SlideShare a Scribd company logo
The Internet – Packets, Routers & IP 
Addresses 
Definition of The Internet… 
A global computer network providing a variety of information and communication facilities, 
consisting of interconnected networks using standardized communication protocols – Google 
A vast computer network linking smaller computer networks worldwide(usually 
preceded by the). The Internet includes commercial, 
educational, governmental, and other networks, all of which use the 
same set of communications protocols – Dictionary.com
Domain Names & IP Addresses 
What is the relationship between domain names and IP addresses? 
The domain name system is an internet service that translates domain names to IP addresses. This is one 
of the crucial services on the internet, it allows users to access the desire website by typing its alpha-numeric 
name (domain name) in the browser, instead of its real numeric system name (IP address). 
What is a domain name? 
Domain name system (DNS) is the most recognisable system for assigning addresses to Internet web 
servers. The domain name system helps to give every Internet server a memorable and easy-to-spell 
name. The domain system usually keep the very technical IP address invisible for most users. Eg. 
Wikipedia.org, About.com 
What is an IP address? 
An Internet protocol address (IP address) is a numerical label assigned to each device (Eg. Computer, 
printer) participating in a computer network that uses the Internet protocol for communication. For 
simplicity purposes, the IP address is replaced with a domain name so that it is easily recognisable.
Data Packets & Package Switching 
What is a data packet? 
Definition - A packet is a basic unit of communication over a digital network. A packet is also called a 
datagram, a segment, a block, a cell or a frame, depending on the protocol. When data has to be 
transmitted, it is broken down into similar structures of data, which are reassembled to the original data 
chunk once they reach their destination. 
What is packet switching? 
Definition – packet switching describes the type of network in which relatively small units of data 
called packets are routed through a network based on the destination address contained within each 
packet. Breaking communication down into packets allows the same data path to be shared among 
many users in the network.
Function of Routers 
What are routers? 
A router is a device that transfers data from one network to another, doing so in a very intelligent way. It 
has the important task of forwarding data packets to their destination via the most efficient route. 
When a data packet arrives, the router does the following… 
•Reads the data packet’s destination address 
•Looks up all the paths it has available to get to that address 
•Checks on how busy each path is at the moment 
•Sends the packet along the least congested (therefore fastest) path 
Routers are also needed to enable computers to connect to the Internet because the Internet is such a 
vast external network.
Useful websites I used… 
•Dictionary.reference.com 
•www.ntchosting.com 
•Netforbeginners.about.com 
•Wikipedia.org 
•Voip.about.com 
•Searchnetworking.techtarget.com 
•www.teach-ict.com

More Related Content

What's hot

Bradley Scholes
Bradley ScholesBradley Scholes
Bradley Scholes
Scholsey
 
Computing Homework 1234
Computing Homework 1234Computing Homework 1234
Computing Homework 1234
FrerixD
 
Computing homework
Computing homeworkComputing homework
Computing homework
meeliahmoo
 
Computer networking 1
Computer networking 1Computer networking 1
Computer networking 1
Prof. Dr. K. Adisesha
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
PoojaWalia6
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Amit Fogla
 
Client server relation
Client server relationClient server relation
Client server relation
PoojaWalia6
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
JAI MCA-STUDENT
 
Internet
InternetInternet
Internet
alicehopx
 
Computer network
Computer networkComputer network
Computer network
Nandini Sahu
 
Network and programming language
Network and programming languageNetwork and programming language
Network and programming language
RajThakuri
 
Computer networks
Computer networksComputer networks
Computer networks
Billy Jean Morado
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
Mohamed El Sharnoby
 
Computers and more
Computers and moreComputers and more
Computers and more
manuelestuardo15
 
Cn ppt
Cn  pptCn  ppt

What's hot (18)

Bradley Scholes
Bradley ScholesBradley Scholes
Bradley Scholes
 
Computing Homework 1234
Computing Homework 1234Computing Homework 1234
Computing Homework 1234
 
Computing homework
Computing homeworkComputing homework
Computing homework
 
Computer networking 1
Computer networking 1Computer networking 1
Computer networking 1
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03
 
Client server relation
Client server relationClient server relation
Client server relation
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
Internet
InternetInternet
Internet
 
Computer network
Computer networkComputer network
Computer network
 
Network and programming language
Network and programming languageNetwork and programming language
Network and programming language
 
Common network devices
Common network devicesCommon network devices
Common network devices
 
Computer networks
Computer networksComputer networks
Computer networks
 
Peer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithmsPeer to peer network schemes and finding algorithms
Peer to peer network schemes and finding algorithms
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Cn ppt
Cn  pptCn  ppt
Cn ppt
 

Similar to The Internet

The internet
The internetThe internet
The internet
ami0555
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
HANNAHb12345
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
hannahB123456
 
The internet
The internetThe internet
The internet
heir_of_gondor
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addressesalexb156
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
Sachidananda M H
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
Theon Jum
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra
 
The internet
The internetThe internet
The interneteshell12
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
BOXLIGHT Inc
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th semRenu Thakur
 
The internet
The internetThe internet
The internetraheem07
 
Computer network
Computer networkComputer network
Computer network
ABHINANDAN Lalit
 
internet working process DF.pdf
internet working process DF.pdfinternet working process DF.pdf
internet working process DF.pdf
inoviseo
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
LemuelCondes4
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
Kimmy Chen
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
Chandan Gupta Bhagat
 

Similar to The Internet (20)

The internet
The internetThe internet
The internet
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
The internet
The internetThe internet
The internet
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
The internet
The internetThe internet
The internet
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
ecom notes mca 5th sem
ecom notes mca 5th semecom notes mca 5th sem
ecom notes mca 5th sem
 
The internet
The internetThe internet
The internet
 
Computer network
Computer networkComputer network
Computer network
 
internet working process DF.pdf
internet working process DF.pdfinternet working process DF.pdf
internet working process DF.pdf
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

The Internet

  • 1. The Internet – Packets, Routers & IP Addresses Definition of The Internet… A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols – Google A vast computer network linking smaller computer networks worldwide(usually preceded by the). The Internet includes commercial, educational, governmental, and other networks, all of which use the same set of communications protocols – Dictionary.com
  • 2. Domain Names & IP Addresses What is the relationship between domain names and IP addresses? The domain name system is an internet service that translates domain names to IP addresses. This is one of the crucial services on the internet, it allows users to access the desire website by typing its alpha-numeric name (domain name) in the browser, instead of its real numeric system name (IP address). What is a domain name? Domain name system (DNS) is the most recognisable system for assigning addresses to Internet web servers. The domain name system helps to give every Internet server a memorable and easy-to-spell name. The domain system usually keep the very technical IP address invisible for most users. Eg. Wikipedia.org, About.com What is an IP address? An Internet protocol address (IP address) is a numerical label assigned to each device (Eg. Computer, printer) participating in a computer network that uses the Internet protocol for communication. For simplicity purposes, the IP address is replaced with a domain name so that it is easily recognisable.
  • 3. Data Packets & Package Switching What is a data packet? Definition - A packet is a basic unit of communication over a digital network. A packet is also called a datagram, a segment, a block, a cell or a frame, depending on the protocol. When data has to be transmitted, it is broken down into similar structures of data, which are reassembled to the original data chunk once they reach their destination. What is packet switching? Definition – packet switching describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network.
  • 4. Function of Routers What are routers? A router is a device that transfers data from one network to another, doing so in a very intelligent way. It has the important task of forwarding data packets to their destination via the most efficient route. When a data packet arrives, the router does the following… •Reads the data packet’s destination address •Looks up all the paths it has available to get to that address •Checks on how busy each path is at the moment •Sends the packet along the least congested (therefore fastest) path Routers are also needed to enable computers to connect to the Internet because the Internet is such a vast external network.
  • 5. Useful websites I used… •Dictionary.reference.com •www.ntchosting.com •Netforbeginners.about.com •Wikipedia.org •Voip.about.com •Searchnetworking.techtarget.com •www.teach-ict.com