0% found this document useful (0 votes)
162 views47 pages

What Is Internet ?: Linked by Copper Wires, Wireless Connections, and Other

The document provides an overview of what the Internet is and how it works. It can be summarized as follows: 1) The Internet is a global network of interconnected computers and networks that allows for the exchange of information. It connects millions of private, public, business, academic and government networks around the world. 2) A variety of hardware and software are used to enable connectivity to the Internet, including modems, computers, communication software, and client software. 3) The Internet functions through protocols like TCP and IP that allow data to be broken into packets and transmitted over connected networks and backbones to their destinations.

Uploaded by

Jasmeet Bagga
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views47 pages

What Is Internet ?: Linked by Copper Wires, Wireless Connections, and Other

The document provides an overview of what the Internet is and how it works. It can be summarized as follows: 1) The Internet is a global network of interconnected computers and networks that allows for the exchange of information. It connects millions of private, public, business, academic and government networks around the world. 2) A variety of hardware and software are used to enable connectivity to the Internet, including modems, computers, communication software, and client software. 3) The Internet functions through protocols like TCP and IP that allow data to be broken into packets and transmitted over connected networks and backbones to their destinations.

Uploaded by

Jasmeet Bagga
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

What is Internet ?

• It is a Global network of computers,


(servers or clients).

to exchange information.

• It is a "network of networks" that includes millions of


private and public, academic, business, and government
networks (local or Global),
linked by copper wires, wireless connections, and other
technologies.
Hardware and Software of Internet

Variety of hardware and software are used to make


Internet functional.

• Modem
Device that enables computers to communicate
through phone lines.
When we start internet the our modem communicates
to modem of ISP.
Continued…
• Computer
In addition to a modem, you need a client capable of
handling multiple data types.
• Software
Two types of software’s required to enable your PC as an
Internet PC.
• Communication software to establish connection
• Client software for browsing, e-mail, news.

these software’s are provided with windows itself.


Internet networks
Linked networks that work much the
same way -- they pass data around in
packets, each of which carries the
addresses of its sender and receiver
How the Internet Works
• Transport control protocol (TCP)
– A protocol that operates at the transport layer and is used
in combination with IP by most Internet applications
• Backbone
– An Internet high-speed, long distance communications
links (like a bus; wire that connects nodes)
• Uniform resource locator (URL)
– An assigned address on the Internet for each computer
– E.g., http://www.yorku.ca/
Domain Affiliations
Domain Affiliations
arts cultural and entertainment activities
com business organizations
edu educational sites
firm businesses and firms
gov government sites
info information service providers
mil military sites
nom individuals
net networking organizations
org organizations
rec recreational activities
store businesses offering goods for purchase
web entities related to World Wide Web activities
net networking organizations
Access to the Internet
• LAN servers
• Local servers can provide access to the Internet through normal
connections (e.g., Ethernet)
• Serial line internet protocol (SLIP) and
Point-to-point protocol (PPP)
• Communications protocol software that transmits packets over
telephone lines, allowing dial-up access to the Internet
• Connection via an on-line service
• Examples are America Online and Microsoft Network. These
services usually require sign-up procedures
Three Ways to Access the
Internet

Schematic
Internet Service Providers
• Internet service provider (ISP)
– Any company that provides individuals or
companies with access to the Internet
– Thousands of providers including large
communications companies
– Need an account with the ISP and software that
links with TCP/IP
ISP Examples
Internet Service Provider Web Address
AT&T WorldNet Service www.att.com
Digex, Inc. www.digex.net
GTE Internetworking www.gte.net
IBM Internet Connection www.ibm.net
MCI Internet www.mci2000.com
NetCom On-Line Communication www.netcom.com
Services
PSINet, Inc. www.psinet.com
Sprint Internet Services www.sprint.net
Uunet Technologies, Inc. www.us.uu.net
Internet Services
– E-mail
– Telnet
– FTP
– Usenet and newsgroups
– Chat rooms
– Internet phone
– Internet videoconferencing
– Content streaming
Internet Services
• Internet telephony
– Also called voice-over-IP (VOIP)
• Technology that enables network managers to route
phone calls and fax transmissions over the same
network they use for data
VOIP ‘Discussion’
Internet telephony is a category of hardware and software that
enables people to use the Internet as the transmission medium for
telephone calls. For users who have free, or fixed-price, Internet
access, Internet telephony software essentially provides free
telephone calls anywhere in the world. To date, however, Internet
telephony does not offer the same quality of telephone service as
direct telephone connections.
There are many Internet telephony applications available. Some,
like CoolTalk and NetMeeting, come bundled with popular Web
browsers. Others are stand-alone products. Internet telephony
products are sometimes called IP telephony, Voice over the
Internet (VOI) or Voice over IP (VOIP) products.
Content Streaming
• Content streaming
• A method for transferring multimedia files over the
Internet so that the data stream of voice and pictures
plays continuously, without a break, or very few of
them
• It also enables users to browse large files in real time
The World Wide Web
• World Wide Web
• A collection of tens of thousands of independently-
owned computers that work together as one in an
Internet service
WWW Terminology
• Home page
• The cover page for a Web site that has graphics, titles,
coloured text, etc.
• Hypermedia
• Tools that connect the data on Web pages, allowing
users to access topics in whatever order they wish
• Hypertext markup language (HTML)
• The standard page description language for Web pages
Continued…
• Web browser
• Software that creates a unique hypermedia-based
menu on your computer screen and provides a
graphical interface to the Web
• Web page
• A screen of information sent to a requesting user and
presented through a browser
• Applet
• A small program embedded in Web pages
Some Interesting Web Sites

Library of Congress http://lcweb.loc.gov


PointCast http://www.pointcast.com
In-Box Direct http://www.netscape.com
Online Career Center http://occ.com
New York Times http://www.nytimes.com
Project Gutenberg http://www.gutenberg.org
Sportsline USA http://www.sportsline.com
White House http://www.whitehouse.gov
MIT Lab for Computer Science http://www.lcs.mit.edu
The Wall Street Journal http://www.wsj.com
Applets
• Applets are small java programs that are
downloaded from the server to the local
machine
Applications Of Internet
• Download programs and files
• E-Mail
• Voice and Video Conferencing
• E-Commerce
• File Sharing
• Information browsing
• Search the web addresses for access through search engine
• Chatting and many more…
Disadvantages of Internet

• Theft of personal information such as name, address, credit card


number etc.
• Virus threats nothing but a program which disrupts the normal
functioning of your system.
• Spamming refers to receiving unwanted e-mails in bulk, which
provide no purpose and needlessly obstruct the entire system.
• Pornography This is perhaps the biggest threat related to children’s
healthy mental life. A very serious issue concerning the Internet.

Though, internet can also create havoc, destruction and


its misuse can be very fatal,
the advantages of it outweigh its disadvantages.
Intranets
• Intranet
• An internal corporate network built using Internet and
World Wide Web standards and products that allows
employees of an organization to gain access to
corporate information
Intranet ‘Discussion’

A network based on TCP/IP protocols (an internet) belonging to an


organization, usually a corporation, accessible only by the
organization's members, employees, or others with authorization. An
intranet's Web sites look and act just like any other Web sites, but
the firewall surrounding an intranet fends off unauthorized access.

Like the Internet itself, intranets are used to share information.


Secure intranets are now the fastest-growing segment of the
Internet because they are much less expensive to build and manage
than private networks based on proprietary protocols.
Intranet Security
Two levels of Security required:

• Internal
It can be imposed by Public Key Security & Encryption Key.

• External
Through Firewall.
What is Firewall ?
• Security device located between firm’s internal network (intranet) &
external network (internet).

• Regulates access into & out of a company’s network based on a set of


rules.

Note : needs to be upgraded from time to time to check latest potential security
problems.

• Firewall…
• A device that sits between your internal network and the
outside Internet and limits access into and out of your network
based on your organization’s access policy
Firewalls
• Firewalls
• A method of preventing unauthorized access between a
company’s computers and the Internet (looks at the
header of a packet)
• Assured pipeline
• An Internet security method that looks at the entire
request for data and then determines whether the
request is valid
Firewall ‘Discussion’ (1)

A system designed to prevent unauthorized access to or from a


private network. Firewalls can be implemented in both hardware and
software, or a combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet
the specified security criteria.
Firewall ‘Discussion’ (2)

There are several types of firewall techniques:


– Packet filter: Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult to configure. In addition,
it is susceptible to IP spoofing.
– Application gateway: Applies security mechanisms to specific applications,
such as FTP and Telnet servers. This is very effective, but can impose a
performance degradation.
– Circuit-level gateway: Applies security mechanisms when a TCP or UDP
connection is established. Once the connection has been made, packets can
flow between the hosts without further checking.
– Proxy server: Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
Firewall ‘Discussion’ (3)

In practice, many firewalls use two or more of these techniques in


concert.

A firewall is considered a first line of defense in protecting private


information. For greater security, data can be encrypted.
Applications of Intranet
• Sharing of company policies/rules & regulations
• Access employee database
• Distribution of circulars/Office Orders
• Access product & customer data
• Sharing of information of common interest
• Launching of personal/departmental home pages
• Submission of reports
• Corporate telephone directories
Disadvantages

Management  A company may not have person to update their


problem Intranet on a routine basis
 Fear of sharing information and the loss of control
 Limited bandwidth for the business
Security  Unauthorized access
problem  Abuse of access
 Denial of service
Productivity  Information overload lowers productivity
problem  True purpose of the Intranet is unknown to many
employees/departments
 Hidden or unknown complexity and costs
What is Extranet ?

• Extranet is an Intranet for outside authorized users using


same internet technology.
• Inter-organizational information system.
• enable outsiders to work together with company’s
employees.
• open to selected suppliers, customers & other business partners
Extranet ‘Discussion’

A new buzzword that refers to an intranet that is partially


accessible to authorized outsiders. Whereas an intranet resides
behind a firewall and is accessible only to people who are members
of the same company or organization, an extranet provides various
levels of accessibility to outsiders. You can access an extranet only
if you have a valid username and password, and your identity
determines which parts of the extranet you can view.

Extranets are becoming a very popular means for business partners


to exchange information.
Examples..
• Dealers/distributors have access to
product files such as :-
1. product specification,
2. pictures,
3. images, etc.
to answer the queries of the customer.
Components of extranets ..
Some basic infrastructure components such as
the internet Including :-
• TCP/IP protocols,
• E-mail,
• Web-browsers,
• External business partners &
• Tele-commuting employees place order, check
status & send E-mail.
Benefits of Extranet
• Improved quality.
• lower travel costs.
• lower administrative & other overhead costs.
• reduction in paperwork.
• delivery of accurate information on time.
• improved customer service.
• better communication.
• overall improvement in business
effectiveness.
Disadvantages
• The suppliers & customer who don’t
have technical knowledge feel problem.
• Faceless contact.
• Information can be misused by other competitors.
• Fraud may be possible.
• Technical Employees are required.
Virtual Private Network (VPN)
• Virtual Private Network (VPN)
• A secure connection between two points across the
Internet
• Tunneling
• The process by which VPNs transfer information by
encapsulating traffic in IP packets and sending the
packets over the Internet

Schematic
VPN ‘Discussion’

Short for virtual private network, a network that is constructed by


using public wires to connect nodes. For example, there are a
number of systems that enable you to create networks using the
Internet as the medium for transporting data. These systems use
encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data cannot
be intercepted.
Virtual Private Network (VPN)
• Virtual Private Network (VPN)
• A secure connection between two points across the
Internet
• Tunneling
• The process by which VPNs transfer information by
encapsulating traffic in IP packets and sending the
packets over the Internet

Schematic
VPN ‘Discussion’

Short for virtual private network, a network that is constructed by


using public wires to connect nodes. For example, there are a
number of systems that enable you to create networks using the
Internet as the medium for transporting data. These systems use
encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data cannot
be intercepted.
Tunneling ‘Discussion’

A technology that enables one network to send its data via another
network's connections. Tunneling works by encapsulating a network
protocol within packets carried by the second network. For example,
Microsoft's PPTP technology enables organizations to use the
Internet to transmit data across a virtual private network (VPN). It
does this by embedding its own network protocol within the TCP/IP
packets carried by the Internet. (Note: PPTP = point-to-point tunneling
protocol)

Tunneling is also called encapsulation.


THANK
YOU
Difference

You might also like