputer networks layers
computer networks layers
 
Overview of Internet
Overview of InternetOverview of Internet
Overview of Internet
 
Multimedia- How Internet Works
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
Application layer
Application layerApplication layer
Application layer
 

Similar to How Traffic Moves over the Internet

C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdfC and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
anonaeon
 
Unit.1.basic web.tech
Unit.1.basic web.techUnit.1.basic web.tech
Unit.1.basic web.tech
Mr. Ravi patel
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
Why Ipv6 May Be Adopted Later Rather Than Sooner
Why Ipv6 May Be Adopted Later Rather Than SoonerWhy Ipv6 May Be Adopted Later Rather Than Sooner
Why Ipv6 May Be Adopted Later Rather Than Sooner
Claudia Brown
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
Osama Yousaf
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
YonasBayu1
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
Muhammad Tahir Mehmood
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
university of education,Lahore
 

Similar to How Traffic Moves over the Internet (20)

Web Presen
Web PresenWeb Presen
Web Presen
 
Suraido12
Suraido12Suraido12
Suraido12
 
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdfC and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
C and D. TCPIP, or Transmission Control ProtocolInternet Protocol,.pdf
 
Unit.1.basic web.tech
Unit.1.basic web.techUnit.1.basic web.tech
Unit.1.basic web.tech
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Why Ipv6 May Be Adopted Later Rather Than Sooner
Why Ipv6 May Be Adopted Later Rather Than SoonerWhy Ipv6 May Be Adopted Later Rather Than Sooner
Why Ipv6 May Be Adopted Later Rather Than Sooner
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Week11
Week11Week11
Week11
 
Ga12
Ga12Ga12
Ga12
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Web Engineering Lecture2
Web Engineering Lecture2 Web Engineering Lecture2
Web Engineering Lecture2
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Week12
Week12Week12
Week12
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

How Traffic Moves over the Internet

  • 1. How Traffic Moves over the Internet Web presentation GROUP C AOL firewall ISP(Internet Service Provider) POP How Traffic Moves over the Internet – p.1/6
  • 2. AOL AOL is one of the services of the personal computer communication and the Internet connection service. It is possible to use it even by the developing country and the remote place if there are an analog line and a modem. How Traffic Moves over the Internet – p.2/6
  • 3. firewall System that prevents it from invading computer network from the outside. Fire wall has hardware type and software type.It is mostly installed into the computer with software and used. How Traffic Moves over the Internet – p.3/6
  • 4. ISP(Internet Service Provider) It is assumed to be the main content of service to of- fer Conectibiti to the Internet (connectivity) as an offer of the Internet connection service. As other, incidental service, the portal site by an offer of space for the of- fer of the E-mail account and web page opening to the public and original ISP is managed, and generalized by business conditions that also offer the content service. How Traffic Moves over the Internet – p.4/6
  • 5. POP In computing, the Post Office Protocol version 3 (POP3) is an application-layer Internet standard pro- tocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. How Traffic Moves over the Internet – p.5/6
  • 6. References • FirewallForest URL:http://eazyfox.homelinux.org/Security/Security09 • Wikipedia URL:http://ja.wikipedia.org/wiki/ • ELECTRONIC MAIL ARCHITECTURE URL:http://homepages.uel.ac.uk/u0315352/electronic How Traffic Moves over the Internet – p.6/6