Publicité
Publicité

Contenu connexe

Publicité
Publicité

INTRODUCTION TO INTERNET(UNIT 5).pptx

  1. INTRODUCTION TO INTERNET(UNIT 5) BY:SURBHI SAROHA
  2. SYLLABUS Introduction to Internet Meaning of Internet Growth of Internet Owner of Internet Anatomy of Internet Basic Internet Terminology Net Etiquette World Wide Web Internet Protocols Usage of Internet to society Search Engines
  3. INTRODUCTION TO INTERNET Internet is a group of computer systems connected from all around the world. The Internet protocol suite is a framework defined through the Internet standards. Methods are divided right into a layered set of protocols on this architecture. The Internet gives a huge variety of statistics and communique offerings, which includes forums, databases, email, and hypertext. It is made of the neighborhood to global personal, public networks connected through plenty of digital, wireless, and networking technologies. The Internet is a worldwide interconnected network of hundreds of
  4. MEANING OF INTERNET Internet is a global network that connects billions of computers across the world with each other and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions of computer users worldwide. It is set up by using cables such as optical fibers and other wireless and networking technologies. At present, internet is the fastest mean of sending or exchanging information and data between computers across the world. It is believed that the internet was developed by "Defense Advanced Projects Agency" (DARPA) department of the United States. And, it was first connected in 1969.
  5. GROWTH OF INTERNET The internet has influenced many areas of our lives. It started as something that would change the way we use computers, then went on to impact communication, research, sales, entertainment, and countless other aspects. With it comes new technology and terminology that has become part of our everyday language, including email addresses, websites, apps, and downloads. The internet and the web have changed the world we live in, and in turn, it has continued to develop and advance. Many look at the web as an expanding unfinished project. There are plenty of different directions it could head in, and several stakeholders are interested in helping to steer or control its path. As a tool for communication and profit, it’s essential to recognize where the web started and where it could go next.
  6. HISTORY OF THE INTERNET The Internet began as a research project in the 1960s. There were many pioneers in research, science, and technology that paved the way. The concept of a ‘galactic network’ of computers was put into practice by the Advanced Research Projects Agency Network (ARPANET) when they created a prototype that sent the first message from a computer at UCLA to one in Stanford University in 1969. In the 1970s, protocols were developed, including Transmission Control Protocol and Internet Protocol (TCP and IP), which might sound familiar. They were used by ARPANET in the 80s to extend the network, and so the internet was born.
  7. CONT…. However, it wasn’t until the 1990s that it took on the form that we have come to know today. In 1989, Tim Berners-Lee described the concept of the Web, a way of accessing data through websites. Later, search engines and the first websites appeared. The code for the World Wide Web was published using the internet, and through input and collaboration, it began to take shape.
  8. OWNER OF INTERNET No one owns the internet No company or government can claim ownership of it. The internet is more of a concept than an actual tangible entity, and it relies on a physical infrastructure that connects networks to other networks. The concept is similar to being a room full of people who all speak different languages. The network was operated by the National Informatics Centre. The first publicly available internet service in India was launched by state- owned Videsh Sanchar Nigam Limited (VSNL) on 15 August 1995.
  9. ANATOMY OF INTERNET The Internet is a vast collection of computers linked by cable and satellites, not controlled by any one authority, but all operating under common network protocols. The term 'Internet' includes both the hardware (satellites, cable, routing devices and computers) and the software (programs and network protocols) that enable computers to communicate with each other. When information is sent across the Internet, the Transmission Control Protocol (TCP: the networking-language computers use when communicating over the Internet) first breaks the information up into packets of data. The client computer sends those packets to the local network, Internet service provider (ISP), or online service. From here, the packets travel through many levels of networks, computers, and communications lines until they reach their final destinations.
  10. BASIC INTERNET TERMINOLOGY Hubs, which link groups of computers together and let them intercommunicate through multiple ports. Bridges, which link local area networks (LANs) with each another. Gateways, which act like bridges, but also convey data between dissimilar networks. Repeaters, which amplify the data at intervals so that the signal doesn't weaken. Routers, which ensure packets of data arrive at their proper destination across different technologies, media, and frame formats. Servers, which deliver web pages and other services as requested. Client computers, which make the initial request for Internet services, and run applications to handle those services. Cables and/or satellite communications, which make the hardware connections.
  11. CONT… Domain Name - A method of identifying computer addresses. Your e- mail address has a domain address. If you have an "edu" at the end of your e-mail address that means your account is affiliated with an educational institution. A "com" extension means you have a business account. A government account has a .gov suffix. Firewall - The name "firewall" derives from the term for a barrier that prevents fires from spreading. A computer "firewall" is a barrier between your computer and the outside world. Just like a fire is most likely to spread through open doors in a building, your computer is most vulnerable at its ports (the doors). Without ports you could not go on the Internet or let Internet traffic enter your computer.
  12. NET ETIQUETTE Netiquette is a made-up word from the words net and etiquette. Netiquette thus describes the rules of conduct for respectful and appropriate communication on the internet. Netiquette is often referred to as etiquette for the internet. These are not legally binding rules, but recommended rules of etiquette. Netiquette represents the importance of proper manners and behavior online. In general, netiquette is the set of professional and social etiquettes practiced and advocated in electronic communication over any computer network. Common guidelines include being courteous and precise, and avoiding cyber-bullying. Netiquette also dictates that users should obey copyright laws and avoid overusing emotions.
  13. NET ETIQUETTE Make sure identification is clear in all communications. Begin with a salutation (“Hi, Jason!”) and end with your signature (“Hannah Kay, Criminology 101”). Review what you wrote and try to interpret it objectively. When we speak face to face and are misunderstood, we have an on-the-spot opportunity to rephrase our words. In writing, we must strive twice as hard to be understood, as we do not have the benefit of modifying or elaborating in real time. All caps (“I’M SHOUTING”) and exclamation points (“Give me a break!!!”) can be misinterpreted as intense anger or humor without the appropriate context. If you wouldn’t say it face to face, don’t say it online. When you’re working online, you’re safe behind a screen, but that’s no excuse to be ill-mannered or say things you would never say in public. Don’t assume everyone understands where you’re coming from. Sarcasm and wit is often the spice of in-person conversation, but in online discussion, it can not only lose its edge, it can bite! In your high school classroom, all students were the same age, came from similar backgrounds and lived in the same area. In contrast, your online classroom is made up of people of all ages and cultures who have varied backgrounds, lifestyles and geographic locations. With this in mind, review what you wrote before contributing to the conversation and ask yourself, “Will everyone get the joke?” Don’t spam. Please don’t take advantage of your connection with the other students in your online classroom to forward emails and links regarding your political/spiritual beliefs or to sell your services.
  14. CONT…. Use emoticons. In casual chatroom settings, emoticons can help convey feelings that may otherwise get lost in translation, including humor, exasperation, exhaustion and even confusion. Respect others’ privacy. Don’t give out another student’s personal email address without permission. Remember, if it’s on the internet, it’s everywhere. Don’t share personal information about yourself in a public online forum, especially something that could put your safety or security at risk. Follow the rules. Just as your online college posts guidelines related to academic integrity and student expectations, online forums also have rules of conduct. Make a point to read them every time, as they can vary from class to class. Forgive and forget. If you’re offended by something another student says online, keep in mind that you may have misunderstood their intentions. Give them the benefit of the doubt.
  15. WORLD WIDE WEB World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in web servers and connected to local computers through the internet. These websites contain text pages, digital images, audios, videos, etc. Users can access the content of these sites from any part of the world over the internet using their devices such as computers, laptops, cell phones, etc. The WWW, along with internet, enables the retrieval and display of text and media to your device.
  16. CONT….. The building blocks of the Web are web pages which are formatted in HTML and connected by links called "hypertext" or hyperlinks and accessed by HTTP. These links are electronic connections that link related pieces of information so that users can access the desired information quickly. Hypertext offers the advantage to select a word or phrase from text and thus to access other pages that provide additional information related to that word or phrase.
  17. CONT…. A web page is given an online address called a Uniform Resource Locator (URL). A particular collection of web pages that belong to a specific URL is called a website, e.g., www.facebook.com, www.google.com, etc. So, the World Wide Web is like a huge electronic book whose pages are stored on multiple servers across the world. Small websites store all of their WebPages on a single server, but big websites or organizations place their WebPages on different servers in different countries so that when users of a country search their site they could get the information quickly from the nearest server.
  18. CONT…. So, the web provides a communication platform for users to retrieve and exchange information over the internet. Unlike a book, where we move from one page to another in a sequence, on World Wide Web we follow a web of hypertext links to visit a web page and from that web page to move to other web pages. You need a browser, which is installed on your computer, to access the Web.
  19. INTERNET PROTOCOLS The Internet Protocols are of different types having different uses:- 1. TCP/IP(Transmission Control Protocol/ Internet Protocol): These are a set of standard rules that allows different types of computers to communicate with each other. The IP protocol ensures that each computer that is connected to the Internet is having a specific serial number called the IP address. TCP specifies how data is exchanged over the internet and how it should be broken into IP packets. It also makes sure that the packets have information about the source of the message data, the destination of the message data, the sequence in which the message data should be re-assembled, and checks if the message has been sent correctly to the specific destination. The TCP is also known as a connection-oriented protocol.
  20. CONT…… The functionality of TCP/IP is divided into 4 layers with each one having specific protocols: Application Layer: The application layer makes sure that the data from the sending end is received in a format that is acceptable and supported at the receiving end. Transport Layer: The transport layer is responsible for the smooth transmission of data from one end to the other. It is also responsible for reliable connectivity, error recovery, and flow control of the data. Internet Layer: This Internet Layer moves packets from source to destination by connecting independent networks. Network Access Layer: The Network Access Layer sees how a computer connects to a network.
  21. CONT…. 2. SMTP(Simple Mail Transfer Protocol): These protocols are important for sending and distributing outgoing emails. This protocol uses the header of the mail to get the email id of the receiver and enters the mail into the queue of outgoing mails. And as soon as, it delivers the mail to the receiving email id, it removes the email from the outgoing list. The message or the electronic mail may consider of text, video, image etc. It helps in setting up of some communication server rules. 3. PPP(Point to Point Protocol): It is a communication protocol that is used to create a direct connection between two communicating devices. This protocol defines the rules using which two devices will authenticate with each other and exchange information with each other. For example, A user connects his PC to the server of an Internet Service Provider also uses PPP. Similarly, for connecting two routers for direct communication it uses PPP.
  22. CONT…. 4. FTP (File Transfer Protocol): This protocol is used for transferring files from one system to the other. This works on a client-server model. When a machine requests for file transfer from another machine, the FTO sets up a connection between the two and authenticates each other using their ID and Password. And, the desired file transfer takes place between the machines. 5. SFTP(Secure File Transfer Protocol): SFTP which is also known as SSH FTP refers to File Transfer Protocol (FTP) over Secure Shell (SSH) as it encrypts both commands and data while in transmission. SFTP acts as an extension to SSH and encrypts files and data then sends them over a secure shell data stream. This protocol is used to remotely connect to other systems while executing commands from the command line.
  23. CONT…. 6. HTTP(Hyper Text Transfer Protocol): This protocol is used to transfer hypertexts over the internet and it is defined by the www(world wide web) for information transfer. This protocol defines how the information needs to be formatted and transmitted. And, it also defines the various actions the web browsers should take in response to the calls made to access a particular web page. Whenever a user opens their web browser, the user will indirectly use HTTP as this is the protocol that is being used to share text, images, and other multimedia files on the World Wide Web. Note: Hypertext refers to the special format of the text that can contain links to other texts.
  24. CONT…. 7. HTTPS(HyperText Transfer Protocol Secure): HTTPS is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network with the SSL/TLS protocol for encryption and authentication. So, generally, a website has an HTTP protocol but if the website is such that it receives some sensitive information such as credit card details, debit card details, OTP, etc then it requires an SSL certificate installed to make the website more secure. So, before entering any sensitive information on a website, we should check if the link is HTTPS or not. If it is not HTTPS then it may not be secure enough to enter sensitive information. 8. TELNET(Terminal Network): TELNET is a standard TCP/IP protocol used for virtual terminal service given by ISO. This enables one local machine to connect with another. The computer which is being connected is called a remote computer and which is connecting is called the local computer. TELNET operation lets us display anything being performed on the remote computer in the local computer. This operates on the client/server principle. The local computer uses the telnet client program whereas the remote computer uses the telnet server program.
  25. USAGE OF INTERNET TO SOCIETY The Internet is a global networking system that can be used on most devices nowadays and has become an essential part of our lives. In today's technological era, most of the companies are getting their operations done over the Internet. There are various uses of the Internet by which companies and individuals are making their daily tasks more productive and more comfortable. Online Booking & Orders The Internet has made it a lot easier for people to book tickets for buses, trains, flights (domestic and international) directly using their devices from anywhere. People can also book a taxi by choosing their current location, and they will be picked up or dropped at a specified location. Now no one needs to wait in long queues for their turn to book tickets at the ticket counter. Besides, people can order a wide variety of products at home using the Internet and devices. It can range from grocery products to ready to eat, fashionable clothes to medicines. Most items can be ordered at home and received directly at the door.
  26. CONT…. Cashless Transactions Most countries are promoting cashless transactions and digital payments. This helps people not carry much cash. People can pay their bills through debit or credit cards using POS devices. These devices are connected to the payment gateway on the Internet. Besides, People can also use their smartphone and the Internet for processing transactions on UPI (Unified Payment Interface). It does not even require them to carry their cards. The UPI payment method is continuously evolving and is expected to cover most transactions in the near future.
  27. CONT…. Education Most of the devices nowadays are connected through the Internet. The Internet has the availability of broad educational content on any topic with different types. People can study the relevant topic just by spending a couple of minutes over the Internet. Internet Search engines help people quickly find the relevant study material in multiple formats (such as images, videos, documents, etc.). This helps eliminate the need to go to the library to read several books to find the desired information. Besides, the Internet has also enabled students to participate in their classes through video conferencing, where students can connect with their teachers or professionals anywhere in the world.
  28. CONT…. Online Banking & Trading The way of banking has changed after the introduction of the Internet. The Internet has made banking online where people can manage their bank accounts while sitting at home or traveling abroad. Nowadays, most of the features of banking are right in people's hands. With the help of online banking, people can securely transfer the money from one account to another, change their ATM pins, apply for the physical or virtual credit cards, update credit card limits, enable or disable international transactions, track their transactions, and many more. Also, they can even raise an online complaint or contact to bank's support staff. Apart from this, the Internet has made it a lot easier for people to trade in the Stock market from anywhere. People can easily buy, sell, or manage stocks online.
  29. CONT….. Research The Internet is playing a significant role in the field of research. Before the use of the Internet, it was quite hard to look for information about anything. People had to go through hundreds of books for references to find the desired information. However, the Internet has made it a lot easier, and anyone can find the required information at some clicks only. In research, people can study about the success and failed research and work further for the improvements. Uses of the Internet in research have incredibly beneficial for the researchers.
  30. CONT…. Electronic Mail Email or electronic mail is one of the first significant uses of the Internet. The email has enabled faster communication between people on the Internet. Using email, people can quickly share information, data files, such as images, audio, video, and other types of files. The use of email has significantly reduced paper use, which was the primary source of communication in the olden days. Anyone can have a free email address and can easily communicate with others. This has also reduced the load on the physical mail system, although it is still in use.
  31. CONT…. Entertainment The Internet is the most effective means of entertainment. There are various options available on the Internet, which people can try, such as watching movies, playing online games, listening to songs, etc. The Internet has also made it easy for people to download entertainment items to their local storage. Using the Internet, people can also share their videos, songs, pictures online with others. Also, nowadays, people can watch live TV or sports on the Internet.
  32. SEARCH ENGINES A search engine is a software program that helps people find the information they are looking for online using keywords or phrases. Search engines are able to return results quickly—even with millions of websites online—by scanning the Internet continuously and indexing every page they find. When a user enters a search term, the search engine looks at the website page titles, contents and keywords it has indexed and uses algorithms (step-by-step operations) to produce a list of sites—with the most relevant websites at the top of the list. Companies use search engine optimization (SEO) to help search engines recognize their websites as highly relevant to particular searches. Popular search engines include Google, Bing and Yahoo.
  33. THANK YOU 
Publicité