SlideShare a Scribd company logo
Introduction
Unit 1
By
Deep Raj Bhujel
• Internet:
Compare with WWW
• Intranet:
• Internet Number:
Internet Protocol address (IP address)
Autonomous System (AS) number (ASN)
Internet Assigned Numbers
Authority (IANA)
• IANA is the entity that oversees global IP
address allocation, autonomous system number
allocation, root zone management in the Domain
Name System (DNS), media types, and
other Internet Protocol-related symbols and
numbers.
• IANA is a department operated by the Internet
Corporation for Assigned Names and Numbers,
also known as ICANN (Internet Corporation for
Assigned Names and Numbers).
Request for Comments (RFC)
• IANA is broadly responsible for the allocation
of globally unique names and numbers that
are used in Internet protocols that are
published as RFC documents.
• RFC is a memorandum published by
the Internet Engineering Task Force (IETF)
describing methods, behaviors, research, or
innovations applicable to the working of
the Internet and Internet-connected systems.
Internet Registry (IR):
• Regional Internet registry (RIR)
• National Internet Registry (NIR)
• Local Internet registry (LIR) e.g. ISP
Internet service provider (ISP)
• Access providers ISPs:
• Hosting ISPs:
• Transit ISPs:
• Virtual ISPs:
• Free ISPs:
Internet Domain:
• A domain name is an identification string that
defines a realm of administrative autonomy,
authority, or control on the Internet. Domain
names are formed by the rules and procedures of
the Domain Name System (DNS).
• In general, a domain name represents an Internet
Protocol (IP) resource, such as a personal
computer used to access the Internet, a server
computer hosting a web site, or the web site
itself or any other service communicated via the
Internet.
• top-level domains (TLDs):
generic top-level domains (gTLDs)
country code top-level domains (ccTLDs)
• Structure of domain name:
• Subdomain:
Reserved Domain Names:
• example: reserved for use in examples
• invalid: reserved for use in obviously invalid
domain names
• localhost: reserved to avoid conflict with the
traditional use of localhost as a hostname
• test: reserved for use in tests
Domain Name System (DNS):
• address (A) records,
• Canonical name (CNAME) records,
• name server (NS) records,
• mail exchanger (MX) records,
• Pointer (PTR) records
• Client Lookup:
• Reverse Lookup:
• Domain Name Registrar:
Internet Backbone Networks:
• Optical backbone:
• Fiber-optic communication is a method of transmitting
information from one place to another by sending pulses of
light through an optical fiber. The light forms an
electromagnetic carrier wave that is modulated to carry
information.
• The process of communicating using fiber-optics involves
the following basic steps:
 creating the optical signal involving the use of a transmitter,
 relaying the signal along the fiber, ensuring that the signal does
not become too distorted or weak,
 receiving the optical signal, and converting it into an electrical
signal.
Optical Fiber:
• Due to much lower attenuation and interference, optical
fiber has large advantages over existing copper wire in
long-distance and high-demand applications.
• An optical fiber is a flexible, transparent fiber made of glass
(silica) or plastic, slightly thicker than a human hair. It
functions as a waveguide, or “light pipe”. Optical fibers are
widely used in fiber-optic communications, which permits
transmission over longer distances and at higher
bandwidths (data rates) than other forms of
communication.
• Fibers that support many propagation paths or transverse
modes are called multi-mode fibers (MMF), while those
that only support a single mode are called single-mode
fibers (SMF).
Marine Cables:
• A submarine communications cable is a cable laid on
the sea bed between land-based stations to carry
telecommunication signals across stretches of ocean.
• Modern cables are typically 69 millimetres (2.7 in) in
diameter and weigh around 10 kilograms per metre (7
lb/ft), although thinner and lighter cables are used for
deep-water sections.
• Also, the total carrying capacity of submarine cables is
in the terabits per second, while satellites typically
offer only megabits per second and display higher
latency.
1. Polyethylene
2. "Mylar" tape
3. Stranded metal (steel) wires
4. Aluminum water barrier
5. Polycarbonate
6. Copper or aluminum tube
7. Petroleum jelly
8. Optical fibers
Teleports:
• Teleports are the ground-based side of the
global satellite network – gateways that
provide terrestrial networks with access to
orbiting satellite transponders.
• But they are more than simple gateways.
• Teleports bridge incompatible systems and
protocols, host and distribute content, and act
as the hubs of broadband B2B networks.
Satellite Links:
• A satellite link is a communications subsystem
that involves a link between a transmitting
Earth station and a receiving Earth station via
a communications satellite.
The Satellite:
The Ground Station:
Communications satellites
Advantages
• Flexibility:
• Mobility:
• Speedy deployment:
• Coverage over the globe:
Disadvantages
• Cost:
• Propagation delay:
• Specialised satellite terminals required:
Q. GEO VS LEO
Terrestrial Link:
• A communications line that travels on, near or
below ground is terrestrial link.

More Related Content

What's hot

Application layer
Application layerApplication layer
Application layer
SakthiVinoth78
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
WILLA REYES
 
Digital data communications
Digital data communicationsDigital data communications
Digital data communications
Prof. Dr. K. Adisesha
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
Aman Jaiswal
 
Lan basic
Lan basicLan basic
Lan basic
Online
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
Soumyakatkam
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
Albert Abbosey
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Online
 
Global state routing
Global state routingGlobal state routing
Global state routing
Tata Consultancy Service Limited
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
Chandan Gupta Bhagat
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Naruin
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2ekul
 
Types of network(by abk)
Types of network(by abk)Types of network(by abk)
Types of network(by abk)
kunalkevin yadav
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
Computer Network
Computer NetworkComputer Network
Computer Network
JahnaviBhagat
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
ShofiqulIslam38
 

What's hot (20)

Application layer
Application layerApplication layer
Application layer
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Digital data communications
Digital data communicationsDigital data communications
Digital data communications
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
Lan basic
Lan basicLan basic
Lan basic
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Types of network(by abk)
Types of network(by abk)Types of network(by abk)
Types of network(by abk)
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 

Similar to Unit 1 - Introduction - IT

Networking lesson
Networking lessonNetworking lesson
Networking lesson
madusanka00
 
Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Sour Summer
 
UNIT 1: Internet Technology T
UNIT 1: Internet Technology TUNIT 1: Internet Technology T
UNIT 1: Internet Technology T
Sujit Jha
 
Lecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.pptLecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.ppt
HamzaIqbal900476
 
Network-Internet
Network-InternetNetwork-Internet
Network-Internet
JunaidRamzan4
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
FaltuJiii
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
sunilcomputer
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Model
jeronimored
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
UnitechComputers2
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
Kabindra Koirala
 
Network-Internet and network topology.ppt
Network-Internet and network topology.pptNetwork-Internet and network topology.ppt
Network-Internet and network topology.ppt
oyebanjibenedict
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
ssuserc8c26a
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
CS Knowledge
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
sravya reddy
 
fundamental of networking course, LAN,WAN,TCP,IP
fundamental of networking course, LAN,WAN,TCP,IPfundamental of networking course, LAN,WAN,TCP,IP
fundamental of networking course, LAN,WAN,TCP,IP
HusseinAwil
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
vish21ainds
 
IP ADDRESSING.pptx
IP ADDRESSING.pptxIP ADDRESSING.pptx
IP ADDRESSING.pptx
ShardulGosawi
 
Communication and network concepts
Communication and network conceptsCommunication and network concepts
Communication and network concepts
Mohnish Sahu
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
KavinD11
 
Network in brief
Network in briefNetwork in brief
Network in brief
Himant Prasansu
 

Similar to Unit 1 - Introduction - IT (20)

Networking lesson
Networking lessonNetworking lesson
Networking lesson
 
Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01
 
UNIT 1: Internet Technology T
UNIT 1: Internet Technology TUNIT 1: Internet Technology T
UNIT 1: Internet Technology T
 
Lecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.pptLecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.ppt
 
Network-Internet
Network-InternetNetwork-Internet
Network-Internet
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
 
TelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom ModelTelecommunicationsThe Internet Basic Telecom Model
TelecommunicationsThe Internet Basic Telecom Model
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
 
Network-Internet and network topology.ppt
Network-Internet and network topology.pptNetwork-Internet and network topology.ppt
Network-Internet and network topology.ppt
 
Network-Internet.ppt
Network-Internet.pptNetwork-Internet.ppt
Network-Internet.ppt
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
fundamental of networking course, LAN,WAN,TCP,IP
fundamental of networking course, LAN,WAN,TCP,IPfundamental of networking course, LAN,WAN,TCP,IP
fundamental of networking course, LAN,WAN,TCP,IP
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
 
IP ADDRESSING.pptx
IP ADDRESSING.pptxIP ADDRESSING.pptx
IP ADDRESSING.pptx
 
Communication and network concepts
Communication and network conceptsCommunication and network concepts
Communication and network concepts
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Network in brief
Network in briefNetwork in brief
Network in brief
 

More from Deepraj Bhujel

Unit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITUnit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - IT
Deepraj Bhujel
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - IT
Deepraj Bhujel
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
Deepraj Bhujel
 
Unit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - ITUnit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - IT
Deepraj Bhujel
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
Deepraj Bhujel
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - IT
Deepraj Bhujel
 
IPv6
IPv6IPv6

More from Deepraj Bhujel (7)

Unit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITUnit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - IT
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - IT
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
Unit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - ITUnit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - IT
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Unit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - ITUnit 2 - Internet Protocol Overview - IT
Unit 2 - Internet Protocol Overview - IT
 
IPv6
IPv6IPv6
IPv6
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Unit 1 - Introduction - IT

  • 2. • Internet: Compare with WWW • Intranet: • Internet Number: Internet Protocol address (IP address) Autonomous System (AS) number (ASN)
  • 3. Internet Assigned Numbers Authority (IANA) • IANA is the entity that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Internet Protocol-related symbols and numbers. • IANA is a department operated by the Internet Corporation for Assigned Names and Numbers, also known as ICANN (Internet Corporation for Assigned Names and Numbers).
  • 4. Request for Comments (RFC) • IANA is broadly responsible for the allocation of globally unique names and numbers that are used in Internet protocols that are published as RFC documents. • RFC is a memorandum published by the Internet Engineering Task Force (IETF) describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.
  • 5. Internet Registry (IR): • Regional Internet registry (RIR) • National Internet Registry (NIR) • Local Internet registry (LIR) e.g. ISP
  • 6. Internet service provider (ISP) • Access providers ISPs: • Hosting ISPs: • Transit ISPs: • Virtual ISPs: • Free ISPs:
  • 7. Internet Domain: • A domain name is an identification string that defines a realm of administrative autonomy, authority, or control on the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS). • In general, a domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet.
  • 8. • top-level domains (TLDs): generic top-level domains (gTLDs) country code top-level domains (ccTLDs) • Structure of domain name: • Subdomain:
  • 9. Reserved Domain Names: • example: reserved for use in examples • invalid: reserved for use in obviously invalid domain names • localhost: reserved to avoid conflict with the traditional use of localhost as a hostname • test: reserved for use in tests
  • 10. Domain Name System (DNS): • address (A) records, • Canonical name (CNAME) records, • name server (NS) records, • mail exchanger (MX) records, • Pointer (PTR) records
  • 11. • Client Lookup: • Reverse Lookup: • Domain Name Registrar:
  • 12. Internet Backbone Networks: • Optical backbone: • Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. • The process of communicating using fiber-optics involves the following basic steps:  creating the optical signal involving the use of a transmitter,  relaying the signal along the fiber, ensuring that the signal does not become too distorted or weak,  receiving the optical signal, and converting it into an electrical signal.
  • 13. Optical Fiber: • Due to much lower attenuation and interference, optical fiber has large advantages over existing copper wire in long-distance and high-demand applications. • An optical fiber is a flexible, transparent fiber made of glass (silica) or plastic, slightly thicker than a human hair. It functions as a waveguide, or “light pipe”. Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communication. • Fibers that support many propagation paths or transverse modes are called multi-mode fibers (MMF), while those that only support a single mode are called single-mode fibers (SMF).
  • 14. Marine Cables: • A submarine communications cable is a cable laid on the sea bed between land-based stations to carry telecommunication signals across stretches of ocean. • Modern cables are typically 69 millimetres (2.7 in) in diameter and weigh around 10 kilograms per metre (7 lb/ft), although thinner and lighter cables are used for deep-water sections. • Also, the total carrying capacity of submarine cables is in the terabits per second, while satellites typically offer only megabits per second and display higher latency.
  • 15. 1. Polyethylene 2. "Mylar" tape 3. Stranded metal (steel) wires 4. Aluminum water barrier 5. Polycarbonate 6. Copper or aluminum tube 7. Petroleum jelly 8. Optical fibers
  • 16. Teleports: • Teleports are the ground-based side of the global satellite network – gateways that provide terrestrial networks with access to orbiting satellite transponders. • But they are more than simple gateways. • Teleports bridge incompatible systems and protocols, host and distribute content, and act as the hubs of broadband B2B networks.
  • 17. Satellite Links: • A satellite link is a communications subsystem that involves a link between a transmitting Earth station and a receiving Earth station via a communications satellite. The Satellite: The Ground Station:
  • 18. Communications satellites Advantages • Flexibility: • Mobility: • Speedy deployment: • Coverage over the globe: Disadvantages • Cost: • Propagation delay: • Specialised satellite terminals required: Q. GEO VS LEO
  • 19. Terrestrial Link: • A communications line that travels on, near or below ground is terrestrial link.