Presentation on "Overview of Internet Technologies and
Web 2.0" on 2nd of Feb 2009 during STC on INTERNET (2nd of Feb.2009 to 06th of Feb 2009) at NATIONAL INSTITUTE OF TECHNICAL TEACHERS’ TRAINING AND RESEARCH CHANDIGARH
As growth of internet and computer increase day by day so as the growth of attacks on network is also
tremendously increased day by day. In this paper we introduced a wired network and create two TCP
source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack
on the bandwidth of TCP node at source side sends data to destination through router and also measure the
impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that
node will drop down due to the impact of flooding type denial-of-service attack and shows the result using
NS-2 NAM & Xgraph windows in simulation.
DRDoS is the latest in the series of Denial of Service attacks. An explanation of the history of this type of attack is in order to fully understand the ramifications of this new threat.http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/DRDoS-Spyrochaete.html
This document discusses networking concepts and provides an overview of networking components and protocols. It covers:
- Computers need to be networked so data on one machine can be used on another. A typical small office network has 4 machines connected with one acting as a file-sharing server.
- Common server software includes Windows file sharing, Novell Netware, Windows Server, and Linux/Samba. Network cards connect machines physically via wired or wireless connections.
- Protocols like IP, AppleTalk, NetBEUI, and IPX are used to transmit data packets between machines. The OSI model organizes network components into seven layers. Popular protocols operate at various layers like TCP/IP at layers 3-4
MikroTik is a Linux-based router that can be installed and fully operated on a regular PC. It has many features, including performing functions like NAT, bandwidth management, and filtering at the 3-layer network level, allowing it to efficiently route high bandwidth and perform operations like NAT and filtering on low-end hardware. MikroTik also offers stability, security, and ease of configuration through its web interface and command line tools.
The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone." These lines are connected to major Internet hubs that distribute data to other locations, such as web servers and ISPs.Sep 17, 2015
The document discusses Internet of Things (IoT) solutions and development platforms. It defines IoT and describes the business benefits, including enhanced customer service, increased revenue, improved asset usage, and more data for analytics. The document outlines the key components of an IoT implementation architecture, including devices, connectivity protocols, data storage, security, and analytics services. It also discusses improving IoT through process re-engineering, productivity gains, and establishing business objectives.
Technologies for the Internet of ThingsBjörn Ekelund
Internet of things is one of the pillars of Ericsson's Networked Society vision. Internet of things is becoming a reality here and now driven by a number of business and technology factors. This presentation discuss key technologies that will enable and drive the Internet of Things.
Ibm middleware point of view 060815 dark backgroundShane McCaul
The document discusses digital transformation and how organizations can break down barriers to digital transformation. It highlights how digital disruptors are using technologies like mobile apps, real-time insights, and digital innovation to transform their industries. It then discusses how an organization's technology needs to be flexible and future-proofed to either disrupt or be disrupted by digital transformation in their industry.
As growth of internet and computer increase day by day so as the growth of attacks on network is also
tremendously increased day by day. In this paper we introduced a wired network and create two TCP
source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack
on the bandwidth of TCP node at source side sends data to destination through router and also measure the
impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that
node will drop down due to the impact of flooding type denial-of-service attack and shows the result using
NS-2 NAM & Xgraph windows in simulation.
DRDoS is the latest in the series of Denial of Service attacks. An explanation of the history of this type of attack is in order to fully understand the ramifications of this new threat.http://servv89pn0aj.sn.sourcedns.com/~gbpprorg/2600/DRDoS-Spyrochaete.html
This document discusses networking concepts and provides an overview of networking components and protocols. It covers:
- Computers need to be networked so data on one machine can be used on another. A typical small office network has 4 machines connected with one acting as a file-sharing server.
- Common server software includes Windows file sharing, Novell Netware, Windows Server, and Linux/Samba. Network cards connect machines physically via wired or wireless connections.
- Protocols like IP, AppleTalk, NetBEUI, and IPX are used to transmit data packets between machines. The OSI model organizes network components into seven layers. Popular protocols operate at various layers like TCP/IP at layers 3-4
MikroTik is a Linux-based router that can be installed and fully operated on a regular PC. It has many features, including performing functions like NAT, bandwidth management, and filtering at the 3-layer network level, allowing it to efficiently route high bandwidth and perform operations like NAT and filtering on low-end hardware. MikroTik also offers stability, security, and ease of configuration through its web interface and command line tools.
The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone." These lines are connected to major Internet hubs that distribute data to other locations, such as web servers and ISPs.Sep 17, 2015
The document discusses Internet of Things (IoT) solutions and development platforms. It defines IoT and describes the business benefits, including enhanced customer service, increased revenue, improved asset usage, and more data for analytics. The document outlines the key components of an IoT implementation architecture, including devices, connectivity protocols, data storage, security, and analytics services. It also discusses improving IoT through process re-engineering, productivity gains, and establishing business objectives.
Technologies for the Internet of ThingsBjörn Ekelund
Internet of things is one of the pillars of Ericsson's Networked Society vision. Internet of things is becoming a reality here and now driven by a number of business and technology factors. This presentation discuss key technologies that will enable and drive the Internet of Things.
Ibm middleware point of view 060815 dark backgroundShane McCaul
The document discusses digital transformation and how organizations can break down barriers to digital transformation. It highlights how digital disruptors are using technologies like mobile apps, real-time insights, and digital innovation to transform their industries. It then discusses how an organization's technology needs to be flexible and future-proofed to either disrupt or be disrupted by digital transformation in their industry.
From Jisc's student experience experts group meeting in Birmingham on 21 April 2016.
https://www.jisc.ac.uk/events/student-experience-experts-group-meeting-20-apr-2016
Presentation by the Comarch Technologies division. Bluetooth Low-Energy devices and LORA are taking over the Telecommunications industry. How can the IoT environment best be integrated for Telecom operators?
IoT = device + cloud. how to architect an iot solution slideshareGuy Vinograd ☁
This document discusses architecting an IoT solution and addresses common dilemmas. It introduces Guy Vinograd as the CEO of Softimize, an IoT platform provider. Softimize's TBBT platform offers services like push notifications, access control, security, billing and analytics to help vendors focus on their core business rather than developing their own cloud infrastructure. The document then outlines three common IoT design dilemmas around human-sensor interactions, sensor placement and maintenance, and determining the best locations for an IoT gateway, data and logic processing, and message formats.
Yury Birchenko, CTO at NWave, shared successful examples of LPWAN technologies and explained how to choose the right LPWAN at Digital Catapult's LPWAN London Meetup.
The convergence of the Internet of Things and EnergyTom Raftery
Climate change is wreaking havoc on our planet. Electricity generation is responsible for a large part of oue CO2 emissions. Renewable energy can help reduce the carbon footprint of energy production but it has its own problems.
The Internet of Things can play a significant part in reducing the problems associated with integrating renewables into the electricity grid.
Check out slides presented by Mo Haghighi, Research Scientist at Intel Labs Europe, which explore how to solve urban challenges at the Olympic Park. These slides were presented at Digital Catapult's LPWAN London meetup.
Plumbr is a SaaS solution that detects performance issues in enterprise software environments and provides instructions to avoid them. It has paying customers and automatically grows its knowledge base. Plumbr analyzes data to detect anomalies and problem sources, then provides plain English solutions to save developers weeks of troubleshooting time each year. The company aims to expand its issue detection capabilities and improve suggestion quality over time.
The document describes SprayPrinter, a startup that has developed a 3D printer that sprays paint onto walls to allow users to design and print their own wall art and patterns. The printer lets users choose a design, activate the printer, and enjoy the printing process. SprayPrinter aims to disrupt the home improvement and interior design market and has received over $130k in funding from accelerators and angel investors. If successful, the market for wall printing could grow to $300 billion by 2018. The startup is currently raising additional funds to support further research and development, communications, business development, and office operations.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Overview of which LPWAN technologies (LoRa, Sigfox, Weightless, etc.) are right for various IoT applications. Clear look at the pros and cons of each technology.
In November 2013 Weekdone (https://weekdone.com/) became the winner of pitching competition at Slush, one of the largest startup and tech events in Europe. We were the best out of 100 companies pitching. 2 years later Weekdone is a successful profitable companies, used for improving internal communications and team spirit from Fortune 500 to startups and SMEs. This is our winning pitch from 2 years ago when we got started.
This is a 5-step model for creating a metrics framework for your business & customers, and how to apply it to your product & marketing efforts. The "pirate" part comes from the 5 steps: Acquisition, Activation, Retention, Referral, & Revenue (AARRR!)
The 10 most interesting slides that helped our SaaS company raise 9 millionGoCanvas
Have you ever wondered what goes into a pitch deck? Or what slides matter? Here are the 10 slides that seemed to resonate most with VCs we met with our our journey to raising our latest $9 million in funding. Be sure to check the notes for explanations of each slide.
The investor presentation we used to raise 2 million dollarsMikael Cho
The investor presentation we used to raise 2 million dollars for ooomf.com (now pickcrew.com)
View the online version here: https://pickcrew.com/investors/
To understand how the internet works, it is interesting to look back on how it developed. People like Tim Berners Lee, the role of ARPA and the cold war, the development of e-mail, protocols and IP-addresses all contributed to the web as we know it now. But what does the web we want in the future look like? Students of Web development should know about the history of the web, the W3C and the webfoundation.
Chapter 2 - Networks including the internet.pdfMerbertJeruela1
for AS/A Level Computer Science (for 2024 exam)
The network topology is a physical layout of the network devices. The most common network topologies are:
Bus topology: All devices are connected to a single cable.
Star topology: All devices are connected to a central hub or switch.
Mesh topology: All devices are connected to each other.
The star topology is the most common network topology because it is simple and reliable. The central switch acts as a traffic controller, directing data packets between the devices on the network.
The router is responsible for routing data packets between different networks. In this case, the router is routing data packets between the home network and the internet.
Here is a more detailed description of the network topology diagram:
Computer 1: This computer is connected to the switch using an Ethernet cable.
Computer 2: This computer is connected to the switch using an Ethernet cable.
Computer 3: This computer is connected to the switch using an Ethernet cable.
Computer 4: This computer is connected to the switch using an Ethernet cable.
Switch: The switch is a central hub that connects all of the devices on the network.
Router: The router is responsible for routing data packets between different networks.
The network topology diagram also shows the flow of data packets between the devices on the network. For example, if Computer 1 wants to send a data packet to Computer 2, the data packet will be sent to the switch. The switch will then forward the data packet to Computer 2.
If Computer 1 wants to send a data packet to the internet, the data packet will be sent to the switch. The switch will then forward the data packet to the router. The router will then route the data packet to the internet.
Network topology diagrams are useful for understanding how networks are designed and how data flows between the devices on a network.
In a thin client and thick client network, the thin clients are connected to the central server using a network cable. The server hosts the operating system and applications that the thin clients use.
When a user on a thin client wants to use an application, the thin client sends a request to the server. The server then sends the application to the thin client. The thin client then displays the application to the user.
Thin client and thick client networks have a number of advantages:
Reduced costs: Thin clients are less expensive to purchase and maintain than thick clients. This is because thin clients do not require their own processing power and storage.
Improved security: Thin clients are more secure than thick clients because they do not store any data locally. All data is stored on the central server. This makes it more difficult for hackers to steal data.
Increased scalability: Thin client and thick client networks are more scalable than traditional networks. This is because it is easier to add new thin clients to a network than it is to add new thick clients.
This document discusses key concepts in communication networks including networking benefits, transmission media, network topologies, protocols, addressing, naming, and an example application. It describes how a student's request for a website is processed from the browser to the webserver by resolving hostnames to IP addresses using DNS, resolving IP addresses to MAC addresses using ARP, and using HTTP for client-server communication. The document introduces concepts to be explored in more depth in subsequent lectures.
This document provides an overview and outline of a course on understanding basic CDMA for 2G and 3G systems. The course aims to introduce CDMA technology, review basic concepts as a foundation for 2G and 3G work, allow other techs to understand CDMA, and highlight similarities and differences between CDMA2000 and WCDMA/UMTS 3G standards. The outline covers basic CDMA principles, coding, IS-95 operational details, architecture, messaging, optimization tools, and differences between CDMA2000 and WCDMA/UMTS coding approaches.
From Jisc's student experience experts group meeting in Birmingham on 21 April 2016.
https://www.jisc.ac.uk/events/student-experience-experts-group-meeting-20-apr-2016
Presentation by the Comarch Technologies division. Bluetooth Low-Energy devices and LORA are taking over the Telecommunications industry. How can the IoT environment best be integrated for Telecom operators?
IoT = device + cloud. how to architect an iot solution slideshareGuy Vinograd ☁
This document discusses architecting an IoT solution and addresses common dilemmas. It introduces Guy Vinograd as the CEO of Softimize, an IoT platform provider. Softimize's TBBT platform offers services like push notifications, access control, security, billing and analytics to help vendors focus on their core business rather than developing their own cloud infrastructure. The document then outlines three common IoT design dilemmas around human-sensor interactions, sensor placement and maintenance, and determining the best locations for an IoT gateway, data and logic processing, and message formats.
Yury Birchenko, CTO at NWave, shared successful examples of LPWAN technologies and explained how to choose the right LPWAN at Digital Catapult's LPWAN London Meetup.
The convergence of the Internet of Things and EnergyTom Raftery
Climate change is wreaking havoc on our planet. Electricity generation is responsible for a large part of oue CO2 emissions. Renewable energy can help reduce the carbon footprint of energy production but it has its own problems.
The Internet of Things can play a significant part in reducing the problems associated with integrating renewables into the electricity grid.
Check out slides presented by Mo Haghighi, Research Scientist at Intel Labs Europe, which explore how to solve urban challenges at the Olympic Park. These slides were presented at Digital Catapult's LPWAN London meetup.
Plumbr is a SaaS solution that detects performance issues in enterprise software environments and provides instructions to avoid them. It has paying customers and automatically grows its knowledge base. Plumbr analyzes data to detect anomalies and problem sources, then provides plain English solutions to save developers weeks of troubleshooting time each year. The company aims to expand its issue detection capabilities and improve suggestion quality over time.
The document describes SprayPrinter, a startup that has developed a 3D printer that sprays paint onto walls to allow users to design and print their own wall art and patterns. The printer lets users choose a design, activate the printer, and enjoy the printing process. SprayPrinter aims to disrupt the home improvement and interior design market and has received over $130k in funding from accelerators and angel investors. If successful, the market for wall printing could grow to $300 billion by 2018. The startup is currently raising additional funds to support further research and development, communications, business development, and office operations.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Overview of which LPWAN technologies (LoRa, Sigfox, Weightless, etc.) are right for various IoT applications. Clear look at the pros and cons of each technology.
In November 2013 Weekdone (https://weekdone.com/) became the winner of pitching competition at Slush, one of the largest startup and tech events in Europe. We were the best out of 100 companies pitching. 2 years later Weekdone is a successful profitable companies, used for improving internal communications and team spirit from Fortune 500 to startups and SMEs. This is our winning pitch from 2 years ago when we got started.
This is a 5-step model for creating a metrics framework for your business & customers, and how to apply it to your product & marketing efforts. The "pirate" part comes from the 5 steps: Acquisition, Activation, Retention, Referral, & Revenue (AARRR!)
The 10 most interesting slides that helped our SaaS company raise 9 millionGoCanvas
Have you ever wondered what goes into a pitch deck? Or what slides matter? Here are the 10 slides that seemed to resonate most with VCs we met with our our journey to raising our latest $9 million in funding. Be sure to check the notes for explanations of each slide.
The investor presentation we used to raise 2 million dollarsMikael Cho
The investor presentation we used to raise 2 million dollars for ooomf.com (now pickcrew.com)
View the online version here: https://pickcrew.com/investors/
To understand how the internet works, it is interesting to look back on how it developed. People like Tim Berners Lee, the role of ARPA and the cold war, the development of e-mail, protocols and IP-addresses all contributed to the web as we know it now. But what does the web we want in the future look like? Students of Web development should know about the history of the web, the W3C and the webfoundation.
Chapter 2 - Networks including the internet.pdfMerbertJeruela1
for AS/A Level Computer Science (for 2024 exam)
The network topology is a physical layout of the network devices. The most common network topologies are:
Bus topology: All devices are connected to a single cable.
Star topology: All devices are connected to a central hub or switch.
Mesh topology: All devices are connected to each other.
The star topology is the most common network topology because it is simple and reliable. The central switch acts as a traffic controller, directing data packets between the devices on the network.
The router is responsible for routing data packets between different networks. In this case, the router is routing data packets between the home network and the internet.
Here is a more detailed description of the network topology diagram:
Computer 1: This computer is connected to the switch using an Ethernet cable.
Computer 2: This computer is connected to the switch using an Ethernet cable.
Computer 3: This computer is connected to the switch using an Ethernet cable.
Computer 4: This computer is connected to the switch using an Ethernet cable.
Switch: The switch is a central hub that connects all of the devices on the network.
Router: The router is responsible for routing data packets between different networks.
The network topology diagram also shows the flow of data packets between the devices on the network. For example, if Computer 1 wants to send a data packet to Computer 2, the data packet will be sent to the switch. The switch will then forward the data packet to Computer 2.
If Computer 1 wants to send a data packet to the internet, the data packet will be sent to the switch. The switch will then forward the data packet to the router. The router will then route the data packet to the internet.
Network topology diagrams are useful for understanding how networks are designed and how data flows between the devices on a network.
In a thin client and thick client network, the thin clients are connected to the central server using a network cable. The server hosts the operating system and applications that the thin clients use.
When a user on a thin client wants to use an application, the thin client sends a request to the server. The server then sends the application to the thin client. The thin client then displays the application to the user.
Thin client and thick client networks have a number of advantages:
Reduced costs: Thin clients are less expensive to purchase and maintain than thick clients. This is because thin clients do not require their own processing power and storage.
Improved security: Thin clients are more secure than thick clients because they do not store any data locally. All data is stored on the central server. This makes it more difficult for hackers to steal data.
Increased scalability: Thin client and thick client networks are more scalable than traditional networks. This is because it is easier to add new thin clients to a network than it is to add new thick clients.
This document discusses key concepts in communication networks including networking benefits, transmission media, network topologies, protocols, addressing, naming, and an example application. It describes how a student's request for a website is processed from the browser to the webserver by resolving hostnames to IP addresses using DNS, resolving IP addresses to MAC addresses using ARP, and using HTTP for client-server communication. The document introduces concepts to be explored in more depth in subsequent lectures.
This document provides an overview and outline of a course on understanding basic CDMA for 2G and 3G systems. The course aims to introduce CDMA technology, review basic concepts as a foundation for 2G and 3G work, allow other techs to understand CDMA, and highlight similarities and differences between CDMA2000 and WCDMA/UMTS 3G standards. The outline covers basic CDMA principles, coding, IS-95 operational details, architecture, messaging, optimization tools, and differences between CDMA2000 and WCDMA/UMTS coding approaches.
The document provides information about Divyanshu Kumar, their class and roll number, and the topic of Internet & Services. It then summarizes the history of the development of the Internet from the 1960s research through its commercialization. Key events included the creation of ARPANET and contributions from Vinton Cerf. The document outlines several common internet services like email, the World Wide Web, FTP, chat rooms, mailing lists, instant messaging, and newsgroups. It provides brief descriptions and examples of popular websites for email providers, search engines, and other internet tools and applications.
This document provides an overview of the CIS 3360: Security in Computing course being taught by Cliff Zou in Spring 2012. The objectives of the course are to obtain basic knowledge of computer networking, the Internet, network applications and protocols like TCP/IP. It introduces some key concepts like the layered Internet protocol stack, packet switching, and the hierarchical structure of the Internet as a network of networks consisting of end systems, routers, and communication links. Example applications and protocols for each layer are also discussed at a high level.
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
This document provides an overview of the objectives and topics to be covered in the CIS 3360: Security in Computing course. The objectives include obtaining basic knowledge of computer networking, the Internet, network protocols like TCP/IP, and assigned reading materials. The lecture materials will cover topics like a brief history of the Internet, components and applications of the Internet, the hierarchical structure of networks, protocols like TCP and IP, and addressing processes using ports and IP addresses.
This document provides information about a faculty development program on web technology. It discusses the history and development of the Internet, including how TCP/IP protocols were developed in the 1970s to allow communication between different computer networks. It also summarizes the goals and functions of TCP and IP protocols. The document then covers topics like DNS, the world wide web, how web servers work, popular web servers, and the basic definition of the web.
Assignment 2 LASA 1 IP NetworkingIn this assignment, you will wri.docxhuttenangela
Assignment 2: LASA 1 IP Networking
In this assignment, you will write a paper in which you recommend whether you feel your network is ready to transition to IPv6.
The IP is the basic communications protocol that all Internet traffic communicates with; essentially, the entire Internet is built on it. For the past two decades, we have used IPv4. In June 2012, there was an official worldwide release of an upgrade to IPv6. Routers, bridges, switches, and all other equipment (including operating systems) across the world had to be compatible with this version to ensure cross compatibility. The new version minimizes the size of packet headers (therefore, sending less traffic), supports multicasting, allows for stateless auto configuration, and, perhaps most importantly, adds IP address capability. Under IPv4, there were about 4.3 billion IP addresses available. Under IPv6, 340 trillion trillion (yes, two trillions) addresses available. This removed the urgent need for more IP addresses across the globe.
Tasks:
Your boss has read about IPv6 and wants to know whether the network you oversee is ready for the transition. Prepare a response based on the networking and computer operating systems used in your facility. In your response, include the following:
Identify the computer operating systems and networking systems used in the company.
Explain the pros and cons of IPv6 over the use of IPv4. Compare and contrast the two technologies.
Identify if the organization is currently ready for IPv6. Justify your answer with research.
Your company is assigned a 206.206.155.0/24 CIDR block by your ISP. Below is a CIDR block list for your reference. Your company consists of four different networks:
Network A: 50 users
Network B: 26 users
Network C: 12 users
Network D: 10 users
Describe how you will create four subnets and allocate enough IP addresses for the users within the network.
CIDR BLOCKS AND NUMBER OF HOST IDS PER SEGMENT
CIDR block
Number of equivalent
Class C networks
Number of network ID bits
Number of host
ID bits
Total number of host addresses per segment
= (2 ^# of host ID bits)
Number of usable host addresses per segment
= (2 ^# of host ID bits) – 2
/27
1/8 Class C
27
5
32
30
/26
1/4 Class C
26
6
64
62
/25
1/2 Class C
25
7
128
126
/24
1 Class C
24
8
256
254
/23
2 Class C
23
9
512
510
/22
4 Class C
22
10
1,024
1,022
/21
8 Class C
21
11
2,048
2,046
/20
16 Class C
20
12
4,096
4,094
/19
32 Class C
19
13
8,192
8,190
/18
64 Class C
18
14
16,384
16,382
/17
128 Class C
17
15
32,768
32,766
/16
256 Class C = 1 Class B
16
16
65,536
65,534
/15
512 Class C = 2 Class B
15
17
131,072
131,070
/14
1024 Class C=4 Class B
14
18
262,144
262,142
/13
2048 Class C=8 Class B
13
19
524,288
524,286
Submission Details:
By
Wednesday, March 2, 2016
, prepare a 5- to 7-page report. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., use APA format); and display accurate spelling, g.
Take a look at the most significant digital milestones that took place. We rely on the Internet and technology for so much, it has become integrated in our everyday lives so without each of these milestones, the world could be a very different place today.
The document discusses the origins and growth of the Internet and World Wide Web. It describes how the Internet began as a US Defense Department network and then expanded to academic and research institutions. The development of HTML, Web browsers, and graphical user interfaces allowed the World Wide Web to emerge and gain widespread popularity in the 1990s. The Internet uses packet switching and protocols like TCP/IP to transmit data between networked computers.
The document discusses various technologies that underlie electronic commerce, including the origins and growth of the Internet and World Wide Web. It describes how packet-switched networks connect computers into the Internet and how protocols like TCP/IP and HTTP facilitate communication. It also covers markup languages like HTML, XML, and related topics such as intranets, extranets, and options for connecting to the Internet.
The document discusses the history and services provided by the internet. It describes how the internet began as a research project called ARPANET in the 1960s and expanded to include private networks, leading to the development of common network protocols. Today, over 2 billion people worldwide use internet services. The key services discussed include electronic mail, the World Wide Web, file transfer protocol, chat rooms, mailing lists, instant messaging, online chat, and newsgroups. Each service is briefly described.
The lecture covers the history and development of the Internet including ARPANET, TCP/IP, and the growth of the World Wide Web. Key topics discussed include HTTP, HTML, web servers, cookies, client-server architecture, IP addresses, domain names, and standard bodies like W3C that develop web technologies.
[5]Data Communications and Computer Networks.pdfjeronimored
This textbook provides an overview of data communications and computer networks for computer scientists and engineers. It has been thoroughly revised in its second edition to cover modern networking issues such as network management, security, and encryption. The textbook focuses on the fundamental and engineering aspects of data communications and networking technologies. It covers international standards with an emphasis on standards for Europe and North America.
The document provides an overview of the Internet and how it functions. It can be summarized as follows:
The Internet is a global network of networks that connects millions of computers around the world. It was originally developed by researchers but is now used widely for various purposes like email, web publishing, messaging, banking and more. Key protocols like TCP/IP allow for the transmission of data between different networks and systems. Users can access the Internet through direct connections, dial-up, or broadband. Popular applications include email, instant messaging, file transfers, remote access and more. The client-server model supports distributed applications across the network.
CS101- Introduction to Computing- Lecture 30Bilal Ahmed
This document provides an overview of various internet services including FTP, Telnet, the World Wide Web, email, instant messaging, and VoIP. It begins with an introduction to internet addressing using IP addresses and domain names. It then explains how each service works at a high level, covering topics like how files are transferred using FTP, how browsing the web works, how email is sent and received, how instant messaging allows for real-time communication, and how voice calls can be made over the internet. The goal is to familiarize students with the key internet services and underlying addressing scheme.
The document discusses the history and development of the Internet and World Wide Web. It begins with the origins of ARPANET in 1969 as a US military network and describes how it later expanded internationally through networks connecting universities, organizations and businesses. It then explains key aspects of how the Internet functions through servers, clients and protocols. Finally, it discusses the development of the World Wide Web by Tim Berners-Lee in 1989 and common web browsers and protocols that allow users to access and navigate websites through URLs.
A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of COMPUTER NETWORK
This document provides instructions for connecting to a remote GNU/Linux server for a laboratory session. It lists the server name as code.gdy.club, the user ID as the student's roll number, the password which can be obtained from the Applied Science Department office, and the port as 22. It describes using the Mosh software to connect via typing "mosh username@servername" in the terminal. It outlines accepting the host key when first connecting and entering the password when prompted.
The document discusses open source and free software tools. It provides biographies of key figures in the open source movement like Richard Stallman and Mark Shuttleworth. It also summarizes the Open Source Definition and compares it to the Free Software Definition, noting they have different focuses - open source prioritizes individual interests while free software emphasizes social interests and copyleft licensing.
This document provides an overview and introduction to free and open source tools by H.S. Rai. It summarizes Rai's background and experience working with open source software since 1997. It also describes some commonly used open source GIS tools like OpenStreetMap, QGIS, GRASS, and SAGA and how they can be used for tasks like mapping, spatial analysis, and automation of geospatial work flows. Rai hopes to continue the discussion in Part II of the presentation.
Lecture delivered World Habitat Day, celebrated by Institute of Engineers (India), Ludhiana Local chapter, at Guru Nanak Dev Engineering College, Ludhiana, Punjab, India
This document outlines the process of creating a custom digital map server. It discusses digital mapping, OpenStreetMap, building an OSM tile server, and features of the custom map server like high zoom levels, search, and measurement tools. The document was created by Parveen Arora for their 6-week digital mapping training program at Guru Nanak Dev Engineering College under the guidance of Dr. H.S Rai.
QCAD is 2D computer-aided drafting software that can be used to create technical drawings for engineering projects like building plans, mechanical parts, and more. It supports common CAD features like layers, blocks, various drawing entities, and exporting to formats like DXF and PDF. QCAD has a multi-document interface and offers over 200 undo/redo levels. It is available for Windows, Mac, and Linux and is open source, making it a free and full-featured alternative to paid CAD software like AutoCAD.
QCad is a 2D CAD software package available for Linux, Mac OS X, Unix, and Windows. It uses the AutoCAD DXF file format and has features like layer support, blocks, dimensions, and the ability to import and export many file formats. QCad is developed by RibbonSoft and has a community edition released under the GPL and a professional edition with additional functionality available.
TurboCAD is a 2D and 3D CAD software application originally developed in South Africa in 1986. It runs on Windows and Mac operating systems. Over time, TurboCAD added support for additional hardware, expanded to international markets through localized versions, and transitioned from 2D drafting to include 3D modeling capabilities. It is currently on version 16 and remains a popular CAD software option.
CADopia is a presentation by Achintya Mohnish, a civil engineering student with roll number 100082. The presentation introduces CADopia, which is a software for computer-aided design. CADopia allows engineers to design structures digitally in 3D with precision and accuracy.
Felix CAD is a 2D CAD software created by Gräbert that allows users to open, edit, and save drawings in common file formats like DWG, DXF, and its own FLX format. It aims to provide professional CAD capabilities at an affordable price. Key features include the ability to work with billions of existing CAD files, compatibility with AutoCAD standards, and hundreds of drawing and editing tools. The software is optimized for use with Windows operating systems and supports simultaneous editing of multiple drawings. It also offers tutorials, command references, and cutting and pasting between drawings and other Windows programs like Microsoft Office.
The document discusses challenges facing urban planning and development, including rapid population growth, resource depletion, and climate change effects. It notes that over half the world's population lives in urban areas, with slums housing over 1 billion people. Successful urban planning requires adequate housing, infrastructure, and services for all residents, as well as meaningful community involvement. The document advocates for sustainable solutions and equal distribution of resources to address these global urban issues.
The document summarizes the author's experiences during the first 10 years of his career as a structural engineer from 1958-1968. It describes some of the major projects he worked on, including buildings for IIT Delhi, medical colleges, and factories. It highlights two learning experiences from early in his career - making an error in design calculations that was caught by a site engineer, and receiving guidance from his boss on properly designing brick structures. The boss handled the error calmly and taught the author through demonstrating designs. Overall it provides insights into the author's first decade in the field.
This document provides information about mapping in India. It includes details on the sizes of India, Punjab state, Ludhiana district, and Ludhiana city. It notes that major contributors to mapping are limited to four. Issues mentioned include the need to generate requirements and job opportunities as current satellite imagery has poor resolution. Suggestions include adding maps to cards and allowing addition of custom data and units.
The document discusses establishing the Structural Engineers Association of Punjab and Chandigarh (SEAPAC). SEAPAC would serve as a common platform and necessity for structural engineers in the region by defining serviceability, design loads, available materials, and structural systems. The objective of SEAPAC would be to cater to the overall professional needs of structural engineers in Punjab and Chandigarh through activities like continuing education programs.
Welcome of Structural Engineers by Dr. H.S.Rai, Prof. and Head Civil Engineering Department, Guru Nanak Dev Engineering College, Ludhiana (Pb) 141006 India
The document summarizes key points from a seminar on innovations in information technology and applications. It discusses the difference between invention and innovation, with invention being new concepts or products from ideas or research, and innovation being the commercialization and marketization of inventions. It also outlines some principles of innovation, roles of education in IT, examples of programming languages and standards, and advantages of open source software.
QCAD is a 2D CAD software used for technical drawings like building plans, mechanical parts, and diagrams. It is developed by RibbonSoft and available for Windows, Mac, and Linux. Key features include layers, blocks, fonts, units, importing/exporting DXF files, printing to scale, construction and modification tools. There are professional versions available for different platforms that can be purchased individually or with a site license.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
1. Overview Of
Internet
Technologies &
Web 2.0
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
2. The Internet
worldwide collection of
computer networks
1969: ARPA (Advanced
Research Projects Agency)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
3. Military project: that would
survive a nuclear war
Government agencies and
certain educational centers
ARPANET grew slowly (70's
and 80's)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
4. Accomplished the truly
monumental task
Building blocks of this new,
open, modular
conglomeration of networks
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
5. The various protocols (IP,
TCP, DNS, POP, and SMTP)
took shape over the years,
and by the time the World
Wide Web (HTML and HTTP)
was created in the early 90's,
this "Internet" had become a
fully functional, fairly robust
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
6. system of network -
communication, able to
support this new pair of
protocols which eventually
turned the Internet into a
household word
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
7. Web is not Internet; it is only
one type of Internet -
application, and one set of
protocols among a great
many which were in use for
over a decade before the Web
entered into the public
awareness
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
8. The Web is a subset of the
Internet
Email is not a part of the Web,
and neither are newsgroups,
although Web designers have
developed web sites through
which users, the world over,
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
9. commonly access both of
these much older forms of
Internet media
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
10. Email
It is convenient and efficient
way to send a message
Send bills, eliminate phone
calls, provide services without
ever having contact.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
12. History Of
Email
Experiment by the military to
be able to send to and from
the battlefield
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
13. st
1 email (1972) Ray Tomlinsin
Mail program: for Tenex
operating system
Heliomedia: The mail
program; SNDMSG;
READMAIL
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
14. MAIL and MLFL (1972) were
added to the FTP program
and provided standard
network transport capabilities
for email transmission
Early 1980's: more efficient
SMTP protocol was
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
15. developed. Among other
improvements, SMTP enabled
sending a single message to
a domain with more than one
addressee, after which the
local server would locally copy
the message to each recipient
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
16. In 1993, America Online and
Delphi started to connect their
proprietary email systems to
the Internet
1965: multiple users of
mainframe computer
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
17. Quickly extended to become
network e-mail
st
1 e-mail (1971)
PCs: offline readers
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
18. few standards: delete,
backspace keys, text to "wrap
around"
Eudora: 1988
POP (or Post Office Protocol)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
19. With the World Wide Web,
email started to be made
available with friendly web
interfaces
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
20. Routing Email
based entirely on the
destination address
username @ domain
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
21. Email client will deliver
outbound messages to their
local mail server using SMTP.
The local mail server then
performs a DNS lookup to find
the 'MX' (mail exchanger)
records for the recipient's
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
22. domain name. These MX
devices are the designated
mail servers for all email
addresses within that domain
The local server then attempts
an SMTP connection to each
of the MX servers in order of
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
23. priority, until a connection is
successful. It forwards the
message to the remote server
and ends the connection.
The remote mail server then
either repeats this process,
forwarding the message
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
24. closer to the intended
recipient, or may deliver the
message directly to the
recipient.
Before SMTP protocol, email
was delievered using the
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
25. UUCP (Unix-to-Unix Copy
Protocol).
In the early days of SMTP,
before Spam became a
massive problem on the
Internet, it was possible to
manually define the route that
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
26. an email message was to
take. This was done by
appending multiple
"@domain" entries to a
recipient address. For
example:
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
27. user@domain1.com@domain
2.com@domain3.com
A message with this recipient
address would be routed first
to the mail server for
domain3.com, then to the mail
server for domain2.com, then
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
28. finally to the mail server for
domain1.com where it would
be delivered to the local user
Due to anti-relaying
restrictions now in place on
Internet-accessible mail
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
29. servers, this is generally no
longer possible
new anti-spam feature
"Challenge/Response
System", sends a link, or a
word-verification page
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
30. Domain Names
The Domain Name System,
(DNS):Core feature
Distributed database that
handles the mapping between
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
31. host names and numerical
Internet addresses.
An automated phone book
Reverse mapping: query for a
name for 202.164.53.112
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
32. Punycode-based IDNA
system, approved by ICANN
(Internet Corporation for
Assigned Names and
Numbers: 1998) and adopted
by some registries
Flavors of DNS software:
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
33. •BIND (Berkeley Internet
Name Domain)
•DJBDNS (Dan J Bernstein's
DNS implementation)
•MaraDNS
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
34. •NSD (Name Server
Daemon)
•PowerDNS
13 "root servers"
WHOIS database: for most
TLDs a basic WHOIS is held
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
35. by ICANN, detailed WHOIS
maintained by the domain
registry
Modern OSs and network
applications contain resolver
for interrogating DNS
services.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
41. Usenet
Usenet is a "network" of
newsgroup servers (often run
by ISPs) working together.
Once connected to Usenet
one can find everything. One
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
42. bad thing about Usenet is that
it is often used to distribute
illegal digital (warez) content
like mp3, cracked software, or
cracked video games. In most
cases Usenet is the first step
in the life of warez.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
43. Unfortunately this has caused
many newsgroup servers to
block access to known warez
newsgroups.
Usenet providers normally
charge money for access but
many ISPs have newsgroup
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
44. servers running that their
customers can access for
free. So if you would like to
check out Usenet first call
your ISP and find out if they
have a newsgroup server
running
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
45. History Of
Usenet
1979 software to post
announcements Duke
st
University; Steve Bellovin: 1
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
46. UNIX-based “news” software
for the system “netnews”
Usenet is bulletin board
software where users with the
correct software can read and
post messages. URL’s that
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
47. begin with news refer to
Usenet groups.
The NNTP or Network News
Transport Protocol is the
transportation system that
sends out the Usenet
messages.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
49. Technology Of
IRC
is a real-time text-based multi-
user communication protocol
specification and
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
50. implementation, which relays
messages between users on
the network (1988). Official
specification (1993) "RFC
1459: Internet Relay Chat
Protocol"
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
51. A client logged into one
network can communicate
only with other clients on the
same network, not with clients
on other networks. Each
network is composed of one
or more IRC servers. An IRC
client is a program that
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
52. connects to a given IRC
server in order to have the
server relay communications
to and from other clients on
the same network but not
necessarily the same server
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
53. Messages on IRC are sent as
blocks. That is, other IRC
clients will not see one typing
and editing as one does so.
One creates a message block
and transmits that block all at
once, which is received by the
server and based on the
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
54. addressing, delivers it to the
appropriate client or relays it
to other servers so that it may
be delivered or relayed again
Once connected to a server,
addressing of other clients is
achieved through IRC
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
55. nicknames. A nickname is
simply a unique string of
ASCII characters identifying a
particular client. Although
implementations vary,
restrictions on nicknames
usually dictate that they be
composed only of characters
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
56. a-z, A-Z, 0-9, underscore, and
dash.
IRC channels: Any
communication sent to that
channel is then seen by the
client.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
57. IRC is not P2P protocol, but
does have some extensions
(DCC: Direct Client Connect
and CTCP: Client To Client
Protocol) that support text and
file transmission directly from
client to client without any
relay at all.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
58. Using Internet Relay Chat
To use Internet Relay Chat,
you need to do the following:
•Choose and install an IRC
client.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
59. •Find the channel discussing
the topic of your interest
•Find the server at which the
channel is located. You can
be directed to both the
server and the channel by
the website of a project
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
60. •Connect to the server using
the client, using a nickname
of your choice
•Connect to the channel
By default, the conversations
using IRC are public
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
61. To have a private
conversation with a user in
the channel, type "/query
nickname"
For private chat, join an non-
existent channel, and then
allow joining only by invitation
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
62. IRC clients
ChatZilla: An add-in for
Firefox.
IRSSI: Has a text-only user
interface.
MIRC: Good for beginners.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
63. XChat Windows
Pidgin, Miranda, Trillian:
multi-protocol clients
Opera: A web browser with
integrated IRC client
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
64. Protocols
Specification of a set of rules
for a particular type of
communication
Different protocols often
describe different aspects of a
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
65. single communication; taken
together, these form a
protocol stack. The terms
"protocol" and "protocol stack"
also refer to the software that
implements a protocol.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
66. Most recent protocols are
assigned by the IETF for
Internet communications, and
the IEEE, or the ISO
organisations for other types.
The ITU-T handles
telecommunications protocols
and formats.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
67. Index page for network
protocols and protocol layers,
categorised by the nearest
matching layers of the OSI
seven layer model
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
68. Common
Internet
Protocols
Include TCP/IP(Transmission
Control Protocol/Internet
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
69. Protocol), UDP/IP (User
Datagram Protocol/Internet
Protocol), HTTP(HyperText
Transfer Protocol) and
FTP(File Transfer Protocol).
TCP/IP is a stream protocol.
This means that a connection
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
70. is negotiated between a client
and a server. Any data
transmitted between these
two endpoints is guaranteed
to arrive, thus it is a so-called
lossless protocol. Since the
TCP protocol can only
connect two endpoints, it is
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
71. also called a peer-to-peer
protocol.
HTTP is the protocol used to
transmit all data present on
the World Wide Web. This
includes text, multimedia and
graphics.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
72. HTTP is the protocol used to
transmit HTML, the language
that makes all the fancy
decorations in browser. It
works upon TCP/IP.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
73. Routing
A route is the path that data
takes when travelling through
a network from one host to
another. Routing is the
process by which the path, or
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
74. some subset of it, is
determined. One of the
characteristic features of the
Internet, as compared to other
network architectures, is that
each node that receives a
packet will typically determine
for itself what the next step in
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
75. the path should be. IP routing
decisions are generally made
based on the destination of
network traffic. When an IP
packet is sent from a node on
the network, it will consult its
routing table to determine the
next hop device that the traffic
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
76. should be sent to, in order for
it to reach its final destination.
When node receives a packet
on interface eth0 which has a
destination of 216.239.59.114,
it will consult the table and
see that it should send it
through the default interface,
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
77. the host x.y.z, which is on
interface ppp0. The routing
table is constructed from a
combination of statically
defined routes and those
learned from dynamic routing
protocols. Statically defined
routes may be declared at
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
78. system boot time, or via a
command line interface. They
will generally include the
following parameters:
•Destination - this may be
either a single host, or a
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
79. network (in that case N/W
mask is also required)
•Gateway - the device to
which traffic with the defined
destination should be sent
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
80. Static routes may also include
the following parameters:
•Interface - the interface
through which the traffic to a
destination must be sent.
(Most OSs can determine
this automatically)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
81. •Metric - the number of
'hops' away that the
gateway is from this host.
For a gateway that resides
on a directly connected
network, the metric is '1'
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
82. The default route is a special
case of a statically defined
route. It is the route of last
resort. All traffic that does not
match another destination in
the routing table is forwarded
to the default gateway.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
83. Dynamic routing protocols
allow network attached
devices to learn about the
structure of the network
dynamically from peer
devices. This reduces the
administrative effort required
to implement and change
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
84. routing throughout a network.
Some examples of dynamic
routing protocols are:
•RIP (Routing Information
Protocol)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
85. •OSPF (Open Shortest Path
First)
•ISIS (Intermediate system
to intermediate system)
•BGP (Border Gateway
Protocol)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
86. •IGRP (Interior Gateway
Routing Protocol)
ISIS and OSPF are link-state
protocols, meaning each node
is part of the same zone, will
know the state of all the link in
the mesh. Due to the
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
87. exponential number of link in
a mesh, these protocols are
used for small mesh such as
an ISP national backbone.
RIP is usually used to easily
announce customer's routes
in a backbone.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
88. BGP is used as an external
routing protocol to exchange
routes with other entities. ISP
use BGP extensively to trade
their routes. It can also be
used to carry customers
routes across a network, in a
MPLS backbone for example.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
89. Web Hosting
When someone sets up a
server and hooks it up to the
Internet, the files on the
server become accessible
over the Internet. Web
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
90. Hosting is your personal
space on that server. Web
hosting is your own storage
on the Internet.
If you upload HTML files,
you'll have a website. If you
upload .ZIP files, you'll have a
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
91. download area. It's up to you
what you do with it, but Web
hosting is online storage.
Most companies own their
own servers these days, but
some still pay for web hosting.
Let's say Harbhajan decides
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
92. he wants to sell his paintings
online. He purchases web
hosting, and sets up a
website.
Ajay, on the other hand, wants
to set up a forum system. he
purchases web hosting and
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
93. installs the forums. If you
know how, you can make an
entire website, or put any files
you want, online, via your web
hosting.
In addition, over the last few
years hundreds of "web site
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
94. software" have been written
that, when installed onto your
hosting account, give you an
immediate web site.
When looking for a web site
software, it's important to
consider the software license.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
95. If you stick with FOSS when
selecting your web site
software, you will have the
advantage of new software
releases that are made
available free of charge.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
96. The Web
The World Wide Web (the
"Web" or "WWW" for short) is
a hypertext system that
operates over the Internet.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
97. S/W program: web browser
Information: documents or
web pages
The first web browser named
Mosaic was developed in the
early 1990s.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
99. URLs, HTTP,
HTML
Uniform Resource Locator
(URL):
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
100. Specifies how each page of
information is given a unique
"address" at which it can be
found
Hyper Text Transfer Protocol
(HTTP): Specifies how the
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
101. browser and server send the
information to each other
Hyper Text Markup Language
(HTML) is a method of
encoding the information so it
can be displayed on a variety
of devices.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
102. World Wide Web Consortium:
Develops and maintains these
standards and others that
enable computers on the Web
to effectively store and
communicate all kinds of
information.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
103. Beyond Text
Viola (1992) added the ability
to display graphics as well.
Mosaic for X (1993) sparked a
tremendous rise in the
popularity of the Web
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
104. Additional features such as
dynamic content, music and
animation can be found in
modern browsers
Issue: the web as seen by
Netscape is not at all the
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
105. same as the web seen by
Internet Explorer.
Real-time web-based services
such as webcasts, web radio
and live web cams.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
106. Java & Javascript
Sun Microsystems' Java:
Enabled web servers to
embed applets; faster and
richer user interaction
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
108. Hyper-text promote non-
hierarchical and non-linear
way of expression and
thinking. It does not have a
linear order from the
beginning to the end.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
109. History Of The
Web
The Web grew out of a project
at CERN (1989): Make it
easier to share research
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
110. papers among colleagues.
Enquire Within Upon
Everything:
Berners-Lee released files
describing his idea for the
"World Wide Web" onto the
Internet on August 6, 1991
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
111. HTML
Static pages; Dynamic,
interactive
As a markup language: it
provide a set of general rules
that suggest how content
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
112. should look when rendered. A
markup language doesn't
dictate the methods used to
display the content, nor does
it have fore knowledge of the
target context, so this control
is imprecise.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
113. Early tools: primitive
Publishing HTML-formatted
documents on the Internet via
the World Wide Web
HTML is a subset of the
Standard Generalised Markup
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
114. Language (SGML), which is
an Int. Std. (ISO 8879)
published in 1986 as a format
for structuring and marking up
documents. An important
addition to HTML was the
inclusion of support for
hypertext (linked information).
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
115. Embedded
Technologies
Stand-alone programs and
plugins that extend the normal
functionality of a web page.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
116. Java, Shockwave Flash,
audio and video players are
all examples of embedded
technologies that can assist
creating a web site
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
117. Proxy Servers
Provide a cache of items
available on other servers
(slower, expensive,
unavailable from the local
network)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
119. Search Engine
Computer software: search
data in the form of text or a
˙
database for specified
information.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
120. Search engines normally
consist of spiders (bots) which
roam the web searching for
links and keywords.
They send collected data
back to the indexing software
which categorises and adds
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
121. the links to databases with
their related keywords. Before
1993 the term search engine
never existed.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
122. Web
Advertising
Static images, animated GIFs,
and Flash Animation
Banners, Pop-up, intro pages
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
123. A banner can be an image,
animated gif, flash video or
plain text
A Pop-up causes a new
browser window to open and
displays a webpage that can
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
124. contain text, images and
flash.
Intro Pages to websites
usually have a flash or gif
animation to introduce a
company, their services or
Products.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
125. Ad servers: Central ad server.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
126. Remote Access
Allows you to access one
computer from another.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
127. Telnet
A protocol designed to
remotely access computers in
a client-server fashion.
SSH (Secured SHell)
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
128. Uses
SSH is actually so much more
than just a way to access a
remote shell securely.
Scp: copy files between
machines; allows recursive
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
129. copies; copy a file from a
remote host to a remote host.
scp: user@host.com:~/files/ .
Encrypt the transport of any
data from one machine to
another.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
130. Port forwarding: . This allows
you 'redirect' communication
to and from a local application
through SSH to another host.
So, with SSH you can secure
otherwise insecure
communications over an
encrypted 'tunnel'.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
131. Using SSH
The secure shell client is
conveniently called ssh.
ssh user@host
Using SFTP
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
132. SFTP merely works like FTP,
sftp user@host
Using SCP
scp FILE_PATH
user@host:REMOTE_PATH
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
133. Copy from a remote host
scp user@host:rPath l_Path
scp -r user@host:dirName
destination_dir
SSH as a Proxy
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
134. If you can make an SSH
connection, you can (most
likely) use that connection as
a SOCKS proxy, without any
extra setup on the remote
computer. Traffic is tunneled
securely through the SSH
connection. If you are on an
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
135. unsecured wireless
connection, you can use this
to effectively secure all your
traffic from snooping. You can
also use this to bypass IP
restrictions, because you will
appear to be connecting from
the remote computer.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
136. VNC
Virtual Network Computing
(VNC) is a remote desktop
protocol to remote control
another computer. VNC is
used to transport the desktop
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
137. environment of a graphical
user interface from one
computer to a viewer
application on another
computer on the network.
There are clients and servers
for all most all GUI OSs. The
VNC protocol allows for
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
138. complete platform
independence. A VNC viewer
on any operating system can
connect to a VNC server on
any other operating system. It
is also possible for multiple
clients to connect to a VNC
server at the same time.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
139. Popular uses of the
technology include remote
tech support, and accessing
your files on your work PC
while at home or even on the
road.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
140. There is even a Java viewer
for VNC, so you can connect
to a VNC server from your
web browser without installing
any software.
The original VNC code is
open source, as are many of
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
141. the flavours of VNC available
today.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
142. How It Works
VNC is actually two parts, a
client and a server. A server is
the machine that is sharing its
screen, and the client, or
viewer is the program that is
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
143. doing the watching and
interacting with the server.
VNC is actually a very simple
protocol and is based on
graphic primitive, "Put a
rectangle of pixel data at a
given x,y position". What this
means is VNC takes small
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
144. rectangles of the screen
(actually the framebuffer) and
transports them from the
server to the client. This in its
simplest form would cause
lots of bandwidth to be used,
and hence various methods
have been invented to make
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
145. this process go faster. There
are now many different
'encodings' or methods to
determine the most efficient
way to transfer these
rectangles. The VNC protocol
allows the client and server to
negotiate which encoding it
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
146. will use. The simplest and
lowest common denominator
is the raw encoding method
where the pixel data is sent in
left-to-right scanline order,
and after initial setup, then
only transfers the rectangles
that have changed.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
147. Web 2.0
Describes the changing
trends in the use of World
Wide Web technology and
web design that aim to
enhance creativity,
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
149. communities and hosted
services, such as social-
networking sites, video
sharing sites, wikis, and
blogs.
O'Reilly Media Web 2.0
conference in 2004. Although
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
150. the term suggests a new
version of the World Wide
Web, it does not refer to an
update to any technical
specifications, but rather to
changes in the ways software
developers and end-users
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
151. utilise the Web. According to
Tim O'Reilly:
Web 2.0 is the business
revolution in the computer
industry caused by the
move to the Internet as a
platform, and an attempt to
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
152. understand the rules for
success on that new platform.
Tim Berners-Lee, inventor of
the World Wide Web, has
questioned whether one can
use the term in any
meaningful way, since many
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
153. of the technological
components of Web 2.0 have
existed since the early days of
the Web.
Uses of Web as a platform.
Don't fight the Internet,
encompasses the essence of
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
154. Web 2.0 — building
applications and services
around the unique features of
the Internet, as opposed to
expecting the Internet to suit
as a platform (effectively
"fighting the Internet").
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
155. Web had become a platform,
with software above the level
of a single device, leveraging
the power of "The Long Tail,"
and with data as a driving
force. An architecture of
participation where users can
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
157. Characteristics
Web 2.0 websites allow users
to do more than just retrieve
information. They can build on
the interactive facilities of
"Web 1.0" to provide "Network
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
158. as platform" computing,
allowing users to run
software-applications entirely
through a browser. Users can
own the data on a Web 2.0
site and exercise control over
that data These sites may
have an "Architecture of
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
159. participation" that encourages
users to add value to the
application as they use it.
Web 2.0 sites often feature a
rich, user friendly interface
based on Ajax, OpenLaszlo,
Flex or similar rich media.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
160. Technology
Overview
server software, content-
syndication, messaging-
protocols, standards-oriented
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
161. browsers with plugins and
extensions, and various client
applications.
Web 2.0 websites typically
include some of the following
features/techniques. (acronym
SLATES):
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
162. •Search: keyword search
•Links: guides to important
pieces of information. The
best pages are the most
frequently linked.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
163. •Authoring: In wikis, the
content is iterative in the
sense that the people undo
and redo each other's work.
In blogs, content is
cumulative in that posts and
comments of individuals are
accumulated over time.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
164. •Tags: categorisation of
content
•Extensions: automation of
some of the work and
pattern matching by using
algorithms e.g. amazon.com
recommendations.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
165. •Signals: the use of RSS
technology to notify users
with any changes
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
167. Web 2.0 initiatives have been
employed in public diplomacy
for the Israeli government.
The country is believed to be
the first to have its own official
blog, MySpace page,
YouTube channel, Facebook
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
168. page and a political blog. The
Israeli Ministry of Foreign
Affairs started the country's
video blog as well as its
political blog. The Foreign
Ministry also held a
microblogging press
conference via Twitter about
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
169. its war with Hamas, with
Consul David Saranga
answering live questions from
a worldwide public in common
text-messaging abbreviations.
The questions and answers
were later posted on
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
171. Web-based
Applications
And Desktops
Ajax has prompted the
development of websites that
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
172. mimic desktop applications,
such as word processing, the
spreadsheet, and slide-show
presentation. WYSIWYG wiki
sites replicate many features
of PC authoring applications.
Still other sites perform
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
173. collaboration and project
management functions.
mimic the user experience of
desktop application able to
run within any modern
browser.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
174. XML And RSS
Protocols which permit
syndication include RSS
(Really Simple Syndication —
also known as "web
syndication"), RDF (as in RSS
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
175. 1.1), and Atom, all of them
XML-based formats.
Observers have started to
refer to these technologies as
"Web feed" as the usability of
Web 2.0 evolves and the
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
176. more user-friendly Feeds icon
supplants the RSS icon.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
177. Web APIs
Machine-based interaction,
uses two main approaches to
Web APIs, which allow web-
based access to data and
functions:
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
178. REST and SOAP.
•REST (Representational
State Transfer) Web APIs
use HTTP alone to interact,
with XML (eXtensible
Markup Language) or JSON
payloads;
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
179. •SOAP involves POSTing
more elaborate XML
messages and requests to a
server that may contain
quite complex, but pre-
defined, instructions for the
server to follow.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
180. Often servers use proprietary
APIs, but standard APIs (for
example, for posting to a blog
or notifying a blog update)
have also come into wide use.
Most communications through
APIs involve XML or JSON
payloads.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
181. The argument exists that
"Web 2.0" does not represent
a new version of the
World Wide Web at all, but
merely continues to use so-
called "Web 1.0"
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
182. technologies and concepts.
Techniques such as AJAX do
not replace underlying
protocols like HTTP, but add
an additional layer of
abstraction on top of them.
Many of the ideas of Web 2.0
had already been featured in
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
183. implementations on
networked systems well
before the term "Web 2.0"
emerged. Amazon.com, for
instance, has allowed users to
write reviews and consumer
guides since its launch in
1995, in a form of self-
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com
184. publishing. Amazon also
opened its API to outside
developers in 2002.
NITTTR:Chd STC: Internet: Feb 2, 2009 hs.raiandrai.com