SlideShare a Scribd company logo
1 of 44
INTERCONNECTED
NETWORK
PRESENTED BY:
ASST. PROF. GAGANA P
INTERNET:
The Giant Wide Area
Network
Accessing the Internet
Internet Organization
Cyber Ethics
1.1 INTERNET: THE GIANT WIDE AREA
NETWORK
• The first sets of computers developed during the Second
World War were innately expensive and isolated. Eventually,
with their gradual decrease in price, researchers began to
implement experiments to connect these computers.
1.1 INTERNET: THE GIANT WIDE AREA
NETWORK
• As a meta-network, or network of networks, the Internet
(acronym for INTERconnected NETwork)emerged to be a
promising technology for providing ubiquitous access.
• In 1969, ARPANET started as a federally funded research
project, which was initiated by the Advanced Research Project
Agency (ARPA) and the US Department of Defense (DoD).
1.1 INTERNET: THE GIANT WIDE AREA
NETWORK
• The network was designed to operate without centralized
control.
• If a portion of the network failed, the remaining working
portions would still route packets from senders to
receivers over alternative paths.
• ARPANET used the Transmission Control Protocol
(TCP) for communication. TCP ensured that messages
were properly routed from sender to receiver.
WIRED NETWORK
LAN
MAN
WAN
LOCAL AREA NETWORK (LAN)
• A Local Area Network (LAN) is a network that is used for
communicating among computer devices, usually within
an office building or home.
• Though it is limited in size, typically spanning a few hundred
meters and no more than a mile, it is fast, with speeds from 10
Mbps to 10 Gbps with minimal infrastructure requirements,
low cost, and high security.
• LANs can be either wired or wireless.
METROPOLITAN AREA NETWORK (MAN)
• A Metropolitan Area Network (MAN) is optimized for a larger
geographical area than a LAN, ranging from several blocks
of buildings to entire cities typically covering an area ranging
from 5 to 50 km diametrically.
WIDE AREA NETWORK (WAN)
• A Wide Area Network (WAN) covers a large geographic area
such as country, continent or even whole world. It is two
or multiple LANs connected using devices such as bridges,
routers, or gateways, which enable them to share
resources.
WIRELESS NETWORK
•Wi-Fi is a wireless networking technology that allows devices
such as computers (laptops and desktops), mobile devices
(smart phones and wearables), and other equipment (printers
and video cameras) to interface with the Internet. It allows
these devices--and many more--to exchange information with
one another, creating a network.
WIRELESS NETWORK
•BLUETOOTH is a wireless networking technology that
allows device to communicate with each other over short
distance.
• It Is commonly used in smartphone, laptops and other portable
devices
WIRELESS NETWORK
• CELLULAR NETWORK use wireless technology to provide
mobile communication services
WHAT IS THE PURPOSE OF A WAN
CONNECTION?
• Wide-area networks (WANs) are the backbone of enterprise today.
With the digitization of resources, companies use WANs to do the
following:
• Communicate using voice and video.
• Share resources between employees and customers.
• Access data storage and remotely back up data.
• Connect to applications running in the cloud.
• Run and host internal applications.
• Another classification of networks focuses on the roles of the
networked computers.
• The millions of connected computing devices (also called hosts
or end-systems) that constitute the Internet, can be divided
into two basic types relying on their role classifications for
networks: the Peer-to-Peer networks (also known as a
workgroup) and Server-based networks (also known as a
Client/Server network).
• The difference between the two revolves around which
computer is in charge of the network.
CLIENT/SERVER NETWORK
• In the client/server model, all end
systems are divided into clients and
servers, each designed for specific
purposes.
• Clients have an active role and initiate a
communication session by sending
requests to servers.
PEER-TO-PEER NETWORK (P2P)
• In the P2P network architecture, all end systems have
equivalent capabilities and responsibilities and either party can
initiate a communication session.
• There is no central location for authenticating users, storing
files, or accessing resources.
• The P2P model does not have the notion of clients or servers
but only equal peers (a.k.a. servents, servent = SERVer
+ cliENT) that simultaneously function as both clients and
PEER-TO-PEER NETWORK (P2P)
• Pure P2P network: A P2P system that has no central service of
any kind.
• Hybrid P2P network: Pure P2P systems work well only in a
small-scale
• environment
Local Area
Networks
Distance
(meters)
10-3
100
103
106
Number of devices interconnected
1 10 100 1,000 10,000 >100,000
System/Stora
ge Area
Networks
Wide Area
Networks
Metropolitan
Area Networks
INTERCONNECTION NETWORK
DOMAINS
INTERCONNECTION NETWORK
DOMAINS
Local Area
Networks
10-3
100
103
106
Number of devices interconnected
1 10 100 1,000 10,000 >100,000
System/Stora
ge Area
Networks
Wide Area
Networks
Metropolitan
Area Networks
On-Chip
Interconnection
Networks/Networks-
on-Chip
Getting
Confused
MULTI-ACCESS NETWORK
• Multi-Access Network is also known as multi-point or
broadcast network , allow multiple devices to connect to
communicate over same network.
• This type of network can have different topologies like ring, star,
bus
Communicating over the Internet
TWO POPULAR MODELS
OPEN SYSTEMS
INTERCONNECTI
ON
TCP/IP MODEL
AS PER THE REPORTS HOW MANY NUMBER
OF STUDENTS USE THE INTERNET?
Statistical bar chart for available Internet users.
OSI REFERENCE MODEL
OSI VERSUS TCP/IP MODEL.
PROTOCOL LAYERING
• To communicate using the Internet system, a host must
implement the layered set of protocols comprising the Internet
protocol suite
INTERNET ADDRESSING
An IP address is a unique global address for a network interface. It is
32-bit logical address, composed of four 8-bit fields, called octets.
The address is represented in “dotted decimal notation” by grouping
the four octets. Each octet represents a decimal number in the range
0–255 (since 255 is the maximum 8-bit binary number), i.e., the
format of IP address is xxx.xxx.xxx.xxx, where each xxx is a number
from 0 to 255. These are unique numbers and controlled by address
registry. For example, 17.112.152.32 is the IP address for
www.apple.com, for www.amazon.com it is 54.239.26.128 and that for
www.dtu.ac.in is 122.160.182.54.
IP address is divided into two parts: a prefix which identifies the
physical network to which the host is attached and a suffix which
identifies a specific computer (host/node) on the network. Each
network on the Internet is assigned a unique network number
and each computer on a given network is assigned a unique
suffix
• Protocol: It specifies the transfer protocol that will be
used for retrieval of desired resource. Examples include
Hypertext Transfer Protocol (http), HTTP Secure
Protocol (https), and File Transfer Protocol (ftp).
Domain name: The Domain name is also known as
website name or host name. It is often divided into
three parts: www (optional), second level name (e.g.,
dtu.ac in www.dtu.ac.in), and top level name
(Organizational: 3-character code indicates the function
of the organization
Path: It is the directory or the folder on the server. It is
the path used to specify and perhaps find the resource
requested, i.e., a path to a file located on the web
server.
File name: The file name element of a URL is the file
name within that directory with an extension such as
htm, html, php, and so on.
DNS HIERARCHY
• The DNS is implemented as a distributed system and has a
hierarchical structure, that is, the name hierarchy can be
represented as a tree. Each node in the DNS tree represents a
DNS name. Each branch below a node is a DNS domain. DNS
domain can contain hosts or other domains (sub-domains). The
top-level domains are at the root of the tree followed by the
top-down sub-domains.
URL: Contains information about how to fetch a
resource from its location.
URLs always start with a protocol (http) and usually
contain information such as the network host name
(dtu.ac.in) and often a document path
(/Academics/syllabus.php).
For example:
http://dtu.ac.in/Web/Academics/syllabus.php
ftp://example.com/download.zip URN: Identifies a
resource by a unique and persistent name. It usually
starts
URI: The URI encompasses URLs, URNs, and other ways
ACCESSING THE INTERNET
• The Internet consists of millions of connected computing
devices, known as hosts or end systems, which are connected
together by communication links.
• The hosts are not usually directly attached to each other via a
single communication link. Instead, they are indirectly
connected to each other through intermediate switching
devices called routers.
Dial-up access: Dial-Up Connection works over an ordinary
phone line, using analog modems establishing the Point-to-
Point Protocol (PPP). As the personal computers are mostly
equipped with analog modems, there is usually no additional
money needed for hardware
High-speed access: A high-speed connection also known as the
broadband connection comprises of divergent options such as
Digital Subscriber Line (DSL), Integrated Services Digital Network
(ISDN) Lines, leased line, and cable Internet connections. DSL is a
family of all-digital, high-speed lines that use normal phone
wires with special modems.
• Wireless access: Another way to connect to the Internet is via a
Wireless access using Wi-Fi technology. A Wi-Fi enabled device,
such as a PC, game console, cell phone, MP3 player, or
personal data assistant (PDA), can connect to the Internet when
its within range of a wireless network connected to the Internet.
WEB BROWSER
• A web browser is a software program that retrieves, presents,
and traverses information resources on the Web. The primary
function of a browser is to identify the URL and bring the
information resource to user. To identify a web pages’ exact
location, a web browser relies on a URL. A URL, as described
previously, is a four-part addressing scheme that tells the web
browser:
• The transfer protocol to use for transporting the file
• The domain name of the computer on which the file resides
• The pathname of the folder or directory on the computer on
which the file resides
• The name of the file
CYBER ETHICS
• Cyber Ethics refers to the code of responsible behavior on the
Internet. It entails basic Internet etiquettes, also known as
Netiquettes, which are the set of rules or guidelines for
cyberspace behavior. The expected conduct must be ethical,
and users must act within the laws of society and cyberspace.
• Communicating, sharing, and contributing to e-society in a positive
manner
• To be respectful and courteous in communication (do not use rude or
offensive language)
• Avoid harming others (do not spread pictures, viruses, gossip,
information
about others, do not use others’ usernames and passwords, i.e., do
not
impersonate others and do not trespass in other’s files)
• Sharing network resources, being honest and trustworthy
THANK YOU……

More Related Content

Similar to interconnected_network_of_internets.pptx

NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptxjepoy808
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyPiyushHooda
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxmmmm11111
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of networkAlbert Abbosey
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 

Similar to interconnected_network_of_internets.pptx (20)

Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Networking
NetworkingNetworking
Networking
 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptx
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Networking
Networking Networking
Networking
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
Fg c
Fg cFg c
Fg c
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless Technology
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
Vision
VisionVision
Vision
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Computer networks
Computer networksComputer networks
Computer networks
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 

Recently uploaded

Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 

interconnected_network_of_internets.pptx

  • 2. INTERNET: The Giant Wide Area Network Accessing the Internet Internet Organization Cyber Ethics
  • 3. 1.1 INTERNET: THE GIANT WIDE AREA NETWORK • The first sets of computers developed during the Second World War were innately expensive and isolated. Eventually, with their gradual decrease in price, researchers began to implement experiments to connect these computers.
  • 4. 1.1 INTERNET: THE GIANT WIDE AREA NETWORK • As a meta-network, or network of networks, the Internet (acronym for INTERconnected NETwork)emerged to be a promising technology for providing ubiquitous access. • In 1969, ARPANET started as a federally funded research project, which was initiated by the Advanced Research Project Agency (ARPA) and the US Department of Defense (DoD).
  • 5. 1.1 INTERNET: THE GIANT WIDE AREA NETWORK • The network was designed to operate without centralized control. • If a portion of the network failed, the remaining working portions would still route packets from senders to receivers over alternative paths. • ARPANET used the Transmission Control Protocol (TCP) for communication. TCP ensured that messages were properly routed from sender to receiver.
  • 7. LOCAL AREA NETWORK (LAN) • A Local Area Network (LAN) is a network that is used for communicating among computer devices, usually within an office building or home. • Though it is limited in size, typically spanning a few hundred meters and no more than a mile, it is fast, with speeds from 10 Mbps to 10 Gbps with minimal infrastructure requirements, low cost, and high security. • LANs can be either wired or wireless.
  • 8. METROPOLITAN AREA NETWORK (MAN) • A Metropolitan Area Network (MAN) is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities typically covering an area ranging from 5 to 50 km diametrically.
  • 9. WIDE AREA NETWORK (WAN) • A Wide Area Network (WAN) covers a large geographic area such as country, continent or even whole world. It is two or multiple LANs connected using devices such as bridges, routers, or gateways, which enable them to share resources.
  • 10. WIRELESS NETWORK •Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet. It allows these devices--and many more--to exchange information with one another, creating a network.
  • 11. WIRELESS NETWORK •BLUETOOTH is a wireless networking technology that allows device to communicate with each other over short distance. • It Is commonly used in smartphone, laptops and other portable devices
  • 12. WIRELESS NETWORK • CELLULAR NETWORK use wireless technology to provide mobile communication services
  • 13. WHAT IS THE PURPOSE OF A WAN CONNECTION? • Wide-area networks (WANs) are the backbone of enterprise today. With the digitization of resources, companies use WANs to do the following: • Communicate using voice and video. • Share resources between employees and customers. • Access data storage and remotely back up data. • Connect to applications running in the cloud. • Run and host internal applications.
  • 14. • Another classification of networks focuses on the roles of the networked computers. • The millions of connected computing devices (also called hosts or end-systems) that constitute the Internet, can be divided into two basic types relying on their role classifications for networks: the Peer-to-Peer networks (also known as a workgroup) and Server-based networks (also known as a Client/Server network). • The difference between the two revolves around which computer is in charge of the network.
  • 15. CLIENT/SERVER NETWORK • In the client/server model, all end systems are divided into clients and servers, each designed for specific purposes. • Clients have an active role and initiate a communication session by sending requests to servers.
  • 16. PEER-TO-PEER NETWORK (P2P) • In the P2P network architecture, all end systems have equivalent capabilities and responsibilities and either party can initiate a communication session. • There is no central location for authenticating users, storing files, or accessing resources. • The P2P model does not have the notion of clients or servers but only equal peers (a.k.a. servents, servent = SERVer + cliENT) that simultaneously function as both clients and
  • 17. PEER-TO-PEER NETWORK (P2P) • Pure P2P network: A P2P system that has no central service of any kind. • Hybrid P2P network: Pure P2P systems work well only in a small-scale • environment
  • 18. Local Area Networks Distance (meters) 10-3 100 103 106 Number of devices interconnected 1 10 100 1,000 10,000 >100,000 System/Stora ge Area Networks Wide Area Networks Metropolitan Area Networks INTERCONNECTION NETWORK DOMAINS
  • 19. INTERCONNECTION NETWORK DOMAINS Local Area Networks 10-3 100 103 106 Number of devices interconnected 1 10 100 1,000 10,000 >100,000 System/Stora ge Area Networks Wide Area Networks Metropolitan Area Networks On-Chip Interconnection Networks/Networks- on-Chip
  • 21. MULTI-ACCESS NETWORK • Multi-Access Network is also known as multi-point or broadcast network , allow multiple devices to connect to communicate over same network. • This type of network can have different topologies like ring, star, bus
  • 23. TWO POPULAR MODELS OPEN SYSTEMS INTERCONNECTI ON TCP/IP MODEL
  • 24. AS PER THE REPORTS HOW MANY NUMBER OF STUDENTS USE THE INTERNET? Statistical bar chart for available Internet users.
  • 27. PROTOCOL LAYERING • To communicate using the Internet system, a host must implement the layered set of protocols comprising the Internet protocol suite
  • 28.
  • 29. INTERNET ADDRESSING An IP address is a unique global address for a network interface. It is 32-bit logical address, composed of four 8-bit fields, called octets. The address is represented in “dotted decimal notation” by grouping the four octets. Each octet represents a decimal number in the range 0–255 (since 255 is the maximum 8-bit binary number), i.e., the format of IP address is xxx.xxx.xxx.xxx, where each xxx is a number from 0 to 255. These are unique numbers and controlled by address registry. For example, 17.112.152.32 is the IP address for www.apple.com, for www.amazon.com it is 54.239.26.128 and that for www.dtu.ac.in is 122.160.182.54.
  • 30. IP address is divided into two parts: a prefix which identifies the physical network to which the host is attached and a suffix which identifies a specific computer (host/node) on the network. Each network on the Internet is assigned a unique network number and each computer on a given network is assigned a unique suffix
  • 31.
  • 32. • Protocol: It specifies the transfer protocol that will be used for retrieval of desired resource. Examples include Hypertext Transfer Protocol (http), HTTP Secure Protocol (https), and File Transfer Protocol (ftp). Domain name: The Domain name is also known as website name or host name. It is often divided into three parts: www (optional), second level name (e.g., dtu.ac in www.dtu.ac.in), and top level name (Organizational: 3-character code indicates the function of the organization
  • 33. Path: It is the directory or the folder on the server. It is the path used to specify and perhaps find the resource requested, i.e., a path to a file located on the web server. File name: The file name element of a URL is the file name within that directory with an extension such as htm, html, php, and so on.
  • 34. DNS HIERARCHY • The DNS is implemented as a distributed system and has a hierarchical structure, that is, the name hierarchy can be represented as a tree. Each node in the DNS tree represents a DNS name. Each branch below a node is a DNS domain. DNS domain can contain hosts or other domains (sub-domains). The top-level domains are at the root of the tree followed by the top-down sub-domains.
  • 35.
  • 36. URL: Contains information about how to fetch a resource from its location. URLs always start with a protocol (http) and usually contain information such as the network host name (dtu.ac.in) and often a document path (/Academics/syllabus.php). For example: http://dtu.ac.in/Web/Academics/syllabus.php ftp://example.com/download.zip URN: Identifies a resource by a unique and persistent name. It usually starts URI: The URI encompasses URLs, URNs, and other ways
  • 37. ACCESSING THE INTERNET • The Internet consists of millions of connected computing devices, known as hosts or end systems, which are connected together by communication links. • The hosts are not usually directly attached to each other via a single communication link. Instead, they are indirectly connected to each other through intermediate switching devices called routers.
  • 38. Dial-up access: Dial-Up Connection works over an ordinary phone line, using analog modems establishing the Point-to- Point Protocol (PPP). As the personal computers are mostly equipped with analog modems, there is usually no additional money needed for hardware High-speed access: A high-speed connection also known as the broadband connection comprises of divergent options such as Digital Subscriber Line (DSL), Integrated Services Digital Network (ISDN) Lines, leased line, and cable Internet connections. DSL is a family of all-digital, high-speed lines that use normal phone wires with special modems.
  • 39. • Wireless access: Another way to connect to the Internet is via a Wireless access using Wi-Fi technology. A Wi-Fi enabled device, such as a PC, game console, cell phone, MP3 player, or personal data assistant (PDA), can connect to the Internet when its within range of a wireless network connected to the Internet.
  • 40. WEB BROWSER • A web browser is a software program that retrieves, presents, and traverses information resources on the Web. The primary function of a browser is to identify the URL and bring the information resource to user. To identify a web pages’ exact location, a web browser relies on a URL. A URL, as described previously, is a four-part addressing scheme that tells the web browser:
  • 41. • The transfer protocol to use for transporting the file • The domain name of the computer on which the file resides • The pathname of the folder or directory on the computer on which the file resides • The name of the file
  • 42. CYBER ETHICS • Cyber Ethics refers to the code of responsible behavior on the Internet. It entails basic Internet etiquettes, also known as Netiquettes, which are the set of rules or guidelines for cyberspace behavior. The expected conduct must be ethical, and users must act within the laws of society and cyberspace.
  • 43. • Communicating, sharing, and contributing to e-society in a positive manner • To be respectful and courteous in communication (do not use rude or offensive language) • Avoid harming others (do not spread pictures, viruses, gossip, information about others, do not use others’ usernames and passwords, i.e., do not impersonate others and do not trespass in other’s files) • Sharing network resources, being honest and trustworthy