SlideShare a Scribd company logo
INTERNET
The Internet A network of computer networks To view the internet or allow user to communicate through it, one must have the necessaryTCP/IPand a web browser.
TCP TCP (Transmission Control Protocol)    provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
TCP/IP TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. TCP provides a point-to-point channel for applications that require reliable communications. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Telnet are all examples of applications that require a reliable communication channel.
TCP TCP is optimized for accurate delivery rather than timely delivery, and therefore, TCP sometimes incurs relatively long delays (in the order of seconds) while waiting for out-of-order messages or retransmissions of lost messages.
TCP TCP is a reliable stream delivery service that guarantees delivery of a data stream sent from one host to another without duplication or losing data
TCP Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP) which provides a datagram service that emphasizes reduced latency over reliability. Example: Internet Radio Stream, Podcast, Youtube video streaming, CtC
IP The Internet Protocol (IP) is Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. deliver datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.
TCP/IP (summary) TCP consists of a set of rules: for the protocol, that are used with the Internet Protocol, and for the IP, to send data "in a form of message units" between computers over the Internet. At the same time that IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data transmission, called segments, that a message is divided into for efficient routing through the network.
TCP provides a communication service at an intermediate level between an application program and the Internet Protocol. That is, when an application program desires to send a large chunk of data across the Internet using IP, instead of breaking the data into IP-sized pieces and issuing a series of IP requests, the software can issue a single request to TCP and let TCP handle the IP details. IP works by exchanging pieces of information called packets. A packet is a sequence of octets and consists of a header followed by a body. The header describes the packet's destination and, optionally, the routers to use for forwarding until it arrives at its destination. The body contains the data IP is transmitting. Due to network congestion, traffic load balancing, or other unpredictable network behavior, IP packets can be lost, duplicated, or delivered out of order. TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program. Thus, TCP abstracts the application's communication from the underlying networking details.
OSI (Open System Interconnection) Model The most popular packet-based structure of layers, or protocol stack It defines 7 layers.  The user interface (Application Layer) is the top layer, since users work directly with applications.  As you work your way down toward the lower layers, the protocols become more detailed toward the nuts and bolts of the operation.  They define the details of actually preparing and moving data.
OSI (Open System Interconnection) Model
OSI (Open System Interconnection) Model (Vertical/Horizontal Communication)
(Encapsulation/Decapsulation)
ENCAPSULATION/DECAPSULATION Moving from the top, down - messages get larger and larger ! !   A message is passed down, and the lower layer adds a header to it.  This is called encapsulation, because it is like placing an object into a capsule.  The header is sometimes called a wrapper.  Each successive lower layer encapsulates what it receives from the layer above it. 
ENCAPSULATION/DECAPSULATION Moving from the bottom, up - messages get smaller and smaller ! !  A message is first stripped of it's header, and then the inner contents (the "data" portion) is passed up.  This is "decapsulation" but no one uses that term.  Each successive upper layer receives the data message from the layer below, and then strips off it's own header and passes the data up.
The 7 layers Although there are seven layers in the OSI model, they can be grouped into three areas: High-level Protocols (layers 5, 6 and 7  -  Session, Presentation, and Application) - how the data is presented, displayed, and summarized for the user  -  and in the reverse direction, how the user prepared data is assembled into meaningful data structures (high-level protocols).  
The 7 layers Medium-level Protocols (Layers 3 and 4 - Network and Transport) - how the data is assembled into packets and frames and how error checking and flow control is implemented - and in the reverse direction, how the received packets and frames are assembled into structures such as files and databases (medium-level protocols)
The 7 layers Low-level Protocols (Layers 1 and 2 - Physical and DataLink) - how the data is converted into electrical pulses of one's and zero's (bits) and sent across cables or the physical medium, and in the reverse direction, how the electrical pulses are taken off the cable and converted to ones and zero's.  
DATA TERMINOLOGY Messages and Packets - catch-all terms used to describe any unit of data being passed between layers
DATA TERMINOLOGY Data - Layer 5, 6, and 7 - not sure why they did not differentiate between these type of data units and call them each by a different name  .  .  .  but a good guess is that since data units at these layers are rarely discussed, apparently it was OK to called them all by the same name - simply "Data"
DATA TERMINOLOGY Segment - Layer 4: data units at layer 4 of the OSI model - TCP (Transmission Control Protocol)
DATA TERMINOLOGY Packet - Layer 3: This term is considered by many to most correctly refer to a message sent by protocols operating at the network layer of the OSI Reference Model. So, you will commonly see people refer to “IP packets”.
DATA TERMINOLOGY Datagram - Layer 3: This term is basically synonymous with “packet” and is also used to refer to network layer technologies. It is also often used to refer to a message that is sent at a higher level of the OSI Reference Model (more often than “packet” is).
DATA TERMINOLOGY Frame - Layer 2: most commonly used to refer to Ethernet, Token Ring, or Frame Relay units of data.  A frame gets its name from the fact that it is created by taking higher-level packets or datagrams and “framing” them with additional header information needed at the lower level. Cell - Layer 2: most commonly used to refer to 53-byte units of data.  A cell is a unit of data that is fixed in size.
DATA TERMINOLOGY Frame - Layer 1: refers to T-Carrier Layer 1 units of data (193-bit frames) BITS – Layer 1; AKA “one’s and zero’s”
TCP/IP MODEL
Data Encapsulation in TCP/IP
Data Encapsulation in TCP/IP
Data Encapsulation in TCP/IP
Data Change Names?
Data Change Names?
BITS and BYTES A byte is composed of combinations of 8 bits. Example: 00000001 = 1 00000011= 2 00000101=3 ………… = 256 (maximum) bits combination Note: 255 is just 1 byte.
BITS and BYTES The recent IP address version 4 or IPv4 is using 32 bits addressing like this: 192.2.34.155 255.255.255.255 (maximum)
Domain Name Server An open source software that converts IP address in number form into labels (letters). Example :  your IP address is 192.1.0.222 is equivalent to www. Dipolog.com/
Uniform Resource Locator (URL) Identifies the web address of a document in the internet. An example is HTTP://WWW.INTERNET.COM/list/students.html www.pinoybsn.blogspot.com/crazyme/games.html
TCP/IP Model
TCP/IP
DAWN of the NET CLIP 1 CLIP 2 CLIP 3
WIRELESS NETWORK Wireless network refer to any type of computer network that is not connected by cables of any kind.
WIRELESS NETWORK Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves.  This implementation takes place at the physical level, (layer), of the network structure.
TYPES Wireless WAN Wireless PAN Wireless LAN Wireless MAN
WI-FI is 802.11 Wi-Fi: "Wi-Fi" is a term used to describe 802.11 WLANs, although it is technically a declared standard of interoperability between 802.11 devices.
WiMax is 802.16 is a series of Wireless Broadband standards authored by the IEEE. “WiMax” - Worldwide Interoperability for Microwave Access IEEE (Institute of Electrical and Electronic Engineers)
Wireless Broadband (802.16) broadband means "having instantaneous bandwidths greater than 1 MHz and supporting data rates greater than about 1.5 Mbit/s.“ Wireless Broadband networks feature speeds roughly equivalent to wired broadband networks, such as that of DSL or a cable modem.
Wireless Broadband Wireless Broadband networks can also be Symmetrical, meaning bandwidth traveling in both directions (download/upload), which is most commonly associated with 'Fixed Wireless' networks.
House with a wireless broadband
Mobile wireless broadband allow a more mobile version of this broadband access. Consumers can purchase a PC card, laptop card, or USB equipment to connect their PC or laptop to the Internet via cell phone towers. stable in almost any area that could also receive a strong cell phone connection. These connections can cost more for portable convenience as well as having speed limitations in all but urban environments.

More Related Content

What's hot

Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
chandrakant Mallick
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
Mannu Khani
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
Iap final
Iap finalIap final
Iap final
GLIM Digital
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
AAKASH S
 
Protocols
ProtocolsProtocols
Protocols
priya_trehan
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
Tapan Khilar
 
Osi model
Osi modelOsi model
Osi model
GLIM Digital
 
Network protocol
Network protocolNetwork protocol
Network protocol
PriyangaRajaram
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Protocol
ProtocolProtocol
Protocol
Shi Na
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
Raghu nath
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
farhan516
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
Transweb Global Inc
 
OSI Layering
OSI Layering OSI Layering
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
Muhammad Nadeem Rana
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
Mukesh Chinta
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
Mannu Khani
 

What's hot (20)

Osi model
Osi modelOsi model
Osi model
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Iap final
Iap finalIap final
Iap final
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Protocols
ProtocolsProtocols
Protocols
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Osi model
Osi modelOsi model
Osi model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Protocol
ProtocolProtocol
Protocol
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 

Viewers also liked

Internet 1 vs internet 2
Internet 1 vs internet 2Internet 1 vs internet 2
Internet 1 vs internet 2
YESENIA BAENA SANCHEZ
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]
jsoni2
 
Introduce to internet1
Introduce to internet1 Introduce to internet1
Introduce to internet1
Hardini_HD
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
BAS ADITYA SRINIVAS
 
Internet1
Internet1Internet1
Internet1
sp2zabki
 
Internet
InternetInternet
Internet
sp2zabki
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
Sai Sreeram
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
Judy O'Connell
 

Viewers also liked (8)

Internet 1 vs internet 2
Internet 1 vs internet 2Internet 1 vs internet 2
Internet 1 vs internet 2
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]
 
Introduce to internet1
Introduce to internet1 Introduce to internet1
Introduce to internet1
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Internet1
Internet1Internet1
Internet1
 
Internet
InternetInternet
Internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 

Similar to Internet1

Networking-basics
Networking-basicsNetworking-basics
Networking-basics
Raj Alam
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016e
uncleRhyme
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
isma ishak
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
Arti Parab Academics
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
Jacqueline Thomas
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
Bayarmaa GBayarmaa
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
gadisaAdamu
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
Assignment3
Assignment3Assignment3
Assignment3
MahfujurRahman63
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Mukesh Gautam
 
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
Dulal Miah
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
shucaybcabdi
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
Nitesh Singh
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
manish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
Ravi Jiyani
 

Similar to Internet1 (20)

Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016e
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Assignment3
Assignment3Assignment3
Assignment3
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 

More from Joseph Lagod

Pointers for semi
Pointers for semiPointers for semi
Pointers for semi
Joseph Lagod
 
Data processing
Data processingData processing
Data processing
Joseph Lagod
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
Joseph Lagod
 
Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2
Joseph Lagod
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworks
Joseph Lagod
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
Joseph Lagod
 

More from Joseph Lagod (6)

Pointers for semi
Pointers for semiPointers for semi
Pointers for semi
 
Data processing
Data processingData processing
Data processing
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
 
Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworks
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Internet1

  • 2. The Internet A network of computer networks To view the internet or allow user to communicate through it, one must have the necessaryTCP/IPand a web browser.
  • 3. TCP TCP (Transmission Control Protocol) provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
  • 4. TCP/IP TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. TCP provides a point-to-point channel for applications that require reliable communications. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Telnet are all examples of applications that require a reliable communication channel.
  • 5. TCP TCP is optimized for accurate delivery rather than timely delivery, and therefore, TCP sometimes incurs relatively long delays (in the order of seconds) while waiting for out-of-order messages or retransmissions of lost messages.
  • 6. TCP TCP is a reliable stream delivery service that guarantees delivery of a data stream sent from one host to another without duplication or losing data
  • 7. TCP Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP) which provides a datagram service that emphasizes reduced latency over reliability. Example: Internet Radio Stream, Podcast, Youtube video streaming, CtC
  • 8. IP The Internet Protocol (IP) is Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. deliver datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.
  • 9. TCP/IP (summary) TCP consists of a set of rules: for the protocol, that are used with the Internet Protocol, and for the IP, to send data "in a form of message units" between computers over the Internet. At the same time that IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data transmission, called segments, that a message is divided into for efficient routing through the network.
  • 10. TCP provides a communication service at an intermediate level between an application program and the Internet Protocol. That is, when an application program desires to send a large chunk of data across the Internet using IP, instead of breaking the data into IP-sized pieces and issuing a series of IP requests, the software can issue a single request to TCP and let TCP handle the IP details. IP works by exchanging pieces of information called packets. A packet is a sequence of octets and consists of a header followed by a body. The header describes the packet's destination and, optionally, the routers to use for forwarding until it arrives at its destination. The body contains the data IP is transmitting. Due to network congestion, traffic load balancing, or other unpredictable network behavior, IP packets can be lost, duplicated, or delivered out of order. TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program. Thus, TCP abstracts the application's communication from the underlying networking details.
  • 11. OSI (Open System Interconnection) Model The most popular packet-based structure of layers, or protocol stack It defines 7 layers.  The user interface (Application Layer) is the top layer, since users work directly with applications.  As you work your way down toward the lower layers, the protocols become more detailed toward the nuts and bolts of the operation.  They define the details of actually preparing and moving data.
  • 12. OSI (Open System Interconnection) Model
  • 13. OSI (Open System Interconnection) Model (Vertical/Horizontal Communication)
  • 15. ENCAPSULATION/DECAPSULATION Moving from the top, down - messages get larger and larger ! !   A message is passed down, and the lower layer adds a header to it.  This is called encapsulation, because it is like placing an object into a capsule.  The header is sometimes called a wrapper.  Each successive lower layer encapsulates what it receives from the layer above it. 
  • 16. ENCAPSULATION/DECAPSULATION Moving from the bottom, up - messages get smaller and smaller ! !  A message is first stripped of it's header, and then the inner contents (the "data" portion) is passed up.  This is "decapsulation" but no one uses that term.  Each successive upper layer receives the data message from the layer below, and then strips off it's own header and passes the data up.
  • 17. The 7 layers Although there are seven layers in the OSI model, they can be grouped into three areas: High-level Protocols (layers 5, 6 and 7  -  Session, Presentation, and Application) - how the data is presented, displayed, and summarized for the user  -  and in the reverse direction, how the user prepared data is assembled into meaningful data structures (high-level protocols).  
  • 18. The 7 layers Medium-level Protocols (Layers 3 and 4 - Network and Transport) - how the data is assembled into packets and frames and how error checking and flow control is implemented - and in the reverse direction, how the received packets and frames are assembled into structures such as files and databases (medium-level protocols)
  • 19. The 7 layers Low-level Protocols (Layers 1 and 2 - Physical and DataLink) - how the data is converted into electrical pulses of one's and zero's (bits) and sent across cables or the physical medium, and in the reverse direction, how the electrical pulses are taken off the cable and converted to ones and zero's.  
  • 20. DATA TERMINOLOGY Messages and Packets - catch-all terms used to describe any unit of data being passed between layers
  • 21. DATA TERMINOLOGY Data - Layer 5, 6, and 7 - not sure why they did not differentiate between these type of data units and call them each by a different name  .  .  .  but a good guess is that since data units at these layers are rarely discussed, apparently it was OK to called them all by the same name - simply "Data"
  • 22. DATA TERMINOLOGY Segment - Layer 4: data units at layer 4 of the OSI model - TCP (Transmission Control Protocol)
  • 23. DATA TERMINOLOGY Packet - Layer 3: This term is considered by many to most correctly refer to a message sent by protocols operating at the network layer of the OSI Reference Model. So, you will commonly see people refer to “IP packets”.
  • 24. DATA TERMINOLOGY Datagram - Layer 3: This term is basically synonymous with “packet” and is also used to refer to network layer technologies. It is also often used to refer to a message that is sent at a higher level of the OSI Reference Model (more often than “packet” is).
  • 25. DATA TERMINOLOGY Frame - Layer 2: most commonly used to refer to Ethernet, Token Ring, or Frame Relay units of data.  A frame gets its name from the fact that it is created by taking higher-level packets or datagrams and “framing” them with additional header information needed at the lower level. Cell - Layer 2: most commonly used to refer to 53-byte units of data.  A cell is a unit of data that is fixed in size.
  • 26. DATA TERMINOLOGY Frame - Layer 1: refers to T-Carrier Layer 1 units of data (193-bit frames) BITS – Layer 1; AKA “one’s and zero’s”
  • 33. BITS and BYTES A byte is composed of combinations of 8 bits. Example: 00000001 = 1 00000011= 2 00000101=3 ………… = 256 (maximum) bits combination Note: 255 is just 1 byte.
  • 34. BITS and BYTES The recent IP address version 4 or IPv4 is using 32 bits addressing like this: 192.2.34.155 255.255.255.255 (maximum)
  • 35. Domain Name Server An open source software that converts IP address in number form into labels (letters). Example : your IP address is 192.1.0.222 is equivalent to www. Dipolog.com/
  • 36. Uniform Resource Locator (URL) Identifies the web address of a document in the internet. An example is HTTP://WWW.INTERNET.COM/list/students.html www.pinoybsn.blogspot.com/crazyme/games.html
  • 39. DAWN of the NET CLIP 1 CLIP 2 CLIP 3
  • 40. WIRELESS NETWORK Wireless network refer to any type of computer network that is not connected by cables of any kind.
  • 41. WIRELESS NETWORK Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level, (layer), of the network structure.
  • 42. TYPES Wireless WAN Wireless PAN Wireless LAN Wireless MAN
  • 43. WI-FI is 802.11 Wi-Fi: "Wi-Fi" is a term used to describe 802.11 WLANs, although it is technically a declared standard of interoperability between 802.11 devices.
  • 44. WiMax is 802.16 is a series of Wireless Broadband standards authored by the IEEE. “WiMax” - Worldwide Interoperability for Microwave Access IEEE (Institute of Electrical and Electronic Engineers)
  • 45. Wireless Broadband (802.16) broadband means "having instantaneous bandwidths greater than 1 MHz and supporting data rates greater than about 1.5 Mbit/s.“ Wireless Broadband networks feature speeds roughly equivalent to wired broadband networks, such as that of DSL or a cable modem.
  • 46. Wireless Broadband Wireless Broadband networks can also be Symmetrical, meaning bandwidth traveling in both directions (download/upload), which is most commonly associated with 'Fixed Wireless' networks.
  • 47. House with a wireless broadband
  • 48. Mobile wireless broadband allow a more mobile version of this broadband access. Consumers can purchase a PC card, laptop card, or USB equipment to connect their PC or laptop to the Internet via cell phone towers. stable in almost any area that could also receive a strong cell phone connection. These connections can cost more for portable convenience as well as having speed limitations in all but urban environments.
  • 49. Other forms of Internet Services Integrated Services Digital Network (ISDN) is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.