SlideShare a Scribd company logo
Prepared by Mr.Manish Jha
Section Officer and faculty, University
of Petroleum & Energy
Studies,Dehradun
 Modem- A device that enables a computer to transmit
data over telephone lines.
 Connector- A device that mating and demating
electrical power connection.
 Cables- It consists of bundle of wires with connector
on the ends.
 Adaptor- It is a physical device that allow to interface
between one hardware to another interface hardware.
 Circuits- is a specific path between to points by which
signals can be carried out.
 Switches- It is a network device that select a path or
circuit to send unit of data to its next destination.
 Leased Lines- It is a telephone line connection that has
been used for private purpose
 1. Hardware and Software Requirement
 2. Protocol
 Transmission Media
 E-Mail
 Protocol is a set of rules and procedure for
communicating.
 There are many protocols
 Some Protocol works only at particular OSI.
 Protocol can also work together is a suit.
 How Protocol Works – Data is transmitted over
the network and to be break down in a
systematic steps. Each steps its own rules and
procedure.
 TCP/IP
 X.25
 Frame Relay
 ATM 2
 Sonet
 Function of Protocol
 The protocol steps must be carried out in a consistent order
that is the same on every computer in the network. In the
sending computer, these steps must be executed from the
top down. In the receiving computer, these steps must be
carried out from the bottom up.
 The Sending Computer
 Protocols at the sending computer:
 Break the data into smaller sections, called packets, that the
protocol can handle.
 Add addressing information to the packets so that the
destination computer on the network can determine that the
data belongs to it.
 Prepare the data for transmission through the NIC and out
onto the network cable.
 The Receiving Computer- Protocols at the receiving
computer carry out the same series of steps in reverse order.
They:
 Take the data packets off the cable.
 Bring the data packets into the computer through the NIC.
 Strip the data packets of all the transmitting information
that was added by the sending computer.
 Copy the data from the packets to a buffer for reassembly.
 Pass the reassembled data to the application in a usable
form.
 Both sending and receiving computers need to perform each
step in the same way so that the data will have the same
structure when it is received as it did when it was sent.
 TCP/IP – It consists of multiple protocols, each of
which transfer data across the network in a different
form at with different option such as error checking.
 X.25- It uses packet switching. Difference :-
 TCP/IP has only end-to-end error checking and flow
control; X.25 has error checking from node to node.
 To compensate for the fact that a TCP/IP network is
completely passive, TCP/IP has a more complicated
flow control and window mechanism than X.25 has.
 X.25 has tightly specified the electrical and link levels;
TCP/IP is designed to travel over many different kinds
of media, with many different types of link service.
 Other protocols written specifically for the
TCP/IP suite include:
 SMTP (Simple Mail Transfer Protocol) E-
mail.
 FTP (File Transfer Protocol) For exchanging
files among computers running TCP/IP.
 SNMP (Simple Network Management
Protocol) For network management.
Types of Internet Protocol ?-
A. Electronic Mail- SMTP,IMAP (Internet Message Access
Protocol), POP3 (POST OFFICE PROTOCOL3)
B. FTP
C. HTTP- It allows to shown the web page in web
broswer.
D. Telnet
E. Gopher
F. Usenet
What is Domain ?
Role on Domain Name System .
Role of DHCP- ( Dynamic Host Configuration Protocol)
 Difference between TCP and IP.
IP Addressing
Domain Name Server
 Domain Name Server
 It’s a network service that translate “names”
into IP Address.
 Domain Name & Host Name
 .com Yahoo -
 .com google
 ac.in upes
 Host Name
 IP uses 32 bits
 1 byte= 8 bits
 4 bytes= 32 bits
 IP consists of 4 numbers and number always
between 0 to 255.
 It consists of two components –One
component is network portion of the address.
 Second component is Host portion of the
address.
Types of OSI Layers :
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
OSI- Open System Interconnection was
developed in 1984 by ISO (International
Standard Organization) . OSI model is a set of
seven layers that ensure that must travel from
one device to another device over the
network. In earlier it was called
internetworking.
Application Layer – This layer actually interact
with the operating system or application
whenever user transfer file,read message and
perform other network activities
Presentation Layer takes the data provided by the Application layer and
converts it into a standard format that the other layers can understand.
SESSION LAYER : The session layer tracks connections, also called sessions.
The session layer should keep track of multiple file downloads requested
by a particular FTP application, or multiple telnet connections from a
single terminal client, or web page retrievals from a web server.
TRANSPORT LAYER :-
 DATA LINK LAYER
 The data link layer provides error-free transfer of data frames from one
node to another over the physical layer, allowing layers above it to
assume virtually error-free transmission over the link. To do this, the data
link layer provides:
 The upper layers of the OSI model represent
software that implements network services like
encryption and connection management.
 The lower layers of the OSI model implement
more primitive, hardware-oriented functions
like routing, addressing, and flow control.
 PHYSICAL LAYER
 The physical layer, the lowest layer of the OSI
model, is concerned with the transmission and
reception of the unstructured raw bit stream over a
physical medium. It describes the
electrical/optical, mechanical, and functional
interfaces to the physical medium, and carries the
signals for all of the higher layers.
Network Layer of the OSI model known as OSI
Network Layer has a role to carry data from the
source address to destination address . Like,
TCP/IP address.
 Cloud computing is basically an Internet-based
network made up of large numbers of
 servers - mostly based on open standards, modular
and inexpensive. Clouds contain
 vast amounts of information and provide a variety
of services to large numbers of
 people. The benefits of cloud computing are
Reduced Data Leakage, Decrease evidence
 acquisition time, they eliminate or reduce service
downtime, they Forensic readiness, they
 Decrease evidence transfer time
 History
 The Cloud is a metaphor for the Internet, derived from its
common depiction in network diagrams
 (or more generally components which are managed by
others) as a cloud outline.
 The underlying concept dates back to 1960 when John
McCarthy opined that "computation may
 someday be organized as a public utility" (indeed it shares
characteristics with service bureaus
 which date back to the 1960s) and the term The Cloud was
already in commercial use around
 the turn of the 21st century. Cloud computing solutions had
started to appear on the market,
 though most of the focus at this time was on Software as a
service.
 Types of services:
 These services are broadly divided into three
categories:
 Infrastructure-as-a-Service (IaaS)
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS).
 Types by visibility:
 Public Cloud
 Hybrid Cloud
 Private Cloud
 Public Clouds
 A public cloud is one in which the services and infrastructure are
provided off-site over the Internet. These clouds offer the greatest level of
efficiency in shared resources; however, they are also more vulnerable
than private clouds. A public cloud is the obvious choice
 when :-
 Our standardized workload for applications is used by lots of people,
such as e-mail.
 we need to test and develop application code.
 we have SaaS (Software as a Service) applications from a vendor who has
a well-implemented security strategy.
 We need incremental capacity (the ability to add computer capacity for
peak times).
 We are doing collaboration projects.
 We are doing an ad-hoc software development project using a Platform as
a Service (PaaS) offering cloud.

More Related Content

What's hot

Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
Nayan Sarma
 
Osi model
Osi modelOsi model
Osi model
GLIM Digital
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
Saif Muttair
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
Sangeetha Rangarajan
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
adpeer
 
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Basma Gamal
 
Network protocol
Network protocolNetwork protocol
Network protocol
PriyangaRajaram
 
Internetworking
InternetworkingInternetworking
Internetworking
Dhanya LK
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Internetworking
InternetworkingInternetworking
Internetworking
Mahendhirakumar C
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Hemnath R.
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
Ravi Yasas
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication Architecture
Kamal Acharya
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Introduction to internet
Introduction to internetIntroduction to internet
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
JGrace Johnny
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
Nitesh Singh
 

What's hot (20)

Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Osi model
Osi modelOsi model
Osi model
 
Network and Protocol
 Network and Protocol Network and Protocol
Network and Protocol
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Application Layer
Application Layer Application Layer
Application Layer
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication Architecture
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 

Viewers also liked

Comparation
ComparationComparation
Comparation
Johannita Palacios
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
Elliot Wheeler
 
Age certificate presentation
Age certificate presentationAge certificate presentation
Age certificate presentation
Elliot Wheeler
 
Tilt Wall Projects
Tilt Wall ProjectsTilt Wall Projects
Tilt Wall Projects
Beacon Marshall
 
SWMS
SWMSSWMS
العربيزي بين الواقع والمستقبل arabizi
العربيزي بين الواقع والمستقبل arabiziالعربيزي بين الواقع والمستقبل arabizi
العربيزي بين الواقع والمستقبل arabizi
Zoe Wong
 
Desain presentasi soi
Desain presentasi soiDesain presentasi soi
Desain presentasi soi
Roy Pandapotan
 
Prezentacja SP3
Prezentacja SP3Prezentacja SP3
Prezentacja SP3ddarek
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
TylaJayde
 
Q2 final
Q2 finalQ2 final
Q2 final
lucyeaston
 
Twitter tactics
Twitter tacticsTwitter tactics
Twitter tactics
Mediotype .
 
ITG Investor Presentation February 2014
ITG Investor Presentation February 2014ITG Investor Presentation February 2014
ITG Investor Presentation February 2014
Investment_Tech_Group
 
Educ 100 powerpoint
Educ 100 powerpointEduc 100 powerpoint
Educ 100 powerpoint
anniewei511
 
Los primeros pobladores del peru
Los primeros pobladores del peruLos primeros pobladores del peru
Los primeros pobladores del peru
gustavomiguelchoque
 
Cum să găteşti friptura perfectă
Cum să găteşti friptura perfectăCum să găteşti friptura perfectă
Cum să găteşti friptura perfectă
serios31
 
Trabajo id 000336158
Trabajo id 000336158Trabajo id 000336158
Trabajo id 000336158
Junior931224
 
kế toán bán hàng và xác định kết quả kinh doanh
kế toán bán hàng và xác định kết quả kinh doanhkế toán bán hàng và xác định kết quả kinh doanh
kế toán bán hàng và xác định kết quả kinh doanh
Hoan Ngan Dauda Kun
 

Viewers also liked (20)

Comparation
ComparationComparation
Comparation
 
Evaluation question 4
Evaluation question 4Evaluation question 4
Evaluation question 4
 
Age certificate presentation
Age certificate presentationAge certificate presentation
Age certificate presentation
 
Tilt Wall Projects
Tilt Wall ProjectsTilt Wall Projects
Tilt Wall Projects
 
Kien tap
Kien tapKien tap
Kien tap
 
SWMS
SWMSSWMS
SWMS
 
العربيزي بين الواقع والمستقبل arabizi
العربيزي بين الواقع والمستقبل arabiziالعربيزي بين الواقع والمستقبل arabizi
العربيزي بين الواقع والمستقبل arabizi
 
Hair factor pdf
Hair factor pdfHair factor pdf
Hair factor pdf
 
Desain presentasi soi
Desain presentasi soiDesain presentasi soi
Desain presentasi soi
 
Prezentacja SP3
Prezentacja SP3Prezentacja SP3
Prezentacja SP3
 
Evaluation question 6
Evaluation question 6Evaluation question 6
Evaluation question 6
 
Q2 final
Q2 finalQ2 final
Q2 final
 
Twitter tactics
Twitter tacticsTwitter tactics
Twitter tactics
 
Rm pecha cucha13
Rm pecha cucha13Rm pecha cucha13
Rm pecha cucha13
 
ITG Investor Presentation February 2014
ITG Investor Presentation February 2014ITG Investor Presentation February 2014
ITG Investor Presentation February 2014
 
Educ 100 powerpoint
Educ 100 powerpointEduc 100 powerpoint
Educ 100 powerpoint
 
Los primeros pobladores del peru
Los primeros pobladores del peruLos primeros pobladores del peru
Los primeros pobladores del peru
 
Cum să găteşti friptura perfectă
Cum să găteşti friptura perfectăCum să găteşti friptura perfectă
Cum să găteşti friptura perfectă
 
Trabajo id 000336158
Trabajo id 000336158Trabajo id 000336158
Trabajo id 000336158
 
kế toán bán hàng và xác định kết quả kinh doanh
kế toán bán hàng và xác định kết quả kinh doanhkế toán bán hàng và xác định kết quả kinh doanh
kế toán bán hàng và xác định kết quả kinh doanh
 

Similar to Manish Jha- Research Scholar- Internet Basics Requriement

CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
mohanravi1986
 
Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
jesuscried
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
DeepVala5
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
SmtArunaAsafAliGovtP
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
Cisco doc
Cisco docCisco doc
Cisco doc
Prakash V
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
shucaybcabdi
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
Raghu nath
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
shankars73
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
penetration Tester
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
Bry Cunal
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
sumit dimri
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
MeenakshiGupta233101
 
Assignment3
Assignment3Assignment3
Assignment3
MahfujurRahman63
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
AdiseshaK
 

Similar to Manish Jha- Research Scholar- Internet Basics Requriement (20)

CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Osi model
Osi modelOsi model
Osi model
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
Assignment3
Assignment3Assignment3
Assignment3
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 

Recently uploaded

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 

Recently uploaded (20)

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 

Manish Jha- Research Scholar- Internet Basics Requriement

  • 1. Prepared by Mr.Manish Jha Section Officer and faculty, University of Petroleum & Energy Studies,Dehradun
  • 2.  Modem- A device that enables a computer to transmit data over telephone lines.  Connector- A device that mating and demating electrical power connection.  Cables- It consists of bundle of wires with connector on the ends.  Adaptor- It is a physical device that allow to interface between one hardware to another interface hardware.  Circuits- is a specific path between to points by which signals can be carried out.  Switches- It is a network device that select a path or circuit to send unit of data to its next destination.  Leased Lines- It is a telephone line connection that has been used for private purpose
  • 3.  1. Hardware and Software Requirement  2. Protocol  Transmission Media  E-Mail
  • 4.  Protocol is a set of rules and procedure for communicating.  There are many protocols  Some Protocol works only at particular OSI.  Protocol can also work together is a suit.  How Protocol Works – Data is transmitted over the network and to be break down in a systematic steps. Each steps its own rules and procedure.
  • 5.  TCP/IP  X.25  Frame Relay  ATM 2  Sonet  Function of Protocol
  • 6.  The protocol steps must be carried out in a consistent order that is the same on every computer in the network. In the sending computer, these steps must be executed from the top down. In the receiving computer, these steps must be carried out from the bottom up.  The Sending Computer  Protocols at the sending computer:  Break the data into smaller sections, called packets, that the protocol can handle.  Add addressing information to the packets so that the destination computer on the network can determine that the data belongs to it.  Prepare the data for transmission through the NIC and out onto the network cable.
  • 7.  The Receiving Computer- Protocols at the receiving computer carry out the same series of steps in reverse order. They:  Take the data packets off the cable.  Bring the data packets into the computer through the NIC.  Strip the data packets of all the transmitting information that was added by the sending computer.  Copy the data from the packets to a buffer for reassembly.  Pass the reassembled data to the application in a usable form.  Both sending and receiving computers need to perform each step in the same way so that the data will have the same structure when it is received as it did when it was sent.
  • 8.  TCP/IP – It consists of multiple protocols, each of which transfer data across the network in a different form at with different option such as error checking.  X.25- It uses packet switching. Difference :-  TCP/IP has only end-to-end error checking and flow control; X.25 has error checking from node to node.  To compensate for the fact that a TCP/IP network is completely passive, TCP/IP has a more complicated flow control and window mechanism than X.25 has.  X.25 has tightly specified the electrical and link levels; TCP/IP is designed to travel over many different kinds of media, with many different types of link service.
  • 9.  Other protocols written specifically for the TCP/IP suite include:  SMTP (Simple Mail Transfer Protocol) E- mail.  FTP (File Transfer Protocol) For exchanging files among computers running TCP/IP.  SNMP (Simple Network Management Protocol) For network management.
  • 10. Types of Internet Protocol ?- A. Electronic Mail- SMTP,IMAP (Internet Message Access Protocol), POP3 (POST OFFICE PROTOCOL3) B. FTP C. HTTP- It allows to shown the web page in web broswer. D. Telnet E. Gopher F. Usenet What is Domain ? Role on Domain Name System . Role of DHCP- ( Dynamic Host Configuration Protocol)
  • 11.  Difference between TCP and IP. IP Addressing Domain Name Server
  • 12.  Domain Name Server  It’s a network service that translate “names” into IP Address.  Domain Name & Host Name  .com Yahoo -  .com google  ac.in upes  Host Name
  • 13.  IP uses 32 bits  1 byte= 8 bits  4 bytes= 32 bits  IP consists of 4 numbers and number always between 0 to 255.  It consists of two components –One component is network portion of the address.  Second component is Host portion of the address.
  • 14. Types of OSI Layers : 1. Application Layer 2. Presentation Layer 3. Session Layer 4. Transport Layer 5. Network Layer 6. Data Link Layer 7. Physical Layer
  • 15. OSI- Open System Interconnection was developed in 1984 by ISO (International Standard Organization) . OSI model is a set of seven layers that ensure that must travel from one device to another device over the network. In earlier it was called internetworking. Application Layer – This layer actually interact with the operating system or application whenever user transfer file,read message and perform other network activities
  • 16. Presentation Layer takes the data provided by the Application layer and converts it into a standard format that the other layers can understand. SESSION LAYER : The session layer tracks connections, also called sessions. The session layer should keep track of multiple file downloads requested by a particular FTP application, or multiple telnet connections from a single terminal client, or web page retrievals from a web server. TRANSPORT LAYER :-  DATA LINK LAYER  The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the link. To do this, the data link layer provides:
  • 17.  The upper layers of the OSI model represent software that implements network services like encryption and connection management.  The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control.
  • 18.  PHYSICAL LAYER  The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. Network Layer of the OSI model known as OSI Network Layer has a role to carry data from the source address to destination address . Like, TCP/IP address.
  • 19.  Cloud computing is basically an Internet-based network made up of large numbers of  servers - mostly based on open standards, modular and inexpensive. Clouds contain  vast amounts of information and provide a variety of services to large numbers of  people. The benefits of cloud computing are Reduced Data Leakage, Decrease evidence  acquisition time, they eliminate or reduce service downtime, they Forensic readiness, they  Decrease evidence transfer time
  • 20.
  • 21.  History  The Cloud is a metaphor for the Internet, derived from its common depiction in network diagrams  (or more generally components which are managed by others) as a cloud outline.  The underlying concept dates back to 1960 when John McCarthy opined that "computation may  someday be organized as a public utility" (indeed it shares characteristics with service bureaus  which date back to the 1960s) and the term The Cloud was already in commercial use around  the turn of the 21st century. Cloud computing solutions had started to appear on the market,  though most of the focus at this time was on Software as a service.
  • 22.  Types of services:  These services are broadly divided into three categories:  Infrastructure-as-a-Service (IaaS)  Platform-as-a-Service (PaaS)  Software-as-a-Service (SaaS).
  • 23.  Types by visibility:  Public Cloud  Hybrid Cloud  Private Cloud
  • 24.  Public Clouds  A public cloud is one in which the services and infrastructure are provided off-site over the Internet. These clouds offer the greatest level of efficiency in shared resources; however, they are also more vulnerable than private clouds. A public cloud is the obvious choice  when :-  Our standardized workload for applications is used by lots of people, such as e-mail.  we need to test and develop application code.  we have SaaS (Software as a Service) applications from a vendor who has a well-implemented security strategy.  We need incremental capacity (the ability to add computer capacity for peak times).  We are doing collaboration projects.  We are doing an ad-hoc software development project using a Platform as a Service (PaaS) offering cloud.