Professional Documents
Culture Documents
1
• It offers access to data, graphics, sound,
2
The Internet carries messages,
documents, programs and data files that
contain every kind of information for
businesses, educational institutions,
government agencies and individuals.
The Internet has made things simple. It
can be used for following:
INTERNET 1. Direct Communications
2. Online shopping
3. Distance Education (e-learning)
4. Banking
5. Knowledge Base
6. Travel
7. Bill Payments….etc.
3
The Internet has its root in the
ARPANET system of the Advance
Research Project Agency of the U.S.
Department of Defense. ARPANET
was the first WAN and had only four
sites in 1969. The internet evolved
from basic ideas of ARPANET for
interconnecting computers and was
HISTORY AND
used by research organizations and
EVOLUTION universities initially to share and
exchange information. In 1989, the
U.S. Government lifted restrictions
on use of the Internet and allowed it
to be used for commercial purpose as
well, then the internet has grown
rapidly to become the world’s largest
network.
4
YEAR WISE
DEVELOPMENT
1960 – US Department of Defense created a
network ARPANET (Advance Research Projects
Agency Network) to link US scientific and
academic researchers.
The Root of the internet began with an
experimental project called ARPANET.
The objective of ARPANET project to create a
computer network that would allow researchers
located in different places to communicate with
each other.
In 1969, ARPANET was the first WAN and had
only four computer.
1970 - ARPA developed a new protocol TCP/IP
for transferring data between networks.
5
1980 - National Science Foundation
(NSF) used ARPANET to connect 5
regional supercomputers centres at major
universities so users could share their
work.
Hundreds of college and university
YEAR WISE networks were connected to ARPANET.
DEVELOPMENT Students were granted access to
ARPANET.
In 1989, ARPANET evolved to Internet.
6
Nobody owns the Internet.
7
Internet Society (ISOC)
Critical mission is to work for Internet
development, evolution, use and benefit the
people around the world. ISOC primarily
addresses three issues:
1. Public policy : The frame policy
regarding copyright, privacy access
INTERNET and censorship.
GOVERNANCE 2. Education and Training : In order
to improve Internet infrastructure in
developing countries, ISOC delivers
education and training program.
3. Maintaining Standard : ISOC
works typically for development and
maintaining of Internet Standards.
8
Internet Architecture Board (IAB) –
concerned oversight of the architecture of
the Internet.
Internet Engineering Task Force
(IETF) – provides technical and other
contributions to the engineering and
evolution of Internet.
INTERNET Internet Engineering Steering
GOVERNANCE Group(IESG) – responsible in
administrating the rules and procedure
laid down by ISOC. It is primarily
responsible for technical management of
IETF activities and processing the
Internet standards.
Internet Network Information Center
(InterNIC) – domain name registration.
9
Internet Research Task Force (IRTF) –
10
INTERNET,
INTRANET AND
EXTRANET
Intranet
Private and secure internal information
system which uses Internet technology to
collect and disseminate information of
interest to all staff.
An intranet is a LAN or WAN that uses
TCP/IP protocols but belong exclusively
to a corporation, school, or organization.
The intranet is accessible only to the
organization’s workers. If the intranet is
connected to the internet, then it is
secured by a firewall to prevent
unauthorized users from gaining access to
it.
11
BASIS OF COMPARISON INTERNET INTRANET EXTRANET
Extranet is a means of
Intranet is a means of sharing
Internet is a means of sharing conveying information
sensitive or confidential
Purpose information throughout the between members of the
information throughout the
world. organization and external
organization.
members.
12
It is not regulated by any It is regulated by a specific It is regulated by multiple
Regulation
authority. organization. organizations.
Ownership of extranet is by a
Internet has no known Ownership of intranet is by a
Ownership single or multiple
ownership. single organization.
organizations.
13
Internet contains different
Intranet contains only specific Extranet contains only specific
Information source of information and is
group information. group information.
available for all.
Web
Web
browser
browser
15
Internet Vs Intranet
Internet Intranet
• Public Network • Private Network
• External websites • Internal websites
• E-Commerce • Commutation & Information access
• Insecure • Secure
• TCP/IP • TCP/IP
• Limited management • Managed
• Accessible to all • Accessible to authorized users only
• Speed – Slower • Speed – Faster
• Bandwidth – More • Bandwidth – Less
• Not owned by anyone • Owned by the Company
• Used by general public • Used by employees
• Information : general • Information: specific to company
16
Extranet
An extranet is an intranet that can
be accessed by outside users over
the Internet. To gain entrance to
the extranet’s resources, an
external user typically must log on
to the network by providing a valid
user ID and password.
Extranets are usually accessed via
Internet, and can be used to
provide customers and business
partners with access to the data
they need.
17
THREE MYTHS
ABOUT
INTERNET
the Internet
18
MYTHS 1 : THE
INTERNET IS FREE
19
The growing trend of subscription or per-
20
MYTHS 2 : SOME CONTROLS THE
INTERNET
onto law – let alone getting it enforced. Making government control even
harder is the “bombproof” design of the internet itself. If a government tries
to block access to or from a specific country.
21
MYTHS 3 : THE
INTERNET AND
WORLD WIDE WEB
ARE IDENTICAL
Since you can now use a Web browser to
access most of the Internet resources,
many people think the Internet and the
Web are same thing. Although everyday
many people use the term Internet and web
interchangeably, they are not the same
thing.
Technically Internet is the physical
network, and the Web is the collection if
Web pages accessible over the Internet.
22
Client Server Technology
technology.
information
25
Client
Applications that run on
computers
Client Required a Software Web
Browser to open any web Pages.
Rely on servers for
Files
Devices
Processing power
Example: E-mail client
An application that enables you
to send and receive e-mail
26
ADDRESSING SCHEMES – IP
ADDRESSES AND
DOMAIN NAME SYSTEM
DNS
27
IP ADDRESS
An IP address is the identifier that enables your device to send or
receive data packets across the internet. It holds information related to
your location and therefore making devices available for two-way
communication. The internet requires a process to distinguish between
different networks, routers, and websites. Therefore, IP addresses
provide the mechanism of doing so, and it forms an indispensable part
in the working of the internet. You will notice that most of the IP
addresses are essentially numerical. Still, as the world is witnessing a
colossal growth of network users, the network developers had to add
letters and some addresses as internet usage grows.
An IP address is represented by a series of numbers segregated by
periods(.). They are expressed in the form of four pairs - an example
address might be 255.255.255.255 wherein each set can range from 0 to
255.
28
DOMAIN NAME
SYSTEM
Worldwide system of distributed databases of
names and addresses of computers connected
to Internet.
DNS names are constructed in a hierarchical
naming fashion.
The names of the domain describe
organizational or geographical relations.
Every computer on the Internet can have both
a domain name (Virtual Domain) and an IP
address.
DNS addresses have two parts : a host name
followed by a domain that generally identifies
the type of institution that uses the address.
ibm.com, amity.edu, songs.pk
29
There are two types of domains –
Geographic Domains and Non-
Geographic Domains
30
Geographic Domains
• .au – Australia
• .ca – Canada
DOMAIN NAME • .fr - France
31
Some large institutions and
corporations divide their domain
addresses into smaller subdomains.
amity.asb.edu
InterNIC.
32
Each webpage has a unique address, called a
Uniform Resource Locator (URL) that identifies its
location on the Internet.
URL
http://www.rediffmail.com/index.html
(UNIFORM
Protocol : http (Hypertext Transfer Protocol)
RESOURCE
Host Computer Name : www (world wide web) LOCATOR)
34
Every single document on the web page has its own unique
URL.
Type the URL in the address box of the browser and the
browser is directed to the document’s location.
35
The Internet works because
every computer connected to it
uses the same set of rules and
procedures – Protocols
Internet
These protocols control timing
Protocols
and data format
Internet uses TCP/IP –
Transmission Control Protocol /
Internet Protocol
36
TCP
TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is a
set of conventions or rules and methods that are used to interconnect network
devices on the Internet.
The internet protocol suite is commonly known as TCP/IP, as the foundational
protocols in the suite are Transmission Control Protocol and Internet Protocol.
It chooses how the information will be traded over the web through end-to-end
communications that incorporate how the information ought to be organized
into bundles (bundles of data), addressed, sent, and received at the goal.
This communication protocol can also be utilized to interconnect organize
devices in a private network such as an intranet or an extranet.
37
Characteristics of TCP/IP:
• Share Data Transfer: The TCP allows applications to create channels of
communications across a network. It also permits a message to be separated into
smaller packets before they are transmitted over the web and after that collected in
the right order at the destination address. So, it guarantees the solid transmission of
data across the channel.
• Internet Protocol: The IP address tells the packets the address and route so that they
reach the proper destination. It includes a strategy that empowers portal computers on
the internet-connected to arrange forward the message after checking the IP address.
• Reliability: The most vital feature of TCP is solid data delivery. In arrange to supply
unwavering quality, TCP must recover information that’s harmed, misplaced, copied,
or conveyed out of arranging by the Arrange Layer.
• Multiplexing: Multiplexing can be achieved through the number of ports.
• Connections: Before application forms can send information by utilizing TCP, the
devices must set up a connection. The associations are made between the harbor
numbers of the sender and the collector devices.
38
TCP
TCP
TCP stands for Transmission Control Protocol. It is a transport layer
protocol that facilitates the transmission of packets from source to
destination. It is a connection-oriented protocol that means it establishes the
connection prior to the communication that occurs between the computing
devices in a network. This protocol is used with an IP protocol, so together,
they are referred to as a TCP/IP.
The main functionality of the TCP is to take the data from the application
layer. Then it divides the data into a several packets, provides numbering to
these packets, and finally transmits these packets to the destination. The
TCP, on the other side, will reassemble the packets and transmits them to
the application layer. As we know that TCP is a connection-oriented
protocol, so the connection will remain established until the communication
is not completed between the sender and the receiver.
39
TCP/IP
connecting dissimilar
systems.
TCP/IP suite consists of 2
41
IP
Here, IP stands for internet protocol. It is a protocol defined in the
TCP/IP model used for sending the packets from source to destination.
The main task of IP is to deliver the packets from source to the
destination based on the IP addresses available in the packet headers. IP
defines the packet structure that hides the data which is to be delivered
as well as the addressing method that labels the datagram with a source
and destination information.
An IP protocol provides the connectionless service, which is
accompanied by two transport protocols, i.e., TCP/IP and UDP/IP, so
internet protocol is also known as TCP/IP or UDP/IP.
The first version of IP (Internet Protocol) was IPv4. After IPv4, IPv6
came into the market, which has been increasingly used on the public
internet since 2006.
42
SMTP (Simple Mail Transfer Protocol) – It
is a TCP/IP protocol for sending message from
one computer to another computer on a
network. This protocol is used on the Internet
to route e-mail.
HTTP (Hypertext Transfer Protocol) – The
protocol is used to carry requests from a
browser to a Web Server and to transport
pages from Web Servers back to the requesting
browser.
FTP (File Transfer Protocol) – It is a fast
application level protocol widely used for
copying files to and from remote computer
system on a network using TCP/IP, such as the
Internet.
TELNET - protocol for connecting a local
computer to a remote computer
43
INTERNET
SERVICES
Internet Service Provider (ISP)
44
INTERNET SERVICES
Internet Services means the service provided to you
by us using digital or analogue technology to
enable you to gain access to the Internet and certain
services, whether by means of a television, personal
computer or otherwise.
Internet Services allows us to access huge amount of
information such as text, graphics, sound and software
over the internet. Following diagram shows the four
different categories of Internet Services.
45
INTERNET SERVICE
PROVIDER
An ISP, also called Internet access provider, or IAP is a organization
that provides the required software, to connect to the Internet. For a
monthly fee, the ISP provides the user software package, username,
password and access phone number. Equipped with a modem, the user can
then log on to the Internet and browse the web.
The ISP connects to its customers using different kind of connection such
as dial-up, DSL or dedicated high-speed interconnects.
The pricing and services available through two ISPs may differ somewhat.
For e.g. some ISPs may provide you with an connection to internet only
but some may give other services also like virus protection, spam filtering.
46
ICP stands for Internet Content Provider. Website owners
should apply for an ICP Licence, otherwise the Chinese
Ministry of Information Industry( MII ) would not consider
your website as a legal one. The ICP license is just like an
online business license from Chinese government.
47
An Application Service Provider or ASP provides
"applications" as a service - specifically, software
and services having to do with the information
technology requirements of companies and
individuals. The service offered by Application
Service Providers may include processing credit card
payments, providing customer relations management
APPLICATION (CRM) services to businesses, or customized
applications.
SERVICE The operational concept is straightforward - a
service provider identifies a function or activity that
PROVIDER is common to a number of companies. The
Application Service Provider then offers the service
to its identified market for a fixed fee, in effect
removing the personnel, equipment and logistical
challenges inherent if each company is going to set
up its own system.
48
It refers to an Interconnected system of
Computers all over the world that store
information in multimedia form.
Newsgroups
Chat
50
ELECTRONIC MAIL (E-
MAIL)
It refers to exchange of text messages and
computer files over a communication network
such as LAN or Internet.
Internet provides basics communication services to
its user in any part of world by e-mail facility.
It allows messages, may be in text, audio, video or
combination of all, accessed by multiple users,
delivered exclusively on computer network.
The primary advantages of e-mail are :
Paperless Communication, Coping Messages,
Printing of Message, Public Bulletin Boards,
Faxes and Meetings, Forwarding the messages,
Transfer of Data/Files, Address Book,
Composing Message, etc.
51
The Usenet of just Newsgroup service of the
Internet allows a group of users to focus on a
topic of their interest by exchanging their
information.
53
It provides the facilities to transfer files
between machines over the Internet.
55
VOICE OVER INTERNET
PROTOCOL
Voice over IP is a general term for a family of
methodologies, communication protocols, and transmission
technologies for delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks,
such as the Internet.
56
CHAT
Chat Programs allows Internet users
to send and receive messages
instantly free of cost. For this, it is
necessary for people to establish the
connection in the same channel for
communication.
In chat program the user receives
message on the screen, even when
sender of the message is in the
middle of typing. Two major types
chat programs exist :
Webchat
Internet Relay Chat
57
INTERNET - ADVANTAGES
Employment Knowledge
High Speed 24*7
Opportunities Reservoir
Direct contacts
Interactive Business on the between
Non biased
Communication Internet customers and
organisations
Reduction of Source of
Cost Effective
Uncertainty Entertainment
58
Internet Crime
Virus attacks
DISADVANTAGES Pornography
Physical Ailments
59
There are many important societal issues
E-mail Privacy
60
CENSORSHIP
The control or suppression of what can be accessed, published, or
viewed on the Internet. It may be carried out by governments or by
private organizations at the behest of government, regulators, or on
their own initiative. Individuals and organizations may engage in self-
censorship for moral, religious, or business reasons, to conform to
societal norms, due to intimidation, or out of fear of legal or other
consequence.
• FORMS of CENSORSHIPPreventive (exercised before the
expression is made public)
• Prior restraint by government
• Licensing
• Self-censorship
61
The First Amendment to the U.S. Constitution
guarantees a citizen’s right to free speech. This
protection allows people to say or show things to
others without fear of arrest. People must observe
some limits to free speech, of course, such as the
prohibition of obscenity over the public and of child
pornography.
CENSORSHIP But How does the right to free speech relate to alleged
patently offensive or indecent materials available over
the Internet, where they might be observed by children
and the public at large? There have been some
attempts at Internet Content Regulation – What some
would view as censorship – in resent years, but the
courts have had difficulty defining what is “patently
offensive” and “indecent” as well as finding the fair
balance between protection and censorship.
62
WEB BROWSING PRIVACY
Privacy, as it relates to the Internet, encompasses what information
the privacy of where they go and what they do at web sites. You might
wonder :
Does any one keep track of which Web sites I visits
63
Private browsing is a feature that major web browsers offer to help keep
your temporary browsing data private. When using a private browser, such
as incognito mode, your browsing history, search records, and cookies
aren’t retained. Private browsing allows users to surf the internet
without the browser collecting history. This is helpful if a survivor is
concerned that someone may be monitoring their internet activity by going
through the browser history.
Private browsing essentially removes any tracking of user's Web
activities from the local machine, and by extension, the website
that the user is visiting. The best example is the use, or rather
disuse of cookies, that are used by websites to track user
activities and store data. For example, this is used by websites
such as Amazon to know a user's previously browsed products
and keep a user logged in to the site even after the browser has
been closed and the computer turned off.
64
E-MAIL
PRIVACY
Many people mistakenly believe that the e-
mail they send and receive is private and
will never be read by anyone other than the
intended recipient. Since it is transmitted
over public media, however, only encrypted
e-mail can be transmitted safely.
Unlikely to happen to your personal e-mail,
non-encrypted email can be intercepted and
read by someone else. Consequently, from a
privacy standpoint, a non-encrypted e-mail
message should be viewed more like a
postcard than a letter.
65
66
THANK
YOU