0% found this document useful (0 votes)
26 views22 pages

Computer 4

Uploaded by

Anik Karmakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views22 pages

Computer 4

Uploaded by

Anik Karmakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

The Internet, Intranets,

Extranets and some other issues


The Internet
 The internet
 A network of networks
 The internet transmits data from one computer (called a
host) to another
 Internet networks
 Linked networks that work much the same
way -- they pass data around in packets, each
of which carries the addresses of its sender and
receiver
Internet Discussion
 A global network connecting millions of computers. As of
1999, the Internet has more than 200 million users
worldwide, and that number is growing rapidly. More than
100 countries are linked into exchanges of data, news and
opinions.
 Unlike online services, which are centrally controlled, the
Internet is decentralized by design. Each Internet computer,
called a host, is independent. Its operators can choose which
Internet services to use and which local services to make
available to the global Internet community. Remarkably, this
anarchy by design works exceedingly well.
How the Internet Works
 Transport control protocol (TCP): A protocol that
operates at the transport layer and is used in combination
with IP by most Internet applications
 Backbone: An Internet high-speed, long distance
communications links (like a bus; wire that connects nodes)
 Uniform resource locator (URL): An assigned address
on the Internet for each computer. E.g.,
http://www.facebook.com
Access to the Internet
 LAN servers: Local servers can provide access to the
Internet through normal connections (e.g., Ethernet)
 Serial line internet protocol (SLIP) and Point-to-
point protocol (PPP): Communications protocol software
that transmits packets over telephone lines, allowing dial-up
access to the Internet
 Connection via an on-line service: Examples are
America Online and Microsoft Network. These services
usually require sign-up procedures
Internet Service Providers (ISP)
 Any company that provides individuals or companies with access
to the Internet
 Thousands of providers including large communications
companies
 Need an account with the ISP and software that links with TCP/IP
 Internet Services: E-mail, Telnet, Usenet and newsgroups, Chat
rooms, Internet phone, Internet videoconferencing, Content
streaming etc.
 Internet telephony: Also called voice-over-IP (VOIP):
Technology that enables network managers to route phone calls
and fax transmissions over the same network they use for data
Intranet
 An internal corporate network built using Internet and World
Wide Web standards and products that allows employees of an
organization to gain access to corporate information
 A network based on TCP/IP protocols (an internet) belonging to
an organization, usually a corporation, accessible only by the
organization's members, employees, or others with authorization.
An intranet's Web sites look and act just like any other Web sites,
but the firewall surrounding an intranet fends off unauthorized
access. Like the Internet itself, intranets are used to share
information. Secure intranets are now the fastest-growing segment
of the Internet because they are much less expensive to build and
manage than private networks based on proprietary protocols.
Extranet
 A network based on Web technologies that links selected
resources of the intranet of a company with its customers,
suppliers, or other business partners.
 A new buzzword that refers to an intranet that is partially
accessible to authorized outsiders. Whereas an intranet
resides behind a firewall and is accessible only to people who
are members of the same company or organization, an
extranet provides various levels of accessibility to outsiders.
You can access an extranet only if you have a valid username
and password, and your identity determines which parts of
the extranet you can view.
Privacy & Security
 Cryptography: The process of converting a message into a
secret code and changing the encoded message back to
regular text
 Encryption: The original conversion of a message into a
secret code
 Digital Signature: An encryption technique used for online
financial transactions
Firewalls
 Firewalls: A method of preventing unauthorized access
between a company’s computers and the Internet (looks at
the header of a packet).
 A system designed to prevent unauthorized access to or from
a private network. Firewalls can be implemented in both
hardware and software, or a combination of both. Firewalls
are frequently used to prevent unauthorized Internet users
from accessing private networks connected to the Internet,
especially intranets. All messages entering or leaving the
intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified
security criteria.
Assured Pipeline
 Assured pipeline: An Internet security method that looks at
the entire request for data and then determines whether the
request is valid
Firewall Techniques
 There are several types of firewall techniques:
 Packet filter: Looks at each packet entering or leaving the network
and accepts or rejects it based on user-defined rules. Packet filtering is
fairly effective and transparent to users, but it is difficult to configure. In
addition, it is susceptible to IP spoofing.
 Application gateway: Applies security mechanisms to specific
applications, such as FTP and Telnet servers. This is very effective, but
can impose a performance degradation.
 Circuit-level gateway: Applies security mechanisms when a TCP or
UDP connection is established. Once the connection has been made,
packets can flow between the hosts without further checking.
 Proxy server: Intercepts all messages entering and leaving the
network. The proxy server effectively hides the true network addresses.
Artificial Neural Networks (ANN): Why?
 Our world is full of data. After collection and organization,
data, if we are lucky, becomes information. In today's
interconnected world, information exists in electronic form
that can be stored and transmitted instantly. Challenge is to
understand, integrate, and apply information to generate
useful knowledge (“actionable intelligence”): Deep blue
Enter New Breed of Processor: Artificial Neural
Networks
 Instead of programming computational system to do specific tasks,
teach system how to perform task
 To do this, generate Artificial Intelligence System- AI
 Empirical model which can rapidly and accurately find the
patterns buried in data that reflect useful knowledge
 One case of these AI models is neural networks
 AI systems must be adaptive – able to learn from data on a
continuous basis
 Used for: Mathematical Modeling (Function Approximation),
Classification, Clustering, Forecasting, Vector Quantization,
Pattern Association, Control and Optimization
Graphics
Computer graphics: generating 2D images of a 3D
world represented in a computer.
Main tasks:
 modeling: (shape) creating and representing the
geometry of objects in the 3D world
 rendering: (light, perspective) generating 2D images
of the objects
 animation: (movement) describing how objects
change in time
Why Study Computer Graphics?
Graphics is cool
 I like to see what I’m doing
 I like to show people what I’m doing
Graphics is interesting
 Involves simulation, AI, algorithms, architecture…
I’ll never get an Oscar for my acting
 But maybe I’ll get one for my CG special effects
Graphics is fun
Software Piracy
 Creating a copy and/or selling it. This is the act that
some people refer to as "software piracy". This is copyright
violation in most countries and is unlikely to be fair use
or fair dealing if the work remains commercially
available. In some countries the laws may allow the
selling of a version modified for use by blind people,
students (for educational product) or similar. Differences
in legislation may also make the copyright void in some
jurisdictions, but not the others.
Types of Piracy
 Industrial piracy:
 An individual or group attempts duplication and distribution on
a large scale for profit.
 Corporate piracy:
 Unprotected contents are shared through networks such as
peer-to-peer, LAN and Internet.
 Reseller piracy:
 Involves computer hardware companies selling machines with
illegal copies of software preloaded on their hard drive.
 Home piracy:
 Ranges from trading disks with friends to running a not-for-
profit bulletin board for the purpose of illegal software
distribution.
Universal Serial Bus (USB)
 A representative peripheral interface
 Universal Serial Bus (USB) provides a serial bus
standard for connecting devices, usually to a computer,
but it also is in use on other devices such as set-top boxes,
game consoles and PDAs. (wikipedia.org)
 USB is a likely solution any time you want to use a
computer to communicate with devices outside the
computer
 The interface is suitable for one-of-kind and small-scale
designs as well as mass-produced, standard peripheral
types
Thanks!!!

You might also like