SlideShare une entreprise Scribd logo
1  sur  48
INTERNET
The Internet A network of computer networks To view the internet or allow user to communicate through it, one must have the necessaryTCP/IPand a web browser.
TCP TCP (Transmission Control Protocol)    provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
TCP/IP TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. TCP provides a point-to-point channel for applications that require reliable communications. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Telnet are all examples of applications that require a reliable communication channel.
TCP TCP is optimized for accurate delivery rather than timely delivery, and therefore, TCP sometimes incurs relatively long delays (in the order of seconds) while waiting for out-of-order messages or retransmissions of lost messages.
TCP TCP is a reliable stream delivery service that guarantees delivery of a data stream sent from one host to another without duplication or losing data
TCP Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP) which provides a datagram service that emphasizes reduced latency over reliability. Example: Internet Radio Stream, Podcast, Youtube video streaming, CtC
IP The Internet Protocol (IP) is Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. deliver datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.
TCP/IP (summary) TCP consists of a set of rules: for the protocol, that are used with the Internet Protocol, and for the IP, to send data "in a form of message units" between computers over the Internet. At the same time that IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data transmission, called segments, that a message is divided into for efficient routing through the network.
TCP provides a communication service at an intermediate level between an application program and the Internet Protocol. That is, when an application program desires to send a large chunk of data across the Internet using IP, instead of breaking the data into IP-sized pieces and issuing a series of IP requests, the software can issue a single request to TCP and let TCP handle the IP details. IP works by exchanging pieces of information called packets. A packet is a sequence of octets and consists of a header followed by a body. The header describes the packet's destination and, optionally, the routers to use for forwarding until it arrives at its destination. The body contains the data IP is transmitting. Due to network congestion, traffic load balancing, or other unpredictable network behavior, IP packets can be lost, duplicated, or delivered out of order. TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program. Thus, TCP abstracts the application's communication from the underlying networking details.
OSI (Open System Interconnection) Model The most popular packet-based structure of layers, or protocol stack It defines 7 layers.  The user interface (Application Layer) is the top layer, since users work directly with applications.  As you work your way down toward the lower layers, the protocols become more detailed toward the nuts and bolts of the operation.  They define the details of actually preparing and moving data.
OSI (Open System Interconnection) Model
OSI (Open System Interconnection) Model (Vertical/Horizontal Communication)
(Encapsulation/Decapsulation)
ENCAPSULATION/DECAPSULATION Moving from the top, down - messages get larger and larger ! !   A message is passed down, and the lower layer adds a header to it.  This is called encapsulation, because it is like placing an object into a capsule.  The header is sometimes called a wrapper.  Each successive lower layer encapsulates what it receives from the layer above it. 
ENCAPSULATION/DECAPSULATION Moving from the bottom, up - messages get smaller and smaller ! !  A message is first stripped of it's header, and then the inner contents (the "data" portion) is passed up.  This is "decapsulation" but no one uses that term.  Each successive upper layer receives the data message from the layer below, and then strips off it's own header and passes the data up.
The 7 layers Although there are seven layers in the OSI model, they can be grouped into three areas: High-level Protocols (layers 5, 6 and 7  -  Session, Presentation, and Application) - how the data is presented, displayed, and summarized for the user  -  and in the reverse direction, how the user prepared data is assembled into meaningful data structures (high-level protocols).  
The 7 layers Medium-level Protocols (Layers 3 and 4 - Network and Transport) - how the data is assembled into packets and frames and how error checking and flow control is implemented - and in the reverse direction, how the received packets and frames are assembled into structures such as files and databases (medium-level protocols)
The 7 layers Low-level Protocols (Layers 1 and 2 - Physical and DataLink) - how the data is converted into electrical pulses of one's and zero's (bits) and sent across cables or the physical medium, and in the reverse direction, how the electrical pulses are taken off the cable and converted to ones and zero's.  
DATA TERMINOLOGY Messages and Packets - catch-all terms used to describe any unit of data being passed between layers
DATA TERMINOLOGY Data - Layer 5, 6, and 7 - not sure why they did not differentiate between these type of data units and call them each by a different name  .  .  .  but a good guess is that since data units at these layers are rarely discussed, apparently it was OK to called them all by the same name - simply "Data"
DATA TERMINOLOGY Segment - Layer 4: data units at layer 4 of the OSI model - TCP (Transmission Control Protocol)
DATA TERMINOLOGY Packet - Layer 3: This term is considered by many to most correctly refer to a message sent by protocols operating at the network layer of the OSI Reference Model. So, you will commonly see people refer to “IP packets”.
DATA TERMINOLOGY Datagram - Layer 3: This term is basically synonymous with “packet” and is also used to refer to network layer technologies. It is also often used to refer to a message that is sent at a higher level of the OSI Reference Model (more often than “packet” is).
DATA TERMINOLOGY Frame - Layer 2: most commonly used to refer to Ethernet, Token Ring, or Frame Relay units of data.  A frame gets its name from the fact that it is created by taking higher-level packets or datagrams and “framing” them with additional header information needed at the lower level. Cell - Layer 2: most commonly used to refer to 53-byte units of data.  A cell is a unit of data that is fixed in size.
DATA TERMINOLOGY Frame - Layer 1: refers to T-Carrier Layer 1 units of data (193-bit frames) BITS – Layer 1; AKA “one’s and zero’s”
TCP/IP MODEL
Data Encapsulation in TCP/IP
Data Encapsulation in TCP/IP
Data Encapsulation in TCP/IP
Data Change Names?
Data Change Names?
BITS and BYTES A byte is composed of combinations of 8 bits. Example: 00000001 = 1 00000011= 2 00000101=3 ………… = 256 (maximum) bits combination Note: 255 is just 1 byte.
BITS and BYTES The recent IP address version 4 or IPv4 is using 32 bits addressing like this: 192.2.34.155 255.255.255.255 (maximum)
Domain Name Server An open source software that converts IP address in number form into labels (letters). Example :  your IP address is 192.1.0.222 is equivalent to www. Dipolog.com/
Uniform Resource Locator (URL) Identifies the web address of a document in the internet. An example is HTTP://WWW.INTERNET.COM/list/students.html www.pinoybsn.blogspot.com/crazyme/games.html
TCP/IP Model
TCP/IP
DAWN of the NET CLIP 1 CLIP 2 CLIP 3
WIRELESS NETWORK Wireless network refer to any type of computer network that is not connected by cables of any kind.
WIRELESS NETWORK Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves.  This implementation takes place at the physical level, (layer), of the network structure.
TYPES Wireless WAN Wireless PAN Wireless LAN Wireless MAN
WI-FI is 802.11 Wi-Fi: "Wi-Fi" is a term used to describe 802.11 WLANs, although it is technically a declared standard of interoperability between 802.11 devices.
WiMax is 802.16 is a series of Wireless Broadband standards authored by the IEEE. “WiMax” - Worldwide Interoperability for Microwave Access IEEE (Institute of Electrical and Electronic Engineers)
Wireless Broadband (802.16) broadband means "having instantaneous bandwidths greater than 1 MHz and supporting data rates greater than about 1.5 Mbit/s.“ Wireless Broadband networks feature speeds roughly equivalent to wired broadband networks, such as that of DSL or a cable modem.
Wireless Broadband Wireless Broadband networks can also be Symmetrical, meaning bandwidth traveling in both directions (download/upload), which is most commonly associated with 'Fixed Wireless' networks.
House with a wireless broadband
Mobile wireless broadband allow a more mobile version of this broadband access. Consumers can purchase a PC card, laptop card, or USB equipment to connect their PC or laptop to the Internet via cell phone towers. stable in almost any area that could also receive a strong cell phone connection. These connections can cost more for portable convenience as well as having speed limitations in all but urban environments.

Contenu connexe

Tendances

Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Protocol
ProtocolProtocol
ProtocolShi Na
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4Raghu nath
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer NetworksMukesh Chinta
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 

Tendances (20)

Osi model
Osi modelOsi model
Osi model
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Iap final
Iap finalIap final
Iap final
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Protocols
ProtocolsProtocols
Protocols
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Osi model
Osi modelOsi model
Osi model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Protocol
ProtocolProtocol
Protocol
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 

En vedette

History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]jsoni2
 
Introduce to internet1
Introduce to internet1 Introduce to internet1
Introduce to internet1 Hardini_HD
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2BAS ADITYA SRINIVAS
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internetSai Sreeram
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
 

En vedette (8)

Internet 1 vs internet 2
Internet 1 vs internet 2Internet 1 vs internet 2
Internet 1 vs internet 2
 
History Of The Internet[1]
History Of The Internet[1]History Of The Internet[1]
History Of The Internet[1]
 
Introduce to internet1
Introduce to internet1 Introduce to internet1
Introduce to internet1
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Internet1
Internet1Internet1
Internet1
 
Internet
InternetInternet
Internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 

Similaire à Internet1

Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016euncleRhyme
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsArti Parab Academics
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
Mid term Topic
Mid term TopicMid term Topic
Mid term TopicDulal Miah
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jhamanish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha
 
Computer_Network
Computer_NetworkComputer_Network
Computer_NetworkRavi Jiyani
 

Similaire à Internet1 (20)

Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016e
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network ModelsSYBSC IT COMPUTER NETWORKS UNIT I Network Models
SYBSC IT COMPUTER NETWORKS UNIT I Network Models
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Assignment3
Assignment3Assignment3
Assignment3
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 

Plus de Joseph Lagod

Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworksJoseph Lagod
 
Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2Joseph Lagod
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksJoseph Lagod
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworksJoseph Lagod
 

Plus de Joseph Lagod (6)

Pointers for semi
Pointers for semiPointers for semi
Pointers for semi
 
Data processing
Data processingData processing
Data processing
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
 
Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2Ni theories, models, and frameworks 2
Ni theories, models, and frameworks 2
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworks
 
Ni theories, models, and frameworks
Ni theories, models, and frameworksNi theories, models, and frameworks
Ni theories, models, and frameworks
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Internet1

  • 2. The Internet A network of computer networks To view the internet or allow user to communicate through it, one must have the necessaryTCP/IPand a web browser.
  • 3. TCP TCP (Transmission Control Protocol) provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
  • 4. TCP/IP TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. TCP provides a point-to-point channel for applications that require reliable communications. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Telnet are all examples of applications that require a reliable communication channel.
  • 5. TCP TCP is optimized for accurate delivery rather than timely delivery, and therefore, TCP sometimes incurs relatively long delays (in the order of seconds) while waiting for out-of-order messages or retransmissions of lost messages.
  • 6. TCP TCP is a reliable stream delivery service that guarantees delivery of a data stream sent from one host to another without duplication or losing data
  • 7. TCP Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP) which provides a datagram service that emphasizes reduced latency over reliability. Example: Internet Radio Stream, Podcast, Youtube video streaming, CtC
  • 8. IP The Internet Protocol (IP) is Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. deliver datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.
  • 9. TCP/IP (summary) TCP consists of a set of rules: for the protocol, that are used with the Internet Protocol, and for the IP, to send data "in a form of message units" between computers over the Internet. At the same time that IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data transmission, called segments, that a message is divided into for efficient routing through the network.
  • 10. TCP provides a communication service at an intermediate level between an application program and the Internet Protocol. That is, when an application program desires to send a large chunk of data across the Internet using IP, instead of breaking the data into IP-sized pieces and issuing a series of IP requests, the software can issue a single request to TCP and let TCP handle the IP details. IP works by exchanging pieces of information called packets. A packet is a sequence of octets and consists of a header followed by a body. The header describes the packet's destination and, optionally, the routers to use for forwarding until it arrives at its destination. The body contains the data IP is transmitting. Due to network congestion, traffic load balancing, or other unpredictable network behavior, IP packets can be lost, duplicated, or delivered out of order. TCP detects these problems, requests retransmission of lost data, rearranges out-of-order data, and even helps minimize network congestion to reduce the occurrence of the other problems. Once the TCP receiver has reassembled the sequence of octets originally transmitted, it passes them to the application program. Thus, TCP abstracts the application's communication from the underlying networking details.
  • 11. OSI (Open System Interconnection) Model The most popular packet-based structure of layers, or protocol stack It defines 7 layers.  The user interface (Application Layer) is the top layer, since users work directly with applications.  As you work your way down toward the lower layers, the protocols become more detailed toward the nuts and bolts of the operation.  They define the details of actually preparing and moving data.
  • 12. OSI (Open System Interconnection) Model
  • 13. OSI (Open System Interconnection) Model (Vertical/Horizontal Communication)
  • 15. ENCAPSULATION/DECAPSULATION Moving from the top, down - messages get larger and larger ! !   A message is passed down, and the lower layer adds a header to it.  This is called encapsulation, because it is like placing an object into a capsule.  The header is sometimes called a wrapper.  Each successive lower layer encapsulates what it receives from the layer above it. 
  • 16. ENCAPSULATION/DECAPSULATION Moving from the bottom, up - messages get smaller and smaller ! !  A message is first stripped of it's header, and then the inner contents (the "data" portion) is passed up.  This is "decapsulation" but no one uses that term.  Each successive upper layer receives the data message from the layer below, and then strips off it's own header and passes the data up.
  • 17. The 7 layers Although there are seven layers in the OSI model, they can be grouped into three areas: High-level Protocols (layers 5, 6 and 7  -  Session, Presentation, and Application) - how the data is presented, displayed, and summarized for the user  -  and in the reverse direction, how the user prepared data is assembled into meaningful data structures (high-level protocols).  
  • 18. The 7 layers Medium-level Protocols (Layers 3 and 4 - Network and Transport) - how the data is assembled into packets and frames and how error checking and flow control is implemented - and in the reverse direction, how the received packets and frames are assembled into structures such as files and databases (medium-level protocols)
  • 19. The 7 layers Low-level Protocols (Layers 1 and 2 - Physical and DataLink) - how the data is converted into electrical pulses of one's and zero's (bits) and sent across cables or the physical medium, and in the reverse direction, how the electrical pulses are taken off the cable and converted to ones and zero's.  
  • 20. DATA TERMINOLOGY Messages and Packets - catch-all terms used to describe any unit of data being passed between layers
  • 21. DATA TERMINOLOGY Data - Layer 5, 6, and 7 - not sure why they did not differentiate between these type of data units and call them each by a different name  .  .  .  but a good guess is that since data units at these layers are rarely discussed, apparently it was OK to called them all by the same name - simply "Data"
  • 22. DATA TERMINOLOGY Segment - Layer 4: data units at layer 4 of the OSI model - TCP (Transmission Control Protocol)
  • 23. DATA TERMINOLOGY Packet - Layer 3: This term is considered by many to most correctly refer to a message sent by protocols operating at the network layer of the OSI Reference Model. So, you will commonly see people refer to “IP packets”.
  • 24. DATA TERMINOLOGY Datagram - Layer 3: This term is basically synonymous with “packet” and is also used to refer to network layer technologies. It is also often used to refer to a message that is sent at a higher level of the OSI Reference Model (more often than “packet” is).
  • 25. DATA TERMINOLOGY Frame - Layer 2: most commonly used to refer to Ethernet, Token Ring, or Frame Relay units of data.  A frame gets its name from the fact that it is created by taking higher-level packets or datagrams and “framing” them with additional header information needed at the lower level. Cell - Layer 2: most commonly used to refer to 53-byte units of data.  A cell is a unit of data that is fixed in size.
  • 26. DATA TERMINOLOGY Frame - Layer 1: refers to T-Carrier Layer 1 units of data (193-bit frames) BITS – Layer 1; AKA “one’s and zero’s”
  • 33. BITS and BYTES A byte is composed of combinations of 8 bits. Example: 00000001 = 1 00000011= 2 00000101=3 ………… = 256 (maximum) bits combination Note: 255 is just 1 byte.
  • 34. BITS and BYTES The recent IP address version 4 or IPv4 is using 32 bits addressing like this: 192.2.34.155 255.255.255.255 (maximum)
  • 35. Domain Name Server An open source software that converts IP address in number form into labels (letters). Example : your IP address is 192.1.0.222 is equivalent to www. Dipolog.com/
  • 36. Uniform Resource Locator (URL) Identifies the web address of a document in the internet. An example is HTTP://WWW.INTERNET.COM/list/students.html www.pinoybsn.blogspot.com/crazyme/games.html
  • 39. DAWN of the NET CLIP 1 CLIP 2 CLIP 3
  • 40. WIRELESS NETWORK Wireless network refer to any type of computer network that is not connected by cables of any kind.
  • 41. WIRELESS NETWORK Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level, (layer), of the network structure.
  • 42. TYPES Wireless WAN Wireless PAN Wireless LAN Wireless MAN
  • 43. WI-FI is 802.11 Wi-Fi: "Wi-Fi" is a term used to describe 802.11 WLANs, although it is technically a declared standard of interoperability between 802.11 devices.
  • 44. WiMax is 802.16 is a series of Wireless Broadband standards authored by the IEEE. “WiMax” - Worldwide Interoperability for Microwave Access IEEE (Institute of Electrical and Electronic Engineers)
  • 45. Wireless Broadband (802.16) broadband means "having instantaneous bandwidths greater than 1 MHz and supporting data rates greater than about 1.5 Mbit/s.“ Wireless Broadband networks feature speeds roughly equivalent to wired broadband networks, such as that of DSL or a cable modem.
  • 46. Wireless Broadband Wireless Broadband networks can also be Symmetrical, meaning bandwidth traveling in both directions (download/upload), which is most commonly associated with 'Fixed Wireless' networks.
  • 47. House with a wireless broadband
  • 48. Mobile wireless broadband allow a more mobile version of this broadband access. Consumers can purchase a PC card, laptop card, or USB equipment to connect their PC or laptop to the Internet via cell phone towers. stable in almost any area that could also receive a strong cell phone connection. These connections can cost more for portable convenience as well as having speed limitations in all but urban environments.
  • 49. Other forms of Internet Services Integrated Services Digital Network (ISDN) is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.