The document provides an overview of the history and evolution of the Internet. It discusses how ARPANET was developed in the 1960s and expanded in the 1970s and 1980s. Important protocols like TCP/IP, FTP, and telnet were introduced during this period. In the 1980s, NSFNET connected universities and research networks, expanding access. The World Wide Web was created in the early 1990s, making the Internet more graphical and user-friendly. By the mid-1990s, commercial use of the Internet began to take off. The document concludes by stating that the next lecture will cover popular Internet services.
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
This series in about the Entrepreneurial and E-Commerce opportunities and how to harness the power of Information Technology to improve or revolutionize business.
This session discusses about:
the evolution of internet, key technology concepts of the internet, packet switching, TCP/IP, IP address, domain names and urls.
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
This series in about the Entrepreneurial and E-Commerce opportunities and how to harness the power of Information Technology to improve or revolutionize business.
This session discusses about:
the evolution of internet, key technology concepts of the internet, packet switching, TCP/IP, IP address, domain names and urls.
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Computer Networking-The past, present and future.pptxChideraAnichebe
A slide on the past, present and future of Computer Networking presented during the IEEE Tech Brush-Up event at the FUTO Student Branch on January, 2022
DCS and Scada Presentation on Topic of the Network Protocol.
This Presentation will save ur Lots of Time and Effort if you are Lucky One to Have this as ur ALA Topic.. Kudos Guys
This presentation clearly explains how the network evolved till now.
this will be helpful to explore the internet world. How do we connect over the internet?
what's the beginning of the network.
More about OSI Models, TCP models protocols, and frame relay concepts.
if you have any queries/suggestions please visit: https://sabarish.techcodes.in/
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Computer Networking-The past, present and future.pptxChideraAnichebe
A slide on the past, present and future of Computer Networking presented during the IEEE Tech Brush-Up event at the FUTO Student Branch on January, 2022
DCS and Scada Presentation on Topic of the Network Protocol.
This Presentation will save ur Lots of Time and Effort if you are Lucky One to Have this as ur ALA Topic.. Kudos Guys
This presentation clearly explains how the network evolved till now.
this will be helpful to explore the internet world. How do we connect over the internet?
what's the beginning of the network.
More about OSI Models, TCP models protocols, and frame relay concepts.
if you have any queries/suggestions please visit: https://sabarish.techcodes.in/
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
2. 2
During the Last Lecture
(Computer Networks)
• We looked at the role of networks in
computing
• We looked at several different types of
networks
• We familiarized ourselves with networking
topologies and protocols
4. 4
Types of Computer Networks
according to the network access policy
• Private
• Public
5. 5
Types of Computer Networks
according to the distance between nodes
• LAN: Local Area Network
• WAN: Wide Area Network
6. 6
Network Topologies
• The pattern in which computers are connected
to form a network
• Popular patterns:
– Point-to-point
– Star
– Bus
– Ring
• Networks are also formed by combining 2 or
more of these 4 basic patterns
7. 7
Networking Protocols
• Networks use protocols, or rules, to exchange
information through shared channels
• These protocols prevent collisions of data
caused by simultaneous transmission between
two or more computers
• Several protocols are available for various
types of networks. Here we discuss two that
are popular for LANs: Ethernet; Token Ring
9. 9
Wireless (Radio) LANs Are Becoming Popular
Key benefits:
– Set-up time
– Set-up cost
– Maintenance cost
– Cost Key challenges:
– Security & privacy
– Quality of service
– Cost
10. 10
Today’s Goal:
Introduction to the Internet
• To become able to appreciate the role of the
Internet in today’s computing
• To become familiar with the history and
evolution of the Internet
14. 14
After the accident, Mr. Peters …
filled out a form, giving info about:
– Himself
– The circumstances of the accident
– Estimated repair expenses
& then …
26. 26
Answer: Everybody Wins!
• Tom Peters
• ACME Insurance
• Bhola eServices
Better margins due to
50% saving on claim
processing costs
27. 27
Answer: Everybody Wins!
• Tom Peters
• ACME Insurance
• Bhola eServices Internal rate of
return (IRR) of
60-80%
28. 28
The Key Point …
Bhola eServices (Pvt) Ltd is …
… supplying a service
… using local, attractively-priced workers
… to a remote, overseas client
… over the Internet
… & making good money in the process!
31. 31
What Else?
• Enables users located at far-way locations to
easily share information with others located all
over the world
• Enables users to easily and inexpensively
communicate with others located all over the
world
• Enables the users to operate and run programs
on computers located all over the world
32. 32
The Internet is unlike
any previous human
invention. It is a
world-wide resource,
accessible to all of
the humankind.
34. 34
1.2M Internet users in Pakistan in 5/2000
(1% of population)
In early 2002,
54% of Australian population
51% of Singaporean population
39% of Japanese population
3% of Chinese population
35. 35
Key Characteristics (1)
Geographic Distribution
Global - reaches around the world
Robust Architecture
Adapts to damage and error
Speed
Data can travels at near ‘c’ on copper,
fiber, airwaves
36. 36
Key Characteristics (2)
Universal Access
Same functionality to everyone
Growth Rate
The fastest growing technology ever
Freedom of Speech
Promotes freedom of speech
The Digital Advantage
Is digital: can correct errors
38. 38
Internet: Network of Networks
• A large number of networks,
interconnected physically
• Capable of communicating and sharing
data with each other
• From the user’s point view, Internet – a
collection of interconnected networks –
looks like a single, unified network
42. 42
TCP/IP (1)
Transmission Control Protocol/Internet Protocol
• Networking protocol used by all computers and
networks on the Internet
• Originally developed by the US DoD for Unix,
but now available for most other OSes
43. 43
TCP/IP (2)
Transmission Control Protocol/Internet Protocol
• TCP breaks down the message to be sent over
the Internet into packets
• IP routes these packets through the Internet to
get them to their destination
• When the packets reach the destination
computer, TCP reassembles them into the
original message
44. 44
Tools & Services Available on the Internet
• Electronic mail (POP, IMAP, SMTP)
• Instant messaging (ICQ, MSN)
• Remote login (telnet)
• File transfer (ftp)
• Network news (nntp)
• WWW (http)
46. 46
1960's
1969 - DoD-ARPA creates an experimental
network – ARPANET – as a test-bed for
emerging networking technologies
ARPANET originally connected 4 universities &
enabled scientists to share info & resources
across long distances
ARPANET continued to expand throughout the
70's and 80's
47. 47
1970's
Networking tools developed in the 70's include:
1972 - The National Center for
Supercomputing Apps. (NCSA) develops the
telnet application for remote login, making it
easier to connect to a remote computer
1973 - FTP (File Transfer Protocol) is
introduced, standardizing the transfer of files
between networked computers
48. 48
1980's
1983 - The TCP/IP protocols becomes the only
set of protocols used on the ARPANET
This sets a standard for all networks, and
generates the use of the term Internet as the
net of nets
ARPANET splits into two nets to keep military
& non-military network sites separate:
ARPANET and MILNET
49. 49
1980's
In 1982 and 1983, the first desktop computers
begin to appear
Many are equipped with an OS called Berkeley
Unix, which includes networking SW, allowing
easy connection to the Internet using telnet
The PC revolution continues through the 80’s,
making access to computer resources & net-
worked info increasingly available to public
50. 50
1980's
1985-86: NSF connects the US’s six
supercomputing centers together, calling it the
the NSFNET, or NSFNET backbone
To expand access to the Internet, NSF
developed regional nets, which were then
connected to the NSFNET backbone
Plus, NSF supported institutions (universities,
etc.) in their efforts to connect to the regional
nets
51. 51
1980's
1987 - NSF awards a grant to Merit Network,
Inc. to operate & manage future development
of the NSFNET
Merit collaborates with IBM & MCI on R&D for
fast networking technologies
1989 - The backbone network is upgraded to
T1, making it able to transmit data at speeds of
1.5 Mb/s (approx. 60 pages of text/second)
52. 52
1990's
1990 - The ARPANET is dissolved
1991 - Gopher is developed at the U of MN
It provides a hierarchical, menu-based method
for providing & locating info on the Internet
1993 - CERN releases WWW, developed by
Tim Berners-Lee
It uses HTTP and hypertext, revolutionizing the
way info is presented & accessed on Internet
53. 53
1990's
1993 - The NSFNET is upgraded to T3 (45
Mb/s or about 1800 pages/s)
1993-1994 - Web browsers Mosaic & Netscape
Navigator are introduced
Their GUI makes WWW & Internet more
appealing to the general public
1995 - NSFNET is replaced by a new
architecture, called vBNS which utilizes
regional networks and Network Access Points
56. 56
Today’s Goal:
Introduction to the Internet
• We looked at the role Internet plays in today’s
computing
• We reviewed some of the history and
evolution of the Internet
57. 57
Next Lecture:
Internet Services
We will try to familiarize ourselves with with
some of the Internet services:
– http (surfing, shopping, searching)
– eMail
– ftp
– News groups, message boards, forums
– Instant messaging
– Multimedia delivery