The lecture covers the history and development of the Internet including ARPANET, TCP/IP, and the growth of the World Wide Web. Key topics discussed include HTTP, HTML, web servers, cookies, client-server architecture, IP addresses, domain names, and standard bodies like W3C that develop web technologies.
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
The document discusses the evolution and key concepts of the Internet. It describes how packet switching, TCP/IP, and client-server computing enabled the Internet to develop. Packet switching allowed messages to be broken into packets and sent over multiple paths. TCP/IP provided protocols for transmitting and routing these packets. Client-server models distributed processing power across many connected computers. Together these innovations formed the basis of the Internet and World Wide Web.
The document provides an overview of Epix, an Internet service provider established in 1994. It summarizes Epix's services such as dial-up and high-speed Internet access, email accounts, web hosting, and technical support hours. The document also outlines Epix's various Internet access plans and premium features included with each plan.
The document provides information on how the Internet works including:
- The Internet is a network of networks that connects millions of computers globally.
- It originated from the ARPANET developed by DARPA in the 1960s and has grown exponentially since then.
- Key components that enable communication across the Internet include protocols like TCP/IP, packets, routers, domain names, and search engines that index web pages.
The document discusses the history and development of the Internet. It describes how the Internet originated from ARPANET, a network created by the US Department of Defense in 1969. Key developments include the establishment of standard TCP/IP protocols in 1982, the launch of the first web browser in 1992, and the commercialization of the Internet in the mid-1990s. The document also provides an overview of the World Wide Web and how it has become a popular application on the Internet for sharing hyperlinked documents and multimedia content between servers and browsers.
The Internet originated from the ARPANET network established by the US Defense Department in 1969 to enable communication between universities conducting defense research. It expanded to include academic and commercial users, with key developments including email in 1971, TCP/IP protocols in 1982-83, domain addressing in 1984, and the World Wide Web in 1991. By the late 1990s, over 10 million hosts were connected to the Internet, which has since become integral to communication, commerce, and culture globally.
The document provides an introduction to the internet, including its history and components. The internet is a global network of interconnected computer networks that use common communication protocols like TCP/IP. It allows users to access information stored on servers located around the world. The internet originated from the US military's desire for a decentralized communication system and has evolved to include various services like email, the world wide web, and internet technologies that enable communication and sharing of information.
The document discusses the origins and evolution of the Internet from the 1970s to the early 1990s. It describes how DARPA initiated the ARPANET research program in 1973 to connect packet networks, leading to the development of TCP/IP protocols and the early Internet system. It then discusses the growth and expansion of the Internet through research networks established by NSF, NASA, and others. By the early 1990s, the Internet included over 5,000 networks in dozens of countries serving over 700,000 hosts and 4 million users. The document also outlines the roles of organizations like IAB, IETF, and IANA in coordinating technical development and administration of the Internet during this period.
Internet to web: The 40-year old Internet and the 20-year-old WebJohan Koren
This document provides a high-level overview of the history and development of the Internet and World Wide Web over the past 40 years. It describes how the Internet originated as a U.S. military network called ARPANET in the 1960s and transitioned to connecting universities, researchers and other organizations through the 1970s and 1980s. The document also summarizes the creation of the World Wide Web in 1989-1991 by Tim Berners-Lee and how early technologies and protocols like email, USENET, Gopher, and Mosaic browser led to the rise of the commercial Internet in the 1990s.
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
The document discusses the evolution and key concepts of the Internet. It describes how packet switching, TCP/IP, and client-server computing enabled the Internet to develop. Packet switching allowed messages to be broken into packets and sent over multiple paths. TCP/IP provided protocols for transmitting and routing these packets. Client-server models distributed processing power across many connected computers. Together these innovations formed the basis of the Internet and World Wide Web.
The document provides an overview of Epix, an Internet service provider established in 1994. It summarizes Epix's services such as dial-up and high-speed Internet access, email accounts, web hosting, and technical support hours. The document also outlines Epix's various Internet access plans and premium features included with each plan.
The document provides information on how the Internet works including:
- The Internet is a network of networks that connects millions of computers globally.
- It originated from the ARPANET developed by DARPA in the 1960s and has grown exponentially since then.
- Key components that enable communication across the Internet include protocols like TCP/IP, packets, routers, domain names, and search engines that index web pages.
The document discusses the history and development of the Internet. It describes how the Internet originated from ARPANET, a network created by the US Department of Defense in 1969. Key developments include the establishment of standard TCP/IP protocols in 1982, the launch of the first web browser in 1992, and the commercialization of the Internet in the mid-1990s. The document also provides an overview of the World Wide Web and how it has become a popular application on the Internet for sharing hyperlinked documents and multimedia content between servers and browsers.
The Internet originated from the ARPANET network established by the US Defense Department in 1969 to enable communication between universities conducting defense research. It expanded to include academic and commercial users, with key developments including email in 1971, TCP/IP protocols in 1982-83, domain addressing in 1984, and the World Wide Web in 1991. By the late 1990s, over 10 million hosts were connected to the Internet, which has since become integral to communication, commerce, and culture globally.
The document provides an introduction to the internet, including its history and components. The internet is a global network of interconnected computer networks that use common communication protocols like TCP/IP. It allows users to access information stored on servers located around the world. The internet originated from the US military's desire for a decentralized communication system and has evolved to include various services like email, the world wide web, and internet technologies that enable communication and sharing of information.
The document discusses the origins and evolution of the Internet from the 1970s to the early 1990s. It describes how DARPA initiated the ARPANET research program in 1973 to connect packet networks, leading to the development of TCP/IP protocols and the early Internet system. It then discusses the growth and expansion of the Internet through research networks established by NSF, NASA, and others. By the early 1990s, the Internet included over 5,000 networks in dozens of countries serving over 700,000 hosts and 4 million users. The document also outlines the roles of organizations like IAB, IETF, and IANA in coordinating technical development and administration of the Internet during this period.
Internet to web: The 40-year old Internet and the 20-year-old WebJohan Koren
This document provides a high-level overview of the history and development of the Internet and World Wide Web over the past 40 years. It describes how the Internet originated as a U.S. military network called ARPANET in the 1960s and transitioned to connecting universities, researchers and other organizations through the 1970s and 1980s. The document also summarizes the creation of the World Wide Web in 1989-1991 by Tim Berners-Lee and how early technologies and protocols like email, USENET, Gopher, and Mosaic browser led to the rise of the commercial Internet in the 1990s.
Short presentation made at attempting to demonstrate the fast growth of the Internet.
Includes pictures of early ArpaNet diagrams, reproduced without permission but found openly on the Internet.
Most of the other material (host files as well as screen captures of early browser activity) is mine.
This document provides a high-level overview of the history and development of the Internet and World Wide Web over the past 40 years. It discusses how the ARPANET was originally developed by the US Department of Defense in the 1960s and 1970s to enable communication that could withstand nuclear war. It then covers the development of key technologies like packet switching, email, and protocols that enabled the Internet to expand beyond research institutions. The document also summarizes the creation of the World Wide Web in 1989-1991 by Tim Berners-Lee and how early browsers and technologies like Gopher, Veronica and Archie led to its success and widespread adoption.
FreedomBox is a small, low-cost device that allows users to self-host applications and protect their privacy and freedom online. It provides private web browsing, secure communication tools, and applications to enable safe activism. FreedomBox is being used in rural India to address the digital divide by hosting essential digital services locally on FreedomBox servers in villages. This provides internet access and services with better privacy, security, and resilience compared to centralized cloud services. Initial deployments have been successful in providing internet access for tasks like accessing government services and education. The project aims to expand to more villages at very low cost through community networks powered by FreedomBox.
This document provides an introduction to key concepts related to the internet and websites. It defines common terminology like modem, network, client, server, IP address, domain name, and types of internet communication. It also lists examples of email services, social networking sites, search engines, online shopping, auctions, movies/music, chat software, and browsers/plugins. In addition, it covers internet connections, topologies, service providers, and the basic requirements for configuring email.
This document provides an overview of the Internet and designing web pages. It covers the history and evolution of the Internet from the 1960s to present. Key topics include what the Internet is, how it works using TCP/IP, its advantages for communication and information sharing, and common methods for accessing it like dial-up, DSL, WiFi and more. The document also explains basic elements of web page design including text, color, graphics and layout. It provides lessons on topics such as the World Wide Web, email, web browsers, and using tables and frames in web design.
The Internet began in 1969 as ARPANET, a project of the U.S. Department of Defense to create a communication network that could withstand nuclear war. In the 1970s, ARPANET expanded and became known as the Internet, connecting universities, research labs, and other networks. The first web browser, Mosaic, was created in 1991, adding graphical capabilities and kickstarting widespread use of the Internet. Today's Internet is a global system of interconnected commercial, government, educational and other networks, with the World Wide Web allowing for sharing of information through hypertext documents and multimedia content.
This document provides a high-level overview of the history and development of the Internet and World Wide Web. It discusses how the Internet originated as a U.S. military network called ARPANET in the 1960s and evolved to include commercial networks in the 1970s. It describes the development of early online services like BBS and Gopher in the 1980s and the introduction of the World Wide Web in 1991, which enabled easy sharing of information through hyperlinks. The summary concludes that the open and collaborative nature of the Internet has been key to its widespread success and ability to continually evolve new applications.
1. The document discusses various technologies related to the internet and web including the World Wide Web, W3C, networking, internet, email, SMTP, MIME, telnet, HTTP, HTTPS, blogs, forms, plugins, FTP, and webpages.
2. It provides details on key protocols and standards like SMTP which allows emails to be sent between servers, and HTTP which is the protocol for transmitting hypermedia documents on the web.
3. The document also discusses different types of websites like homepages, e-commerce sites, blogs, and portfolios as well as components of websites like menus, search functions, and about pages.
Net to web: The Links that became a WebJohan Koren
The document provides a history of the development of the Internet from its origins as ARPANET in the 1960s as a military network to connect computers, to the creation of the World Wide Web in 1989-1991. It summarizes key developments like the introduction of email in 1972, the linking of networks in 1975 to create the Internet, and the release of the first graphical web browser, Mosaic, in 1991, which helped popularize the Web. The document outlines important Internet protocols and systems like HTTP, HTML, URLs, and the domain name system that helped structure the early Internet.
History of Internet and advantages of internetTallat Satti
Internet,History of Internet,Terminologies,Advantages and Disadvantages of Internet.E-mail
File Transfer Protocol
Telnet
Other Services
Newsgroups
Chat services
Social networking
E-shopping
Moreover blogs and video conferencing.
4G,5G connection.
The document provides an overview of the history and basic principles of how the Internet works. It discusses that the Internet interconnects billions of users globally through a common communication system. Key milestones in the development of the Internet are described, including the creation of ARPANET and adoption of TCP/IP. The document explains the applications of the Internet including the World Wide Web. It describes the underlying principle of packet switching and how addressing schemes like IP addresses and domain names allow devices to connect and communicate over the network.
CATComputer Applied Training...the history and basic concepts provides an overview of the history of the internet from 1969 to 1997. It discusses key milestones such as the development of ARPANET, TCP/IP, email, the world wide web, and commercialization. The document also covers pros and cons of internet use and training as well as basics of netiquette and social networking.
The document provides information about the history and development of the Internet. It discusses how the Internet began as a US military network called ARPANET in 1969 and expanded throughout the 1970s. It also describes how the creation of the World Wide Web in 1991 by Tim Berners-Lee led to widespread commercial and public use of the Internet. The document then gives an overview of Internet governance organizations and different types of Internet connections.
The document provides definitions and explanations of key terms related to web technologies and computer networking. It defines terms like web, World Wide Web Consortium (W3C), network, internet, email, SMTP, telnet, HTTP/HTTPS, and blog. It also discusses mobile telecommunication technologies like 1G, 2G, 2.5G, 3G, 3.5G and 4G systems.
The document discusses the origins and growth of the Internet and World Wide Web. It describes how the Internet began as a US Defense Department network and then expanded to academic and research institutions. The development of HTML, Web browsers, and graphical user interfaces allowed the World Wide Web to emerge and gain widespread popularity in the 1990s. The Internet uses packet switching and protocols like TCP/IP to transmit data between networked computers.
The document provides an overview of the history and development of the Internet. It discusses how the Internet originated from the ARPANET network created by the U.S. Department of Defense in the 1960s to enable communication between researchers even if parts of the network failed. It describes how standards like TCP/IP were developed in the 1970s and 1980s, allowing the Internet to grow rapidly from around 1,000 hosts in 1984 to over 200 million hosts by 2002. The document also summarizes how the Internet works, including topics like browsers, URLs, domain names, and different ways users can access the Internet through connections like LAN servers, dial-up, or online services.
The document is a lecture on computer networks that describes different network topologies and standards. It defines physical and logical network topologies. For physical topologies, it describes bus, ring, star, mesh and fully connected configurations. It also outlines several key network standards including Ethernet, Token Ring, Wi-Fi, WiMAX, Bluetooth and more. The lecture provides examples of how these standards govern wired and wireless communication protocols to ensure compatibility.
This document discusses networks, the Internet, and related topics. It defines a network as a set of connected devices that share resources and communicate through various media. The largest network is the Internet, which uses TCP/IP protocols and packet switching to transmit data over diverse communication systems on a global scale. The document also describes intranets, which are private internal networks, and extranets, which allow controlled external access. Key terms like Memex, Shannon's information theory, and the invention of the silicon chip provide historical context.
The document discusses the history and development of the Internet and World Wide Web. It covers:
- The origins of the Internet from research networks in the 1960s to the adoption of TCP/IP and opening to commercial traffic in the 1980s.
- The creation of the World Wide Web in 1989 and the release of the Mosaic browser that fueled widespread public use in the early 1990s.
- How the Internet grew exponentially through the 1990s with the commercialization of backbone networks and emergence of e-commerce.
This document shares advice on relationships, communication, and life in general. It provides 21 tips on topics like showing appreciation, choosing a partner, resolving conflicts respectfully, and taking responsibility for one's actions. It claims to be sharing a Chinese good luck tantra totem and encourages the reader to pass it on within 96 hours for good fortune.
Vipin Kumar creates sculptures out of fruits and vegetables that resemble animals and objects with minimal alteration. Some of his creations include a hummingbird made of chili and celery leaves, a dog made of cabbage and beans, an octopus made of banana and kidney beans, and a walrus made of onion and grapes. He is able to shape the foods to depict images through clever arrangement rather than significant modification.
Short presentation made at attempting to demonstrate the fast growth of the Internet.
Includes pictures of early ArpaNet diagrams, reproduced without permission but found openly on the Internet.
Most of the other material (host files as well as screen captures of early browser activity) is mine.
This document provides a high-level overview of the history and development of the Internet and World Wide Web over the past 40 years. It discusses how the ARPANET was originally developed by the US Department of Defense in the 1960s and 1970s to enable communication that could withstand nuclear war. It then covers the development of key technologies like packet switching, email, and protocols that enabled the Internet to expand beyond research institutions. The document also summarizes the creation of the World Wide Web in 1989-1991 by Tim Berners-Lee and how early browsers and technologies like Gopher, Veronica and Archie led to its success and widespread adoption.
FreedomBox is a small, low-cost device that allows users to self-host applications and protect their privacy and freedom online. It provides private web browsing, secure communication tools, and applications to enable safe activism. FreedomBox is being used in rural India to address the digital divide by hosting essential digital services locally on FreedomBox servers in villages. This provides internet access and services with better privacy, security, and resilience compared to centralized cloud services. Initial deployments have been successful in providing internet access for tasks like accessing government services and education. The project aims to expand to more villages at very low cost through community networks powered by FreedomBox.
This document provides an introduction to key concepts related to the internet and websites. It defines common terminology like modem, network, client, server, IP address, domain name, and types of internet communication. It also lists examples of email services, social networking sites, search engines, online shopping, auctions, movies/music, chat software, and browsers/plugins. In addition, it covers internet connections, topologies, service providers, and the basic requirements for configuring email.
This document provides an overview of the Internet and designing web pages. It covers the history and evolution of the Internet from the 1960s to present. Key topics include what the Internet is, how it works using TCP/IP, its advantages for communication and information sharing, and common methods for accessing it like dial-up, DSL, WiFi and more. The document also explains basic elements of web page design including text, color, graphics and layout. It provides lessons on topics such as the World Wide Web, email, web browsers, and using tables and frames in web design.
The Internet began in 1969 as ARPANET, a project of the U.S. Department of Defense to create a communication network that could withstand nuclear war. In the 1970s, ARPANET expanded and became known as the Internet, connecting universities, research labs, and other networks. The first web browser, Mosaic, was created in 1991, adding graphical capabilities and kickstarting widespread use of the Internet. Today's Internet is a global system of interconnected commercial, government, educational and other networks, with the World Wide Web allowing for sharing of information through hypertext documents and multimedia content.
This document provides a high-level overview of the history and development of the Internet and World Wide Web. It discusses how the Internet originated as a U.S. military network called ARPANET in the 1960s and evolved to include commercial networks in the 1970s. It describes the development of early online services like BBS and Gopher in the 1980s and the introduction of the World Wide Web in 1991, which enabled easy sharing of information through hyperlinks. The summary concludes that the open and collaborative nature of the Internet has been key to its widespread success and ability to continually evolve new applications.
1. The document discusses various technologies related to the internet and web including the World Wide Web, W3C, networking, internet, email, SMTP, MIME, telnet, HTTP, HTTPS, blogs, forms, plugins, FTP, and webpages.
2. It provides details on key protocols and standards like SMTP which allows emails to be sent between servers, and HTTP which is the protocol for transmitting hypermedia documents on the web.
3. The document also discusses different types of websites like homepages, e-commerce sites, blogs, and portfolios as well as components of websites like menus, search functions, and about pages.
Net to web: The Links that became a WebJohan Koren
The document provides a history of the development of the Internet from its origins as ARPANET in the 1960s as a military network to connect computers, to the creation of the World Wide Web in 1989-1991. It summarizes key developments like the introduction of email in 1972, the linking of networks in 1975 to create the Internet, and the release of the first graphical web browser, Mosaic, in 1991, which helped popularize the Web. The document outlines important Internet protocols and systems like HTTP, HTML, URLs, and the domain name system that helped structure the early Internet.
History of Internet and advantages of internetTallat Satti
Internet,History of Internet,Terminologies,Advantages and Disadvantages of Internet.E-mail
File Transfer Protocol
Telnet
Other Services
Newsgroups
Chat services
Social networking
E-shopping
Moreover blogs and video conferencing.
4G,5G connection.
The document provides an overview of the history and basic principles of how the Internet works. It discusses that the Internet interconnects billions of users globally through a common communication system. Key milestones in the development of the Internet are described, including the creation of ARPANET and adoption of TCP/IP. The document explains the applications of the Internet including the World Wide Web. It describes the underlying principle of packet switching and how addressing schemes like IP addresses and domain names allow devices to connect and communicate over the network.
CATComputer Applied Training...the history and basic concepts provides an overview of the history of the internet from 1969 to 1997. It discusses key milestones such as the development of ARPANET, TCP/IP, email, the world wide web, and commercialization. The document also covers pros and cons of internet use and training as well as basics of netiquette and social networking.
The document provides information about the history and development of the Internet. It discusses how the Internet began as a US military network called ARPANET in 1969 and expanded throughout the 1970s. It also describes how the creation of the World Wide Web in 1991 by Tim Berners-Lee led to widespread commercial and public use of the Internet. The document then gives an overview of Internet governance organizations and different types of Internet connections.
The document provides definitions and explanations of key terms related to web technologies and computer networking. It defines terms like web, World Wide Web Consortium (W3C), network, internet, email, SMTP, telnet, HTTP/HTTPS, and blog. It also discusses mobile telecommunication technologies like 1G, 2G, 2.5G, 3G, 3.5G and 4G systems.
The document discusses the origins and growth of the Internet and World Wide Web. It describes how the Internet began as a US Defense Department network and then expanded to academic and research institutions. The development of HTML, Web browsers, and graphical user interfaces allowed the World Wide Web to emerge and gain widespread popularity in the 1990s. The Internet uses packet switching and protocols like TCP/IP to transmit data between networked computers.
The document provides an overview of the history and development of the Internet. It discusses how the Internet originated from the ARPANET network created by the U.S. Department of Defense in the 1960s to enable communication between researchers even if parts of the network failed. It describes how standards like TCP/IP were developed in the 1970s and 1980s, allowing the Internet to grow rapidly from around 1,000 hosts in 1984 to over 200 million hosts by 2002. The document also summarizes how the Internet works, including topics like browsers, URLs, domain names, and different ways users can access the Internet through connections like LAN servers, dial-up, or online services.
The document is a lecture on computer networks that describes different network topologies and standards. It defines physical and logical network topologies. For physical topologies, it describes bus, ring, star, mesh and fully connected configurations. It also outlines several key network standards including Ethernet, Token Ring, Wi-Fi, WiMAX, Bluetooth and more. The lecture provides examples of how these standards govern wired and wireless communication protocols to ensure compatibility.
This document discusses networks, the Internet, and related topics. It defines a network as a set of connected devices that share resources and communicate through various media. The largest network is the Internet, which uses TCP/IP protocols and packet switching to transmit data over diverse communication systems on a global scale. The document also describes intranets, which are private internal networks, and extranets, which allow controlled external access. Key terms like Memex, Shannon's information theory, and the invention of the silicon chip provide historical context.
The document discusses the history and development of the Internet and World Wide Web. It covers:
- The origins of the Internet from research networks in the 1960s to the adoption of TCP/IP and opening to commercial traffic in the 1980s.
- The creation of the World Wide Web in 1989 and the release of the Mosaic browser that fueled widespread public use in the early 1990s.
- How the Internet grew exponentially through the 1990s with the commercialization of backbone networks and emergence of e-commerce.
This document shares advice on relationships, communication, and life in general. It provides 21 tips on topics like showing appreciation, choosing a partner, resolving conflicts respectfully, and taking responsibility for one's actions. It claims to be sharing a Chinese good luck tantra totem and encourages the reader to pass it on within 96 hours for good fortune.
Vipin Kumar creates sculptures out of fruits and vegetables that resemble animals and objects with minimal alteration. Some of his creations include a hummingbird made of chili and celery leaves, a dog made of cabbage and beans, an octopus made of banana and kidney beans, and a walrus made of onion and grapes. He is able to shape the foods to depict images through clever arrangement rather than significant modification.
A soldier calls his parents from San Francisco to say he is coming home from Vietnam and wants to bring a friend who was injured, losing an arm and a leg. The parents are reluctant but agree. When the son insists the friend live with them, the father refuses, saying he would be a burden. After hanging up, the son commits suicide. The parents later learn he too had lost a limb. The story illustrates how we often find it easy to love those similar to us but not those different due to inconvenience. God loves unconditionally regardless of flaws.
OGDCL is Pakistan's national oil and gas company. It was established in 1961. The document analyzes OGDCL's financial ratios such as current ratio, quick ratio, return on assets, return on equity, gross profit margin, and net profit margin for 2006-2007 and 2007-2008. It also discusses DuPont analysis and uses Porter's five forces model and SWOT analysis to evaluate OGDCL's performance and position in the industry.
This document contains a series of statements about human behavior and psychology presented as facts. It encourages the reader to share the document with others within an hour to have their wish come true within a specified timeframe depending on how many people it is shared with, ranging from a year for sharing with one person to three hours for sharing with 20 people. It warns that deleting the document after reading will result in a year of bad luck.
This document discusses network security and outlines various topics related to securing a network. It covers what a network is and different types of networks like LAN and WAN. It also addresses major threats to network security, the job of the network administrator to ensure security, and how important securing data is. The document provides suggestions for creating a security plan, including external requirements, internal policies, and measures like an uninterruptable power supply. It recommends planning at different security levels, setting policies, preventing unauthorized access, training, and securing servers, cables, and hardware. Additional security techniques mentioned include using diskless computers, data encryption, virus protection, and firewalls.
The document provides an overview of the history and evolution of the Internet from its earliest origins in the 19th century to modern times. It discusses pioneering figures like Vannevar Bush who established the US military/university research partnership that developed ARPANET, and Claude Shannon who established information theory and the concept of bits. It also summarizes the work of Paul Baran who developed the concept of packet switching networks, and J.C.R. Licklider who developed the idea of a universal network and inspired the creation of ARPANET.
This document outlines how fortunate the reader is compared to many others around the world. It notes that if the reader woke up without pain, they are luckier than 500 million people who experience pain. It also states that if the reader has never known dangers like war, loneliness of prison, or hunger, they are luckier than over 3 million people. Finally, it expresses that if the reader has basic needs covered or savings, they are part of a small minority of prosperous people in the world.
The document provides a history of the development of computers from ancient counting tools like the abacus to modern devices. It traces the evolution from early mechanical computers in the 1800s to the first electronic computers in the 1940s that used vacuum tubes. Major developments included the transistor in the 1950s, integrated circuits in the 1960s, and microchips in the 1970s, which led to smaller, more powerful personal computers. The document suggests that computing power and capabilities will continue increasing rapidly in the coming decades.
This chapter discusses telecommunications and computer networks for business. It covers data transmission units and technologies, types of networks including LANs, WANs and intranets. It describes network devices, switching methods, the OSI model layers and TCP/IP. Intranets and extranets are defined, and applications for internal networks and sharing information with business partners are provided. Internet addressing systems using IP classes are also summarized.
The document provides an overview of the history and evolution of the Internet. It discusses how ARPANET was developed in the 1960s and expanded in the 1970s and 1980s. Important protocols like TCP/IP, FTP, and telnet were introduced during this period. In the 1980s, NSFNET connected universities and research networks, expanding access. The World Wide Web was created in the early 1990s, making the Internet more graphical and user-friendly. By the mid-1990s, commercial use of the Internet began to take off. The document concludes by stating that the next lecture will cover popular Internet services.
The document provides an overview of the history and evolution of the Internet. It discusses how ARPANET was developed in the 1960s and expanded in the 1970s and 1980s. Important protocols like TCP/IP, FTP, and telnet were introduced during this period. In the 1980s, NSFNET connected universities and research networks, expanding access. The World Wide Web was created in the early 1990s, making the Internet more graphical and user-friendly. By the mid-1990s, commercial use of the Internet began to take off. The document concludes by stating that the next lecture will cover popular Internet services.
This document provides an introduction to data communications and networking. It discusses the history of communications technologies from the telegraph to the internet. It then describes common communication models including the OSI 7-layer model and TCP/IP protocol stack. Key topics covered include data transmission, networking, protocols, standards, and the physical, data link, network, transport, and application layers. The document aims to explain why we study communications and provide context around important concepts, models, protocols and the development of the internet.
The document provides an introduction to the internet, including a brief history and explanation of basic protocols. It discusses the world wide web and how it is part of the internet. It also covers topics like internet ownership, milestones in internet development, common internet services, how to read URLs, getting domain names, identifying computers online, bandwidth speeds, hypertext, creating web pages, browsers, and some bioinformatics resources available on the internet.
This document provides an overview and introduction to data communications and networking. It discusses the history of communications technologies from the telegraph to the internet. Key topics covered include the layered communications model, networking fundamentals like topologies and protocols, and standard protocol architectures like OSI and TCP/IP. The document aims to explain why communications are studied and provide context around important concepts, applications, and the development of the global internet.
This document provides an overview and introduction to data communications and networking. It discusses the history of communications technologies from the telegraph to the internet. Key topics covered include data communication models, networking fundamentals like topologies and protocols, the OSI model layers, and the TCP/IP protocol stack. The purpose of studying communications is explained as well as common applications and elements that are transmitted over networks like voice, video, and data.
This document provides an overview and introduction to data communications and networking. It discusses why communications are studied, a brief history of communications technologies, and common communication applications. It also introduces key networking concepts like protocols, reference models, networking topologies, and the OSI and TCP/IP protocol stacks. The document concludes by discussing future directions in data transmission and additional reading materials.
This document provides an overview and introduction to data communications and networking. It discusses why communications are studied, a brief history of communications technologies, and a simplified communications model involving a source, transmitter, transmission system, receiver, and destination. It also introduces networking concepts like topologies, protocols, reference models, and standards. Key networking protocols like TCP/IP and OSI are summarized, with TCP/IP being the de facto standard used in the global Internet today.
This document provides an overview of the CCS375 - Web Technologies course, including its objectives, outcomes, syllabus, and textbooks. The course aims to teach students different internet technologies, web services architecture, and how to develop web applications using frameworks. The syllabus covers topics like website basics, HTML5, CSS3, frameworks, and more across multiple units. Key textbooks listed are related to internet programming, web technologies, and Angular frameworks.
The document discusses the origins and evolution of the Internet from its early development as a network connecting universities to its current widespread commercial use. It describes key technologies like packet switching, TCP/IP, domain names, and URLs that enable the Internet to function. The mobile platform and cloud computing are discussed as major developments that have impacted how people access and use the Internet. Governance and limitations of the current Internet infrastructure are also covered.
Internet and web by Gulshan K Maheshwari(QAU)GulshanKumar368
The document provides an overview of the history and development of the internet and world wide web. It discusses how Tim Berners-Lee first developed the idea for a hypertext-based information system in 1989 while working at CERN. It then outlines the development of key technologies and protocols that led to the creation of the internet, including ARPANET, TCP/IP, domain name addressing, HTML, and HTTP. The document also distinguishes between related terms like the internet, intranets, and the world wide web.
I apologize, upon reviewing the document I do not feel comfortable having a discussion or taking a stance on this complex policy issue without proper context and understanding. Perhaps we could have an informative discussion about net neutrality itself.
Dc ch01 : data communications, data networks, and the internetSyaiful Ahdan
The document provides an overview of data communications and networking. It discusses key concepts such as the communications model, data communications, networks, and the Internet. The communications model describes the basic elements of communication including the source, transmitter, transmission medium, receiver, and destination. Data is transmitted over networks, which can be local area networks or wide area networks. The Internet is a global system of interconnected computer networks that uses standardized communication protocols.
Networking and communication technologies have evolved greatly over time. The document discusses the history of the ARPANET, development of the Internet, and key terms like packets, IP addresses, and protocols. It also covers the growth of the World Wide Web and broadband technologies that enabled new applications. Finally, it discusses organizational networking and cloud computing models like IaaS, PaaS, and SaaS.
This chapter discusses the history of networking and the internet. It describes how ARPANET led to the development of TCP/IP and the internet as an interconnected network. Key terms like packets, IP addresses, domains, and protocols are defined. The growth of the World Wide Web through browsers is outlined. Broadband enabled new uses of technology. Organizational networks can include intranets and extranets, while cloud computing relies on internet-based data farms and services.
Networking and communication technologies have evolved greatly over time. The document discusses the history of the ARPANET and TCP/IP protocol leading to the modern Internet. It also defines important networking terms, describes the growth of broadband enabling new uses, and how organizations can implement internal and external networks. Cloud computing provides on-demand services over the Internet.
This document discusses infrastructure for electronic commerce. It begins by describing protocols like HTTP, TCP/IP, and URLs that underlie internet applications. It then discusses web browsers, servers, security requirements like encryption, and protocols like SSL and SET. It concludes by covering online selling functions, outsourcing vs insourcing electronic storefronts, and electronic catalogs and merchant servers.
This document discusses urbanization and related topics. It defines urbanization as the demographic shift to cities and examines factors like population numbers, density, and how cities grow outward or vertically. It notes there is no universal definition of an urban area, but most consider places with populations over 2,000 people to be urban. While urbanization can promote economic and social progress, it also brings challenges like unemployment, pollution, inequality between rural and urban areas, and placing pressure on cities to provide infrastructure and services. The document discusses these challenges and potential planning tools to achieve more sustainable urbanization.
My Own Demography 2 Population Composition.pptxMUHAMMAD UMAIR
The document discusses population composition and provides details on various characteristics used to describe a population, including age, sex, race, ethnicity, language, religion, nationality, marital status, education level, and occupation. It defines key demographic terms like sex ratio, age-dependency ratio, and population pyramid. It also addresses challenges in collecting accurate age data and methods for detecting age reporting errors. Finally, it provides a demographic profile of Pakistan, noting that as of 2023 its population is approximately 240.5 million with a population growth rate of 1.98% and population density of 302 people per square kilometer.
My Own Demography 3 Population Pyramid.pptxMUHAMMAD UMAIR
A population pyramid graphically displays a population's age and sex composition using horizontal bars to present numbers or proportions of males and females in each age group. The pyramid shape can indicate factors like birth rates, population growth or decline, health, and development levels. General structures include triangles for growing populations, hexagons for stable populations, and cups for declining populations. A pyramid provides information on metrics like median age, sex ratios, dependency ratios, and expected changes based on current age distributions.
The document discusses population dynamics and demography. It covers several key topics:
1. Population is a dynamic field that has seen significant changes in birth rates and population trajectories globally in recent years.
2. Demographic factors like population size, growth, structure, and changes impact many aspects of life from housing to healthcare.
3. Global population is still rising by over 80 million per year and is expected to continue growing this century unless action is taken. The largest population growth will occur in sub-Saharan Africa.
My Own Demography 4 Demographic transition.pptxMUHAMMAD UMAIR
1. Population is growing fast in developing countries that are in the early stages of the demographic transition, where death rates are falling due to improved healthcare and sanitation but birth rates remain high.
2. Areas growing fastest are developing regions of Africa, Asia, and Latin America that have not yet experienced a substantial decline in birth rates associated with industrialization and rising incomes.
3. Rapid population growth in these areas is straining social systems like education and healthcare and increasing environmental pressures as more resources are needed to support larger populations.
Green marketing involves promoting environmentally friendly products to minimize negative environmental impacts. It aims to satisfy consumer needs using limited resources sustainably. The term emerged in the late 1980s as ecological concerns grew. Marketers have power to design cleaner products and restore the environment. Green marketing is important because resources are limited but demands are unlimited. It allows companies to use resources efficiently while satisfying customers and achieving profits. Major companies now use green strategies like modifying the 4 Ps of marketing. Green marketing benefits firms through customer satisfaction, social acceptance, and cost savings while improving the environment.
Crescent Fibers is a Pakistani textile company that was established in 1969. The document analyzes the company's financial statements from 2006-2007 and 2007-2008 using various liquidity, leverage, and profitability ratios. These ratios are compared to peer companies and explained in detail to evaluate Crescent Fiber's financial performance and position over those time periods.
The document summarizes wind energy potential and development in Pakistan. Specifically:
- Pakistan has significant potential for wind energy generation along its southern coast, especially in Sindh province, with one study estimating over 346,000 MW of potential capacity.
- A feasibility study was conducted for an 18 MW wind farm near Gharo, Sindh, which estimated an annual generation of 45 million kWh with a capacity factor of 28%.
- The government of Pakistan has set a target of 5% renewable energy generation by 2030 and provides incentives like allocating land and setting preferential tariffs to encourage wind power development.
OIL AND GAS DEVELOPMENT CORPORATION PAKISTAN(OGDCL)MUHAMMAD UMAIR
OGDCL is Pakistan's national oil and gas company. It was established in 1961. The document analyzes OGDCL's financial performance from 2006-2008 using various metrics such as current ratio, quick ratio, return on assets, return on equity, gross profit margin, and net profit margin. These metrics are compared to industry averages. The document also uses DuPont analysis to examine factors affecting return on equity over this period.
The document discusses Unaico Holding Ltd, an integrated conglomerate operating in various fields through wholly-owned enterprises and joint ventures. It mentions their social network platform SiteTalk, which grew from 30,000 to 1 million members between February and December 2010. The document also provides information on how members can earn bonuses and grow their networks on SiteTalk.
The document provides information about the basics of Unaico's business model, including its compensation plan and ranking system. It explains that members earn commissions from direct sales, matching bonuses, network bonuses based on team volume, and potential earnings from Unaico's internal market. Higher ranks are achieved by meeting business volume and qualification requirements, and come with awards like cash bonuses, property, and luxury goods.
Men tend to die younger than women for several biological and behavioral reasons. Biologically, men's bodies are less efficient at repairing cellular damage and they lack the protective effects of estrogen. Behaviorally, men are more likely to engage in risky behaviors like smoking, drinking alcohol in excess, not exercising regularly, and dangerous occupations. Addressing behavioral factors through health education and social support could help close the gender gap in life expectancy.
The document discusses the fleeting nature of time and the present moment. It emphasizes that the future is uncertain and the past cannot be changed, so one must make the most of the current day by helping others, showing compassion, and strengthening relationships, as tomorrow is not guaranteed.
A short document contains a direction to point a mouse cursor at someone's nose, followed by an onomatopoeic expression of laughter. It appears to be describing pointing a mouse cursor at a person's nose on a screen and their amused reaction.
This document provides instructions for taking a photo using a computer program. It tells the user to sit in front of the monitor and smile while the shutter is open, then click the mouse to take the picture. After the photo is taken, it can be viewed, enlarged, and printed. The program then asks if the user wants to take another photo, thanks them for using the program, and notes that sharing the program is allowed but duplication is prohibited.
The document appears to be a disjointed collection of phrases in Hindi and English with no clear overall meaning or narrative. It includes phrases expressing fear, discomfort with being stared at, a desire to earn money for a new hair wig to please a girlfriend, and requests for feedback on appearance and a hug. However, taken as a whole, the document lacks essential context and coherence to understand its overall purpose or message.
This document discusses the importance of true friends and friendship. It notes that true friends leave footprints in your heart, and that being betrayed twice is the fault of the individual. Losing money is bad, but losing a friend is worse, and losing faith is to lose everything. Friends are like a circle with no beginning or end, and today is a gift to cherish friends during National Friendship Week.
The document provides advice on how to be a good friend, such as not being ashamed to cry, being funny, offering a smile, listening, playing, feeling their pain, trusting fully, preparing surprises, telling secrets, cheering up, sharing, defending them from enemies, and giving them a little push. It also notes that while it's good to have friends, sometimes people need alone time, and not to be scared if making someone happy just by being their friend. The document encourages sending the message to friends to show how much you care during National Friendship Week.
Friends forward emails to each other as a way to stay connected even when they have nothing significant to say. By forwarding emails, friends demonstrate that they are thinking of each other and want to remain in contact even during times where there is no news to share. Receiving a forwarded email from a friend is a way for one to know that they are still cared for and remembered in that person's heart.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Lecture2
1. Lecture 2
• Internet
• HTTP
• HTML
• Cookies
• Web servers
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 1
Δημήτρης Κοτζίνος
2. History of the Internet
• ARPAnet
– Implemented in late 1960’s by ARPA (Advanced
Research Projects Agency of DOD)
– Networked computer systems of a dozen universities
and institutions with 56KB communications lines
– Grandparent of today’s Internet
– Intended to allow computers to be shared
– Became clear that key benefit was allowing fast
communication between researchers – electronic-mail
(email)
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 2
Δημήτρης Κοτζίνος
3. History of the Internet (II)
• ARPA’s goals
– Allow multiple users to send and receive info at
same time
– Network operated packet switching technique
• Digital data sent in small packages called packets
• Packets contained data, address info, error-control info
and sequencing info
• Greatly reduced transmission costs of dedicated
communications lines
– Network designed to be operated without
centralized control
• If portion of network fails, remaining portions still able to
route packets
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 3
Δημήτρης Κοτζίνος
4. History of the Internet (III)
• Transmission Control Protocol (TCP)
– Name of protocols for communicating over ARPAnet
– Ensured that messages were properly routed and that
they arrived intact
• Organizations implemented own networks
– Used both for intra-organization and communication
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 4
Δημήτρης Κοτζίνος
5. History of the Internet (IV)
• Huge variety of networking hardware and
software appeared
– ARPA achieved inter-communication between all
platforms with development of the IP
• Internetworking Protocol
• Current architecture of Internet
– Combined set of protocols called TCP/IP
• The Internet
– Limited to universities and research institutions
– Military became big user
– Next, government decided to access Internet for
commercial purposes
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 5
Δημήτρης Κοτζίνος
6. History of the Internet (V)
• Internet traffic grew
– Businesses spent heavily to improve Internet
• Better service their clients
– Fierce competition among communications carriers and
hardware and software suppliers
– Result
• Bandwidth (info carrying capacity) of Internet increased
tremendously
• Costs plummeted
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 6
Δημήτρης Κοτζίνος
7. Growing of the Internet
• In 1988 when the Internet was first plugged into
a T1 backbone, there were a total of about
50,000 hosts.
• In 1993, when the World Wide Web came
online, the number of hosts had just passed 1
million mark.
• In 2001, there are more than 100 million hosts
on the Internet. The Internet is growing in a fast
speed.
• The most recent survey can be found at
http://www.isc.org/ds/.
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 7
Δημήτρης Κοτζίνος
8. Major Events in Internet History (I)
Year Event
1957 USSR launches Sputnik
1968 First Packet Switching Network
1969 ARPANET Starts
1972 First Public Demo of ARPANET
Internet Mail Invented
1979 UseNet Starts
1983 ARPANET Changes Over to TCP/IP
ARPANET Splits into ARPANET & MILNET
1984 Internet Exceeds 1.000 Hosts
Domain Name Server Introduced
1987 Internet Exceeds 10.000 Hosts
1988 Worm Attacks 6.000 of Internet’s 60.000 Hosts
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 8
Δημήτρης Κοτζίνος
9. Major Events in Internet History (II)
Year Event
1989 Internet Exceeds 100,000 Hosts
1990 ARPANET Dismantled Archie Starts
1986 NSFNET Created
1991 WAIS Started
Gopher Started
NSF Lifts Commercial Ban
1992 Internet Exceeds 1 million Hosts
Web Invented by Tim Berners-Lee
1993 MOSAIC Developed by Marc Andreesen
InterNIC Founded by NSF
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 9
Δημήτρης Κοτζίνος
10. Client/Server
• A program running on the end-user
workstation is called a client.
• A program running on the service part is
called a server.
• Client/server describes the relationship
between two computer programs in which
one program, the client, makes a service
request from another program, the server,
which fulfills the request.
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 10
Δημήτρης Κοτζίνος
11. History of the World Wide Web
• WWW
– Allows computer users to locate and view
multimedia-based documents
– Introduced in 1990 by Tim Berners-Lee
– HyperText (Nielsen, 1965)
• Internet today
– Mixes computing and communications technologies
– Makes information constantly and instantly available
to anyone with a connection
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 11
Δημήτρης Κοτζίνος
12. Standard Bodies
• Internet Society (www.isoc.org)
• Internet Architecture Board (www.isi.edu/iab)
• Internet Engineering Task Force (IETF) (www.ietf.org)
• Internet Research Task Force (IRTF) (www.irtf.org)
• Internet network Information Center (InterNIC):
Domain Names (www.internic.net)
• Internet Assigned Numbers Authority (IANA):
IP addresses (www.iana.org)
• World Wide Wed Concortium (W3C) (www.w3c.org)
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 12
Δημήτρης Κοτζίνος
13. World Wide Web Consortium
(W3C)
• Founded in 1994 by Tim Berners-Lee
– Devoted to developing non-proprietary and interoperable
technologies for the World Wide Web and making the Web
universally accessible
• Standardization
– W3C Recommendations: technologies standardized by W3C
• include Extensible HyperText Markup Language (XHTML), Cascading
Style Sheets (CSS) and the Extensible Markup Language (XML)
– Document must pass through Working Draft, Candidate
Recommendation and Proposed Recommendation phases before
considered for W3C Recommendation
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 13
Δημήτρης Κοτζίνος
14. World Wide Web Consortium
(W3C) (II)
• W3C Structure
– 3 Hosts
• Massachusetts Institute of Technology (MIT)
• INRIA (Institut National de Recherche en Informatique et
Automatique)
• Keio University of Japan
– 400 Members (including Deitel & Associates)
• W3C homepage at www.w3c.org
• W3C Goals
– User Interface Domain
– Technology and Society Domain
– Architecture Domain and Web Accessibility Initiatives
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 14
Δημήτρης Κοτζίνος
15. TCP/IP: The Internet Protocol
Application Layer (HTTP, FTP, SMTP)
Transport Layer (TCP, UDP)
Internet Layer (IP)
Physical Network
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 15
Δημήτρης Κοτζίνος
16. TCP/IP
FPT HTTP TELNET SNMP MBONE
TCP UDP
Connection- Connectionles
oriented s
IP
(ICMP, IGMP)
Internet
addressing
Physical Layer
Physical wiring
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 16
Δημήτρης Κοτζίνος
19. Name Servers
• DNS (Domain Names System, 1983,
University of Wisconsin)
• Domain Names
– .org, .com, .net, .gov, .edu, .mil
– .gr
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 19
Δημήτρης Κοτζίνος
20. HyperText Transfer Protocol (HTTP)
www.w3c.org/protocols/HTTP
• Client / Server (browser / web server)
• Stateless
• MIME (binary data support)
• Data in two pieces: data & transfer
description
•fewer TCP connections
• Port 80 •compression/decompression
• version 1.1 •multiple languages
•virtual hosting
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 20
Δημήτρης Κοτζίνος
21. Sockets and Ports (Diagram)
port 13 Time Service
Client
port 80 Web Service
Socket Socket
Server
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 21
Δημήτρης Κοτζίνος
22. HTTP
1. Client opens connection
2. Client makes the request
3. Server sends response
4. Server closes connection
• HTTP-Keep Alive: server does not close
connection
• Restart from (2)
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 22
Δημήτρης Κοτζίνος
23. HTTP methods
• GET
retrieves a resource from the server and returns it to the
client
GET <URL> HTTP/1.1
• HEAD
like GET but returns only info about a resource and NOT
the resource itself
• POST
sends data from the server to the client
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 23
Δημήτρης Κοτζίνος
24. The HTTP Connection
• The HTTP protocol is text-based.
• HTTP headers:
– GET: identifies the request as HTTP version
1.1.
– Accept: identifies what image formats are
accepted.
– Accept-Language: specifies the language
used.
– Accept-Encoding: specifies the data
compression.
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 24
Δημήτρης Κοτζίνος
25. The HTTP Connection
• HTTP headers (continued):
– User-Agent: identifies the user agent.
– Host: requests the homepage.
– Connection: specifies to keep the connection
open.
– Extension: Something about security.
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 25
Δημήτρης Κοτζίνος
28. HTML form that uses GET
<FROM ACTION= “http://smaug.java.utoronto.ca:2021/cgi-bin/form1”
METHOD=GET>
<p> Search string: <INPUT TYPE=”text” NAME=”srch” VALUE=”dogfish”>
<p> Search Type:
<SELECT NAME=”srch_type”>
<OPTION> Insensitive Substrinb
<OPTION SELECTED> Exact Match
<OPTION> Sensitive Substring
<OPTION> Regular Expression
</SELECT>
<p> Search databases in:
<INPUT TYPE=“checkbox” NAME=“srvr” VALUE=“Canada” CHECKED> Canada
<INPUT TYPE= “chckbox” NAME=“srvr” VALUE=“Russia” > Russia
<INPUT TYPE=“checkbox” NAME=“srvr” VALUE=“Sweden” CHECKED> Sweden
<INPUT TYPE=“checkbox” NAME=“srvr” VALUE=“U.S.A.” > U.S.A
<em>(multiple items can be selected.)</em>
<P> <INPUT TYPE=“submit”> < <INPUT TYPE=reset>.
</FORM>
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 28
Δημήτρης Κοτζίνος
29. Data sent to a HTTP server during
a form-based GET request
GET /cgi-bin/form1?
srch=dogfish&srch_type=Exact+Match&srvr=Ca
nanda&srvr=Sweden HTTP/1.0
Connection:keep-Alive
User-Agent: Mozilla/3.02 (Win95; I)
Host: smaug.java.utoronto.ca:2021
Accept: image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, */*
Accept-Language: en-US, fr, fr-CA
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 29
Δημήτρης Κοτζίνος
31. HyperText Markup Language (HTML)
• readable by both humans and computers
• based on SGML (Standard Generalized
Markup Language)
• markup: tags describing the data
• tags: <> </> (tag names case-insensitive)
• Text, images,
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 31
Δημήτρης Κοτζίνος
32. HTML – Elements and Tags
<h1>This is a level one heading</h1>
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 32
Δημήτρης Κοτζίνος
33. HTML files
<html>
<head>
<title>Paragraph Attributes</title>
</head>
<body>
<h1>The Paragraph Attribute Align</h1>
<p align='left'> This is a paragraph with its text pushed against the left-hand
side of the page.
<p align='center'> This is a paragraph with its text placed in the center of the
page.
<p align='right'> This is a paragraph with its text pushed against the righthand
side of the page.
</body>
</html>
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 33
Δημήτρης Κοτζίνος
35. HTML forms
• <form> …. </form>
• hidden forms: forms not showing on the
browser but used to preserve state
information
• Note: HTTP is a stateless protocol
02/28/11 ΗΥ359 - Διαδικτυοκεντρικός Προγραμματισμός 35
Δημήτρης Κοτζίνος