The document provides an overview of the history and development of the Internet. It discusses how the Internet began as a US military network called ARPAnet in 1969 and expanded throughout the 1970s. While initially used by researchers and the military, the creation of the World Wide Web in the early 1990s led to widespread commercial and public use of the Internet with over 1.9 billion users currently. The document also outlines the various technologies and standards that underpin modern Internet infrastructure like IP addressing, domains, and connection types.
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
Types of Networks
There are several different types of computer networks. Computer networks can be characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of computers that are part of the network. Networks can cover anything from a handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:
Personal area network, or PAN
Local area network, or LAN
Metropolitan area network, or MAN
Wide area network, or WAN
network internet
TYPES OF NETWORK
There are two main types of network:
• LAN
• WAN
NETWORK TOPOLOGY
TYPES OF TOPOLOGY
1. BUS
2. STAR
3. RING
RING TOPOLOGY
INTERNET
HISTORY OF INTERNET
CONNECTING METHODS TO THE INTERNET
To connect to the Internet the following are needed:
• a computer
• telephone line
• modem and/or router
• an ISP (Internet Service Provider)
• Web browser, e.g. Internet Explorer, Fire fox, Chrome, Safari, Opera etc.
network internet
TYPES OF NETWORK
There are two main types of network:
• LAN
• WAN
NETWORK TOPOLOGY
TYPES OF TOPOLOGY
1. BUS
2. STAR
3. RING
RING TOPOLOGY
INTERNET
HISTORY OF INTERNET
CONNECTING METHODS TO THE INTERNET
To connect to the Internet the following are needed:
• a computer
• telephone line
• modem and/or router
• an ISP (Internet Service Provider)
• Web browser, e.g. Internet Explorer, Fire fox, Chrome, Safari, Opera etc.
So, this was our FIRST SEMESTER presentation on "Internet".
Everyone is familiar with the word internet so, in this presentation we have tried to gather more and more information about internet from reliable sources so as to enhance knowledge.
hope this will help you!!!!
Pixel Patrol: Galactic Defender
Concept: Players take control of a pixelated spaceship in a classic side-scrolling shooter. Defend the galaxy from waves of retro-inspired alien invaders. Collect power-ups, upgrade your ship, and challenge epic boss battles in a nostalgic arcade experience.
Time Warp Runner
Concept: In this retro-style endless runner, players navigate through various time periods, each with its own unique pixel art aesthetics and challenges. Jump, slide, and dodge obstacles to collect artifacts while avoiding temporal paradoxes.
Neo Cyber Samurai
Concept: Step into the neon-lit streets of a cyberpunk city as a pixelated samurai. Engage in fast-paced, combo-based sword fights with rogue AI, cyber-enhanced criminals, and futuristic foes. Upgrade your skills and armor as you progress through the dystopian world.
Retro Racer Revolution
Concept: Race through a series of pixelated tracks in classic arcade racing style. Customize your vintage car, compete against AI or friends in split-screen multiplayer, and collect power-ups to gain the upper hand. The game features an array of tracks inspired by different eras of gaming.
Mystery Mansion: Ghost Hunt
Concept: Explore a haunted mansion filled with pixelated ghosts and supernatural mysteries. As a paranormal investigator armed with retro-tech gadgets, you must uncover the secrets of the mansion while capturing or banishing the resident ghosts. Solve puzzles, gather clues, and survive jump scares.
Modue 1 part 1 of computer networks for your university examsvish21ainds
A computer network (CN) is a group of devices that share resources over a network, with each device represented as a network node. The devices communicate with each other using standard protocols to send or receive data.
Computers on a network can be linked through cables, radio waves, telephone lines, infrared light beams, or satellites. The network can also include other devices that help in communication, known as network devices.
Here are some types of computer networks:
PAN (Personal Area Network): The smallest and simplest type of network
LAN (Local Area Network): The most frequently used network, connecting computers within a limited area, such as a single office or building
MAN (Metropolitan Area Network): A type of network
WAN (Wide Area Network): An enterprise network spanning cities, buildings, and even countries
Wireless networking is about creating and managing wireless connections, commonly used in Wi-Fi. This involves setting up Wi-Fi routers, securing them with passwords, and allowing devices to connect to a network without using physical cables.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Networkinglesson 120115093046-phpapp01
1.
2. The Internet is the largest computer
network in the world, connecting millions of
computers. A network is a group of two or
more computer systems linked together.
3.
4. • In 1969, the US Department of Defense started
a project to allow researchers and military
personnel to communicate with each other in
an emergency.
• The project was called DARPAnet (Defence
Advanced Research Projects Agency) and it is
the foundation of the Internet.
• Later its also called ARPAnet (Advanced
Research Projects Agency)
5. • Throughout the 1970's, what would later
become the Internet was developed. While
mostly military personnel and scientists used it
in its early days, the advent of the World Wide
Web in the early 1990's changed all that.
• Current amount over 1.9 billion users around
the world
6.
7. • The overall responsibility for managing Internet Protocol address
or domain names at upper levels is vested in the Internet
Assigned Numbers Authority (IANA), which delegates the actual
administration of most functions to other bodies.
• At global regional levels, the principal bodies providing allocation
and registration services that support the operation of the
Internet globally are:
• RIPE NCC (Réseaux IP Européens Network Coordination Centre)
• ARIN (American Registry for Internet Numbers)
• APNIC (Asia Pacific Network Information Centre)
• LACNIC (Latin American and Caribbean IP address Regional
Registry)
• AfriNIC (African Regional Registry for Internet Number Resources)
8.
9.
10. • Dial-up-connections : speed 56kbps
• ISDN : speed 128 Kbps
• Broadband
▫ ADSL(Asymmetrical Digital Subscriber Line)
Speed 2mbps
▫ Cable : speed 42 Mbps
• Lease lines : up to 12mbps
• FTTH- Fiber to the Home
• Wireless
▫ Wi-Fi
▫ Wi-max
▫ Satellite
11.
12.
13. As you now know, the Internet is the
physical
computer
network
(computer,
monitor, modem, cables, phone lines, etc).
14. • Tim Berners-Lee, a software engineer, invented the
World Wide Web in 1991.
• The Web is a system of Internet servers that
support specially-formatted documents.
• These specially formatted documents are text
documents created in HTML, a formatting
language. In conjunction with the World Wide
Web, your web browser interprets these text
documents so they become web pages.
• Web pages contain formatted text, graphics,
sound, animation, and video, allowing point and
click navigation.
15. • “An address that points to a particular
document or other resource on the Internet,
used most frequently on the World Wide Web
(WWW)”.
• A computer user can visit an Internet document
by typing its URL into a Web browser or similar
application used to access the Internet.
• Eg:
http://www.infortec-international.com/index.html
18. Domain names
• An internet web site address.
• Domain names are used in URLs to identify
particular Web pages.
• The first-level set of domain names are the toplevel domains (TLDs), including the generic
top-level domains (gTLDs), such as the
prominent domains com, net and org, and the
country code top-level domains (ccTLDs).
21. • "Interconnection, collection of computers for
the purpose of sharing resources &
Communication that we can take as a
Network”.
• Resources we can divide in to three categories,
Information such as files & folders, Hardware
such as printers and software such as MS
office.
22. •
•
•
•
•
Is a method for communication
File/Data sharing
Sharing of printers and other resources
Can centralize administration and support
Can reduce the cost involved in communication
& information gathering
23. Different types of computer network
designs is by their scope or scale.
• LAN (Local Area Network)
• WAN (Wide Area Network)
• MAN (Metropolitan Area Network)
• WLAN (Wireless Local Area Network)
• PAN(Personal Area Network)
• CAN(Campus Area Network)
24. • LAN (Local Area Network):
“A computer network that connect two or
more electrical or electronic devices or
equipments in a single network”
Eg: SLT
25. • WAN (Wide Area Network):
“Connect two
networks together”
Eg: Internet
or
more
different
26. • MAN (Metropolitan Area Network):
•
“A data network designed for a town
or city”. In terms of geographic breath, MANs
are larger than local-area networks (LANs), but
smaller than wide-area networks (WANs). MANs
are usually characterized by very high-speed
connections using fiber optical cable or other
digital media.
27. • Wireless Local Area Network
“A LAN based on (Wi-Fi) wireless
network technology”
29. • A type of network in which each workstation
has equivalent capabilities and responsibilities.
This differs from client/server architectures, in
which some computers are dedicated to serving
the others. Peer-to-peer networks are generally
simpler, but they usually do not offer the same
performance under heavy loads.
30.
31. • A network architecture in which each computer
or process on the network is either a client or a
server. Servers are powerful computers or
processes dedicated to managing disk drives
(file servers), printers (print servers), or
network traffic (network servers).Clients are
PCs or workstations on which users run
applications. Clients rely on servers for
resources, such as files, devices, and even
processing power.
32.
33. • Intranet: A network based on TCP/IP protocols
(an internet) belonging to an organization,
usually a corporation, accessible only by the
organization's members, employees, or others
with authorization. An intranet's Web sites look
and act just like any other Web sites, but the
firewall surrounding an intranet fends off
unauthorized access.
34. • Extranet: A buzzword that refers to an intranet
that is partially accessible to authorized
outsiders. Whereas an intranet resides behind a
firewall and is accessible only to people who
are members of the same company or
organization, an extranet provides various
levels of accessibility to outsiders. You can
access an extranet only if you have a valid
username and password, and your identity
determines which parts of the extranet you can
view.
35. Data Communication
• Data Communication is the process of moving
data & information from one place to another
through a transmission system.
36. • The communication media is the matter or
substance that carries voice or data.
• Different types of transmission media are
currently in use. All these types can be group
two categories as Guided and Unguided media.
• The Guided media are follows through physical
media and unguided media are those in which
is the data is broadcast through air.
38. Guided Media:
• Cable is the medium through which information
usually moves from one network device to
another.
• There are several types of cable which are
commonly used with LANs. In some cases, a
network will utilize only one type of cable,
other networks will use a variety of cable
types.
40. Twisted pair
•
•
•
•
Is the common medium
Is mainly used in star topology networks
Cheap and easy to work with
There are several categories available in Twisted
pairs
▫ CAT1, CAT2, CAT5, CAT5E
41. Categories of Unshielded Twisted
Pair
Type
Use
Category 1
Voice Only (Telephone Wire)
Category 2
Data to 4 Mbps (Local Talk)
Category 3
Category 4
Category 5
Data to 10 Mbps (Ethernet)
Data to 20 Mbps (16 Mbps Token Ring)
Data to 100 Mbps (Fast Ethernet)
44. Coaxial cable
• Is mainly used in BUT topology networks
• Television
▫ Ariel to TV
▫ Cable TV
• Coaxial cable are in two categories :
▫ Thin Coaxial
▫ Thick Coaxial
• Difficult to handle
48. Fiber optics
• Signals are sent as light beams and transmitted
over a glass fiber.
• Fiber optic technology offers high bandwidth
• Optical fibers come in two types
▫ Single mode
▫ Multi mode
52. Specificati
on name
Cable Type
Max. length
Nodes/seg
10BaseT
Twisted Pair
100 m
1024
10Base2
Thin Coaxial
185 m
30
10Base5
Thick Coaxial
500 m
100
10BaseF
Fiber Optic
2000 m
1024
Advantage
Cheapest
system
No hub needed
Original cable,
now obsolete
Best between
buildings
53. Unguided Media
• Radio Waves
▫ Omni directional
▫ Suffers from interferences
▫ Use to TV, Radio, Cell phone
54. • Microwave
▫
▫
▫
▫
Microwaves travel nearly in a straight line
Tall building is a barrier
100 meter high towers, repeaters for every 80km
Is widely used for mobile phone, television etc.
55. • Satellite
▫
▫
▫
▫
▫
▫
Used for long distance telephone
Television
Private business network
Mostly used with Microwave
Using in long distance communications
Used for weather forecasting, television
broadcast, amateur radio communications,
Internet communications, and the Global
Positioning System,
56.
57. • Infrared
▫ Is limited for a small area (eg: for a room)
▫ Walls/barriers will block the signals
▫ Mainly used for TV remote control, IRD port.
58. • Bluetooth(802.15)
▫ Founding members are Ericsson, IBM, Intel, Nokia
and Toshiba.
▫ Short range wireless communication technology.
▫ Used to data synchronization between 2 devices
▫ Is limited for a small area
▫ Mainly used in Mobile phones, digital cameras,
headsets, scanners, keyboards, mouse and other
devices to connect to a computer.
59.
60. Network Topologies
• Topology refers to the shape of a network, or
the network's layout. How different nodes in a
network are connected to each other and how
they communicate is determined by the
network's topology. Topologies are either
physical or logical.
• BUS, RING, STAR, MESH etc.
67. • “A Protocol is a set of rules(standards) that
governs the communications between
computers on a network.”
• Most common network protocol is TCP/IP
• Eg: http, ftp, smtp, telnet, ssh, https, etc.
68. Properties of Protocol
• Detection of the underlying physical connection
(wired or wireless),
• Handshaking
• How to start and end a message
• How to format a message
• What to do with corrupted or improperly
formatted messages (error correction)
• How to detect unexpected loss of the
connection, and what to do next
• Termination of the session and or connection.
69. Internetworking Models
• When networks fist come in to being,
computers could typically communicate with
computers from the same manufacturer. In the
late
1970s,
the
Open
System
Interconnection(OSI) reference model was
created by the International Organization for
Standardization(ISO) to break this barrier.
• It is describes how data and network
information are communicated.
70. • A reference model is a conceptual blue print of
how communications should takes place.
• These processes divide into logical groups
called layers.
71. 7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
Provides the user interface to
communicate to the computer. Eg HTTP
----------------------------------------------------Presents data to the 7th layer and data
translation like encryption, conversion
----------------------------------------------------Manage presentation layers entities. (keep
different application data separately)
----------------------------------------------------Performs error correction before
retransmit.[Segments]
----------------------------------------------------Manages the device addressing.(IP
addressing) , Routes data. [Packets]
----------------------------------------------------Combines packets in to bytes and error
detection. [Frames]
----------------------------------------------------Moves bits between devices(physical
connection/cabling, electronic singnals)
[Bits]
76. A network server
• A network server is a computer designed to
process requests and deliver data to other (client)
computers over a local network or the Internet.
Network servers typically are configured with
additional processing, memory and storage capacity
to handle the load of servicing clients. Common
types of network servers include:
▫
▫
▫
▫
▫
Web servers
proxy servers
FTP servers
online game servers
Mail servers
80. Modem
• Short for modulator-demodulator. A modem is
a device or program that enables a computer to
transmit data over, for example, telephone or
cable lines. Computer information is stored
digitally, whereas information transmitted over
telephone lines is transmitted in the form of
analog waves. A modem converts between
these two forms.
90. MAC Address
• A MAC address, or Media Access Control address, is
a 48- or 64-bit address associated with a network
adapter.
• While IP addresses are associated with software,
MAC addresses are linked to the hardware of
network adapters.
• For this reason, the MAC address is sometimes
called the hardware address, the burned-in address
(BIA), or the physical address. MAC addresses are
expressed in hexadecimal notation in the following
format: 01-23-45-67-89-AB, in the case of a 48-bit
address.
91.
92. • “An identifier for a computer or device on a
TCP/IP network”. Networks using the TCP/IP
protocol route messages based on the IP
address of the destination.
• The format of an IP address is a 32-bit numeric
address written as four numbers separated by
periods. Each number can be zero to 255.
• For example 192.160.10.240 could be an IP
address.
93. What is an IP address
A way to identify machines on a network
A unique identifier
94. IP usage
Used to connect to another computer
Allows transfers of files and e-mail
95. IP structure
IP addresses consist of four sections
Each section is 8 bits long
Each section can range from 0 to 255
Written, for example, 128.35.0.72
96. IP structure
These four sections represent the machine itself
and the network it is on
The network portion is assigned.
The host section is determined by the network
administrator
97. IP structure
5 Classes of IP address A B C D and E
Class A reserved for governments
Class B reserved for medium companies
Class C reserved for small companies
98. IP structure
Class D are reserved for multicasting
Class E are reserved for future use
99. IP structure
Class A begins 1 to 126
Class B begins 128 to
191
Class C begins 192 to
223
100. Reserved addresses
Addresses beginning 127 are reserved for
loopback and internal testing
xxx.0.0.0 reserved for network address
xxx.255.255.255 reserved for broadcast
103. • Class A :
1.0.0.1 – 126.255.255.254
• Class B :
128.1.0.1 – 191.254.255.254
• Class C :
192.0.1.1 – 223.255.254.254
• Class D :
224.x.x.x (multicasting &
research purposes)
• Class E :
240.x.x.x (for future use)
104. Current Private IP addresses as
follows
• Class A
10.0.0.0 through 10.255.255.255
• Class B
172.16.0.0 through 172.31.255.255
• Class C
192.168.0.0 through 192.168.255.255
105.
106. • IPv4 addresses have 32 bits in them and so allow
a maximum of four billion addresses
107. • IPv6 stands for Internet Protocol version 6. It is
the second version of the Internet Protocol to be
used generally across the virtual world.
• IPv6 addresses have 128 bits.
• IPv6 is the future of Internet addressing, mainly
because industry experts believe that they are
close to running out of available addresses
altogether.
108. • 128 bits - written as eight 16-bit hex numbers.
5f1b:df00:ce3e:e200:0020:0800:2078:e3e3
109. How to Determine your IP Address?
• Go to the start menu and select Run.... Then
type cmd in the box and click OK.
• At the C:> prompt type ipconfig. Then press
Enter. Your IP address, subnet mask and
default gateway will be printed on the window.
• If you want more detailed information about
your network connection, type ipconfig /all at
the prompt. Here you can get additional
information about your IP configuration.
110. • For Domain Name System (or Service or
Server), an Internet service that translates
domain names into IP addresses.
• Every time you use a domain name, therefore,
a DNS service must translate the name into the
corresponding IP address.
Domain
www.example.com
IP Address
> 198.105.232.4
111. DNS has a table of Domain names and IP
addresses. It’s map the domain name with the IP
address and its route to the particular server.
Domain
www.yahoo.com
mail.yahoo.com
IP Address
104.102.1.103
104.102.2.107
113. • Short for Dynamic Host Configuration
Protocol, a protocol for assigning dynamic IP
addresses to devices on a network.
• With dynamic addressing, a device can have a
different IP address every time it connects to
the network.