SlideShare a Scribd company logo
Network Protocols
What is the internet?
The internet is a global network of computers that any
computer can join. It is a WAN - which is a series of
connected LANs.
Data packets are sent between computers using protocols
that manage how data is sent and received. The internet
also uses different models - such as the client-server
model and the P2P model - to connect computers in
different ways. The internet is leading to more and more
people using cloud computing to store files and use web
applications online.
Services available over the internet
• Web pages – HTML documents that present images, sound
and text accessed through a web browser
• Web applications - web software accessed through a
browser
• Native apps - applications developed for specific devices
(such as smartphones) and accessed without the need for
a browser
Services available over the internet
• Email
• File sharing
• Voice calls
• Streaming audio and video
Connecting to the internet
To connect a computer or a device to the internet, you
need:
• an ISP (Internet Service Providor)
• a modem or router (wired or wireless)
• a web browser or app
• a connection to the network (through a copper wire or a
fibre optic cable)
Fibre optics
Fibre optic cabling is made from glass that
becomes very flexible when it is thin. Light is
passed through the cable using a transmitter.
Light travels quickly through the light-
reflecting internal wall of the cable.
The transmitter in the router sends light
pulses representing binary code. When the
data is received, it is decoded back to its
binary form and the computer displays the
message.
Copper cable
Copper cable uses electrical signals to pass
data between networks instead of light. It is
much slower than fibre optics and the signal
cannot travel as far.
Copper cable is a much cheaper alternative to
fibre optics.
Protocols
The internet is similar to a road network in that it has rules (protocols)
that you need to follow and only a certain number of vehicles (data)
can get through at a time (bandwidth). If too many vehicles try to go
down the same road you get congestion (reduced bandwidth).
When two devices send messages to
each other it is called handshaking - the
client requests access, the server grants
it, and the protocols are agreed. Once
the handshaking process is complete,
the data transfer can begin.
Protocols
Protocols establish how two computers send and receive a message. Data
packets travel between source and destination from one router to the next.
The process of exchanging data packets is known as packet switching.
Protocols manage key points about a message:
• speed of transmission
• size of the message
• error checking
• deciding if the transmission is synchronous (regular) or asynchronous
(irregular)
TCP/IP
(transmission control protocol/internet protocol)
TCP/IP (also known as the internet protocol suite) is the set of
protocols used over the internet. It organises how data packets are
communicated and makes sure packets have the following information:
• source - which computer the message came from
• destination - where the message should go
• packet sequence - the order the message data should be re-assembled
• data - the data of the message
• error check - the check to see that the message has been sent
correctly
Internet protocols
Within TCP/IP there are several key protocols. These include the
following.
IP address
• Every device on the internet has a unique IP address. The IP
address is included in a data packet. The address is broken down
into four 8-bit numbers (each is called an octet). Each octet can
represent a number between 0 and 255 and is separated by a full
stop, eg 192.168.0.12.
Internet protocols
FTP (File Transfer Protocol)
• FTP is used to transfer large files. It is often used for organising
files on a web server for a website. You can have private access
to an area on an FTP server where you can upload your files. You
can then give another user access to download the documents
that you have shared.
Internet protocols
HTTP (Hypertext Transfer Protocol)
• HTTP transfers web pages from web servers to the client. All web
page addresses start with http. An https address is a secure web
address which has been encrypted. An https address is used for
sites holding bank details and secure information.
Internet protocols
SMTP (Simple Mail Transfer Protocol) and
POP3 (Post Office Protocol)
• Email uses these protocols to communicate with mail servers.
SMTP is used to send the email; POP is used to receive email.
VOIP (Voice Over Internet Protocol)
• VOIP is a set of protocols that enables people to have voice
conversations over the internet.
Web Addresses
Every website address has a URL (Uniform Resource Locator) with
an equivalent IP address. A web address contains (running from
left to right):
1. http(s)
2. the domain name - the name of the website
3. an area within that website – like a folder or directory
4. the web page name – the actual page that you are viewing
Web Addresses
For example: http://www.bcc.act.edu.au/lyneham/why-choose-
bcc/message-from-principal/vision-statement
1. http is the protocol
2. www.bcc.act.edu.au is the domain name
3. /lyneham/why-choose-bcc/message-from-principal/ is the
folder structure leading to where the web page is located
4. vision-statement is the requested web page
Name Servers
Name servers are used to host and match website addresses to IP
addresses.
DNS (Domain Name System) is the main system over the internet
that searches the name servers.
When you type in a URL, the DNS looks up the domain name, finds
the matching IP address and sends it back.
Every website has a URL with an equivalent IP address.
Streaming
Streaming high-quality images, music and
video requires a lot of data. Music and
video files can both be either downloaded
as permanent files or streamed
temporarily.
A downloaded file creates a file you can
store permanently. Streamed files are not
stored permanently. Streaming allows data
to be used immediately but the whole file
is not downloaded. Popular streaming sites
include Spotify and YouTube.
Buffering
A buffer is a temporary storage space where data can be held and
processed. The buffer holds the data that is required to listen to or
watch the media. As data for a file is downloaded it is held in the
buffer temporarily. As soon as enough data is in the buffer the file
will start playing.
When you see the warning sign
'buffering' this means that the
client is waiting for more data
from the server. The buffer will
be smaller if the computer is on
a faster network.
End of Presentation

More Related Content

What's hot

Internet Services
Internet ServicesInternet Services
Internet Services
talha8m
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
Tahmina Shopna
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
simplyharshad
 
Lec 1 intro to internet
Lec 1 intro to internetLec 1 intro to internet
Lec 1 intro to internet
Shahid Riaz
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
RazanAlsaif
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
Gurjot Singh
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Himanshu Pathak
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
Peter R. Egli
 
Database Management System - 2a
Database Management System - 2aDatabase Management System - 2a
Database Management System - 2a
SSN College of Engineering, Kalavakkam
 
Internet
InternetInternet
Internet
Css Founder
 
Internet
InternetInternet
How does the internet work
How does the internet workHow does the internet work
How does the internet work
mraheel205
 
Web hosting Introduction- MilesWeb
Web hosting  Introduction- MilesWebWeb hosting  Introduction- MilesWeb
Web hosting Introduction- MilesWeb
MilesWeb Hosting Services
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
hashim102
 
Web technology Unit-I Part D - message format
Web technology Unit-I  Part D - message formatWeb technology Unit-I  Part D - message format
Web technology Unit-I Part D - message format
SSN College of Engineering, Kalavakkam
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
Akshay Dhole
 
Internet unit 4
Internet unit 4Internet unit 4
Internet unit 4
Syed Kowsar
 

What's hot (20)

Internet Services
Internet ServicesInternet Services
Internet Services
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Lec 1 intro to internet
Lec 1 intro to internetLec 1 intro to internet
Lec 1 intro to internet
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
world wide web
world wide webworld wide web
world wide web
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
 
Internet
InternetInternet
Internet
 
Database Management System - 2a
Database Management System - 2aDatabase Management System - 2a
Database Management System - 2a
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Web hosting Introduction- MilesWeb
Web hosting  Introduction- MilesWebWeb hosting  Introduction- MilesWeb
Web hosting Introduction- MilesWeb
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
 
Web technology Unit-I Part D - message format
Web technology Unit-I  Part D - message formatWeb technology Unit-I  Part D - message format
Web technology Unit-I Part D - message format
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
Internet unit 4
Internet unit 4Internet unit 4
Internet unit 4
 

Similar to Network Protocols

NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
SeethaDinesh
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
reddragon32
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
sumit kumar
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
Anish Thomas
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
 
How the internet works
How the internet worksHow the internet works
How the internet worksftcim
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
CBAKhan
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
tangemjoy
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
kebeAman
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
subhradeep mitra
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
bmit1
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
hishamousl
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
azmerawAnna1
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
pkaviya
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
Kimmy Chen
 
5 introduction to internet
5 introduction to internet5 introduction to internet
5 introduction to internetVedpal Yadav
 

Similar to Network Protocols (20)

NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Internet and cyberspace
Internet and cyberspaceInternet and cyberspace
Internet and cyberspace
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
5 introduction to internet
5 introduction to internet5 introduction to internet
5 introduction to internet
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Network Protocols

  • 2. What is the internet? The internet is a global network of computers that any computer can join. It is a WAN - which is a series of connected LANs. Data packets are sent between computers using protocols that manage how data is sent and received. The internet also uses different models - such as the client-server model and the P2P model - to connect computers in different ways. The internet is leading to more and more people using cloud computing to store files and use web applications online.
  • 3. Services available over the internet • Web pages – HTML documents that present images, sound and text accessed through a web browser • Web applications - web software accessed through a browser • Native apps - applications developed for specific devices (such as smartphones) and accessed without the need for a browser
  • 4. Services available over the internet • Email • File sharing • Voice calls • Streaming audio and video
  • 5. Connecting to the internet To connect a computer or a device to the internet, you need: • an ISP (Internet Service Providor) • a modem or router (wired or wireless) • a web browser or app • a connection to the network (through a copper wire or a fibre optic cable)
  • 6.
  • 7. Fibre optics Fibre optic cabling is made from glass that becomes very flexible when it is thin. Light is passed through the cable using a transmitter. Light travels quickly through the light- reflecting internal wall of the cable. The transmitter in the router sends light pulses representing binary code. When the data is received, it is decoded back to its binary form and the computer displays the message.
  • 8. Copper cable Copper cable uses electrical signals to pass data between networks instead of light. It is much slower than fibre optics and the signal cannot travel as far. Copper cable is a much cheaper alternative to fibre optics.
  • 9. Protocols The internet is similar to a road network in that it has rules (protocols) that you need to follow and only a certain number of vehicles (data) can get through at a time (bandwidth). If too many vehicles try to go down the same road you get congestion (reduced bandwidth). When two devices send messages to each other it is called handshaking - the client requests access, the server grants it, and the protocols are agreed. Once the handshaking process is complete, the data transfer can begin.
  • 10. Protocols Protocols establish how two computers send and receive a message. Data packets travel between source and destination from one router to the next. The process of exchanging data packets is known as packet switching. Protocols manage key points about a message: • speed of transmission • size of the message • error checking • deciding if the transmission is synchronous (regular) or asynchronous (irregular)
  • 11. TCP/IP (transmission control protocol/internet protocol) TCP/IP (also known as the internet protocol suite) is the set of protocols used over the internet. It organises how data packets are communicated and makes sure packets have the following information: • source - which computer the message came from • destination - where the message should go • packet sequence - the order the message data should be re-assembled • data - the data of the message • error check - the check to see that the message has been sent correctly
  • 12. Internet protocols Within TCP/IP there are several key protocols. These include the following. IP address • Every device on the internet has a unique IP address. The IP address is included in a data packet. The address is broken down into four 8-bit numbers (each is called an octet). Each octet can represent a number between 0 and 255 and is separated by a full stop, eg 192.168.0.12.
  • 13. Internet protocols FTP (File Transfer Protocol) • FTP is used to transfer large files. It is often used for organising files on a web server for a website. You can have private access to an area on an FTP server where you can upload your files. You can then give another user access to download the documents that you have shared.
  • 14. Internet protocols HTTP (Hypertext Transfer Protocol) • HTTP transfers web pages from web servers to the client. All web page addresses start with http. An https address is a secure web address which has been encrypted. An https address is used for sites holding bank details and secure information.
  • 15. Internet protocols SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol) • Email uses these protocols to communicate with mail servers. SMTP is used to send the email; POP is used to receive email. VOIP (Voice Over Internet Protocol) • VOIP is a set of protocols that enables people to have voice conversations over the internet.
  • 16. Web Addresses Every website address has a URL (Uniform Resource Locator) with an equivalent IP address. A web address contains (running from left to right): 1. http(s) 2. the domain name - the name of the website 3. an area within that website – like a folder or directory 4. the web page name – the actual page that you are viewing
  • 17. Web Addresses For example: http://www.bcc.act.edu.au/lyneham/why-choose- bcc/message-from-principal/vision-statement 1. http is the protocol 2. www.bcc.act.edu.au is the domain name 3. /lyneham/why-choose-bcc/message-from-principal/ is the folder structure leading to where the web page is located 4. vision-statement is the requested web page
  • 18. Name Servers Name servers are used to host and match website addresses to IP addresses. DNS (Domain Name System) is the main system over the internet that searches the name servers. When you type in a URL, the DNS looks up the domain name, finds the matching IP address and sends it back. Every website has a URL with an equivalent IP address.
  • 19.
  • 20. Streaming Streaming high-quality images, music and video requires a lot of data. Music and video files can both be either downloaded as permanent files or streamed temporarily. A downloaded file creates a file you can store permanently. Streamed files are not stored permanently. Streaming allows data to be used immediately but the whole file is not downloaded. Popular streaming sites include Spotify and YouTube.
  • 21. Buffering A buffer is a temporary storage space where data can be held and processed. The buffer holds the data that is required to listen to or watch the media. As data for a file is downloaded it is held in the buffer temporarily. As soon as enough data is in the buffer the file will start playing. When you see the warning sign 'buffering' this means that the client is waiting for more data from the server. The buffer will be smaller if the computer is on a faster network.