SlideShare a Scribd company logo
Prepared by Mr.Manish Jha
Section Officer and faculty, University
of Petroleum & Energy
Studies,Dehradun
 Modem- A device that enables a computer to transmit
data over telephone lines.
 Connector- A device that mating and demating
electrical power connection.
 Cables- It consists of bundle of wires with connector
on the ends.
 Adaptor- It is a physical device that allow to interface
between one hardware to another interface hardware.
 Circuits- is a specific path between to points by which
signals can be carried out.
 Switches- It is a network device that select a path or
circuit to send unit of data to its next destination.
 Leased Lines- It is a telephone line connection that has
been used for private purpose
 1. Hardware and Software Requirement
 2. Protocol
 Transmission Media
 E-Mail
 Protocol is a set of rules and procedure for
communicating.
 There are many protocols
 Some Protocol works only at particular OSI.
 Protocol can also work together is a suit.
 How Protocol Works – Data is transmitted over
the network and to be break down in a
systematic steps. Each steps its own rules and
procedure.
 TCP/IP
 X.25
 Frame Relay
 ATM 2
 Sonet
 Function of Protocol
 The protocol steps must be carried out in a consistent order
that is the same on every computer in the network. In the
sending computer, these steps must be executed from the
top down. In the receiving computer, these steps must be
carried out from the bottom up.
 The Sending Computer
 Protocols at the sending computer:
 Break the data into smaller sections, called packets, that the
protocol can handle.
 Add addressing information to the packets so that the
destination computer on the network can determine that the
data belongs to it.
 Prepare the data for transmission through the NIC and out
onto the network cable.
 The Receiving Computer- Protocols at the receiving
computer carry out the same series of steps in reverse order.
They:
 Take the data packets off the cable.
 Bring the data packets into the computer through the NIC.
 Strip the data packets of all the transmitting information
that was added by the sending computer.
 Copy the data from the packets to a buffer for reassembly.
 Pass the reassembled data to the application in a usable
form.
 Both sending and receiving computers need to perform each
step in the same way so that the data will have the same
structure when it is received as it did when it was sent.
 TCP/IP – It consists of multiple protocols, each of
which transfer data across the network in a different
form at with different option such as error checking.
 X.25- It uses packet switching. Difference :-
 TCP/IP has only end-to-end error checking and flow
control; X.25 has error checking from node to node.
 To compensate for the fact that a TCP/IP network is
completely passive, TCP/IP has a more complicated
flow control and window mechanism than X.25 has.
 X.25 has tightly specified the electrical and link levels;
TCP/IP is designed to travel over many different kinds
of media, with many different types of link service.
 Other protocols written specifically for the
TCP/IP suite include:
 SMTP (Simple Mail Transfer Protocol) E-
mail.
 FTP (File Transfer Protocol) For exchanging
files among computers running TCP/IP.
 SNMP (Simple Network Management
Protocol) For network management.
Types of Internet Protocol ?-
A. Electronic Mail- SMTP,IMAP (Internet Message Access
Protocol), POP3 (POST OFFICE PROTOCOL3)
B. FTP
C. HTTP- It allows to shown the web page in web
broswer.
D. Telnet
E. Gopher
F. Usenet
What is Domain ?
Role on Domain Name System .
Role of DHCP- ( Dynamic Host Configuration Protocol)
 Difference between TCP and IP.
IP Addressing
Domain Name Server
 Domain Name Server
 It’s a network service that translate “names”
into IP Address.
 Domain Name & Host Name
 .com Yahoo -
 .com google
 ac.in upes
 Host Name
 IP uses 32 bits
 1 byte= 8 bits
 4 bytes= 32 bits
 IP consists of 4 numbers and number always
between 0 to 255.
 It consists of two components –One
component is network portion of the address.
 Second component is Host portion of the
address.
Types of OSI Layers :
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
OSI- Open System Interconnection was
developed in 1984 by ISO (International
Standard Organization) . OSI model is a set of
seven layers that ensure that must travel from
one device to another device over the
network. In earlier it was called
internetworking.
Application Layer – This layer actually interact
with the operating system or application
whenever user transfer file,read message and
perform other network activities
Presentation Layer takes the data provided by the Application layer and
converts it into a standard format that the other layers can understand.
SESSION LAYER : The session layer tracks connections, also called sessions.
The session layer should keep track of multiple file downloads requested
by a particular FTP application, or multiple telnet connections from a
single terminal client, or web page retrievals from a web server.
TRANSPORT LAYER :-
 DATA LINK LAYER
 The data link layer provides error-free transfer of data frames from one
node to another over the physical layer, allowing layers above it to
assume virtually error-free transmission over the link. To do this, the data
link layer provides:
 The upper layers of the OSI model represent
software that implements network services like
encryption and connection management.
 The lower layers of the OSI model implement
more primitive, hardware-oriented functions
like routing, addressing, and flow control.
 PHYSICAL LAYER
 The physical layer, the lowest layer of the OSI
model, is concerned with the transmission and
reception of the unstructured raw bit stream over a
physical medium. It describes the
electrical/optical, mechanical, and functional
interfaces to the physical medium, and carries the
signals for all of the higher layers.
Network Layer of the OSI model known as OSI
Network Layer has a role to carry data from the
source address to destination address . Like,
TCP/IP address.
 Cloud computing is basically an Internet-based
network made up of large numbers of
 servers - mostly based on open standards, modular
and inexpensive. Clouds contain
 vast amounts of information and provide a variety
of services to large numbers of
 people. The benefits of cloud computing are
Reduced Data Leakage, Decrease evidence
 acquisition time, they eliminate or reduce service
downtime, they Forensic readiness, they
 Decrease evidence transfer time
Manish Jha- Research Scholar- Internet Basics Requriement
 History
 The Cloud is a metaphor for the Internet, derived from its
common depiction in network diagrams
 (or more generally components which are managed by
others) as a cloud outline.
 The underlying concept dates back to 1960 when John
McCarthy opined that "computation may
 someday be organized as a public utility" (indeed it shares
characteristics with service bureaus
 which date back to the 1960s) and the term The Cloud was
already in commercial use around
 the turn of the 21st century. Cloud computing solutions had
started to appear on the market,
 though most of the focus at this time was on Software as a
service.
 Types of services:
 These services are broadly divided into three
categories:
 Infrastructure-as-a-Service (IaaS)
 Platform-as-a-Service (PaaS)
 Software-as-a-Service (SaaS).
 Types by visibility:
 Public Cloud
 Hybrid Cloud
 Private Cloud
 Public Clouds
 A public cloud is one in which the services and infrastructure are
provided off-site over the Internet. These clouds offer the greatest level of
efficiency in shared resources; however, they are also more vulnerable
than private clouds. A public cloud is the obvious choice
 when :-
 Our standardized workload for applications is used by lots of people,
such as e-mail.
 we need to test and develop application code.
 we have SaaS (Software as a Service) applications from a vendor who has
a well-implemented security strategy.
 We need incremental capacity (the ability to add computer capacity for
peak times).
 We are doing collaboration projects.
 We are doing an ad-hoc software development project using a Platform as
a Service (PaaS) offering cloud.

More Related Content

PPTX
Slides for protocol layering and network applications
PDF
Networking Basics
PDF
PPTX
Osi reference model and the tcp
PPTX
OSI model and TCP/IP model
PDF
53426980 tcp-ip
PPT
02 protocol architecture
PPTX
Internet1
Slides for protocol layering and network applications
Networking Basics
Osi reference model and the tcp
OSI model and TCP/IP model
53426980 tcp-ip
02 protocol architecture
Internet1

What's hot (19)

PPT
Osi layer and network protocol
DOCX
Osi model
PPTX
Network and Protocol
PPT
IMD 251 - Networking
PPTX
computer network OSI layer
PDF
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
PPTX
Internetworking
PPTX
Introduction to computer networks
PPTX
Network protocol
PDF
Internetworking
PPTX
Application Layer
PPTX
Internetworking
PDF
Network protocols
PPTX
Windows network administration Basic theories
PPTX
Networking Standards And Protocols
PPTX
Computer Communication Architecture
PPT
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
PPT
Ta 104-tcp
Osi layer and network protocol
Osi model
Network and Protocol
IMD 251 - Networking
computer network OSI layer
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Internetworking
Introduction to computer networks
Network protocol
Internetworking
Application Layer
Internetworking
Network protocols
Windows network administration Basic theories
Networking Standards And Protocols
Computer Communication Architecture
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Ta 104-tcp
Ad

Viewers also liked (20)

PPTX
Comparation
PPTX
Evaluation question 4
PPTX
Age certificate presentation
PDF
Tilt Wall Projects
DOC
Kien tap
PPTX
DOC
العربيزي بين الواقع والمستقبل arabizi
PDF
Hair factor pdf
PDF
Desain presentasi soi
PPTX
Prezentacja SP3
PPTX
Evaluation question 6
PPT
Q2 final
PPT
Twitter tactics
PDF
Rm pecha cucha13
PPTX
ITG Investor Presentation February 2014
PPTX
Educ 100 powerpoint
DOCX
Los primeros pobladores del peru
DOCX
Cum să găteşti friptura perfectă
PPTX
Trabajo id 000336158
DOC
kế toán bán hàng và xác định kết quả kinh doanh
Comparation
Evaluation question 4
Age certificate presentation
Tilt Wall Projects
Kien tap
العربيزي بين الواقع والمستقبل arabizi
Hair factor pdf
Desain presentasi soi
Prezentacja SP3
Evaluation question 6
Q2 final
Twitter tactics
Rm pecha cucha13
ITG Investor Presentation February 2014
Educ 100 powerpoint
Los primeros pobladores del peru
Cum să găteşti friptura perfectă
Trabajo id 000336158
kế toán bán hàng và xác định kết quả kinh doanh
Ad

Similar to Manish Jha- Research Scholar- Internet Basics Requriement (20)

PPTX
Networking concepts by Sachidananda M H
PPTX
Computer_Network
PDF
Networking fundamentalsss
PPTX
Computer networking
PPTX
Internet Networking with its working.pptx
PPTX
Ch4 Protocols.pptx
PPTX
Ch4 Protocols.pptx
PPTX
Basics concept of network and internet mansi
PPTX
Networking fundamentals
PPTX
Chapter 1-2-Network Models_data_communication.pptx
PDF
CCNA project-report
PPT
Aplication layer functionality and protocols session 02PPT2-W1-S2-R0.ppt
PPTX
Data Communication and Newtworking 1 .pptx
PPTX
Data Communication and Newtworking 1 .pptx
PPT
OSI model (7 LAYER )
PDF
Unit 2 ppt-idc
PPT
chapter1.ppt
PDF
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
PPT
chapter6 intro to telecommunications.ppt
Networking concepts by Sachidananda M H
Computer_Network
Networking fundamentalsss
Computer networking
Internet Networking with its working.pptx
Ch4 Protocols.pptx
Ch4 Protocols.pptx
Basics concept of network and internet mansi
Networking fundamentals
Chapter 1-2-Network Models_data_communication.pptx
CCNA project-report
Aplication layer functionality and protocols session 02PPT2-W1-S2-R0.ppt
Data Communication and Newtworking 1 .pptx
Data Communication and Newtworking 1 .pptx
OSI model (7 LAYER )
Unit 2 ppt-idc
chapter1.ppt
Network Reference Model (Computer Networks) - Cybernetics Robo Academy
chapter6 intro to telecommunications.ppt

Recently uploaded (20)

PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
artificial intelligence overview of it and more
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Internet___Basics___Styled_ presentation
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Introduction to Information and Communication Technology
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
SAP Ariba Sourcing PPT for learning material
PptxGenJS_Demo_Chart_20250317130215833.pptx
artificial intelligence overview of it and more
Job_Card_System_Styled_lorem_ipsum_.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Slides PPTX World Game (s) Eco Economic Epochs.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
SASE Traffic Flow - ZTNA Connector-1.pdf
Internet___Basics___Styled_ presentation
Design_with_Watersergyerge45hrbgre4top (1).ppt
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Power Point - Lesson 3_2.pptx grad school presentation
Introduction to Information and Communication Technology
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
WebRTC in SignalWire - troubleshooting media negotiation
RPKI Status Update, presented by Makito Lay at IDNOG 10

Manish Jha- Research Scholar- Internet Basics Requriement

  • 1. Prepared by Mr.Manish Jha Section Officer and faculty, University of Petroleum & Energy Studies,Dehradun
  • 2.  Modem- A device that enables a computer to transmit data over telephone lines.  Connector- A device that mating and demating electrical power connection.  Cables- It consists of bundle of wires with connector on the ends.  Adaptor- It is a physical device that allow to interface between one hardware to another interface hardware.  Circuits- is a specific path between to points by which signals can be carried out.  Switches- It is a network device that select a path or circuit to send unit of data to its next destination.  Leased Lines- It is a telephone line connection that has been used for private purpose
  • 3.  1. Hardware and Software Requirement  2. Protocol  Transmission Media  E-Mail
  • 4.  Protocol is a set of rules and procedure for communicating.  There are many protocols  Some Protocol works only at particular OSI.  Protocol can also work together is a suit.  How Protocol Works – Data is transmitted over the network and to be break down in a systematic steps. Each steps its own rules and procedure.
  • 5.  TCP/IP  X.25  Frame Relay  ATM 2  Sonet  Function of Protocol
  • 6.  The protocol steps must be carried out in a consistent order that is the same on every computer in the network. In the sending computer, these steps must be executed from the top down. In the receiving computer, these steps must be carried out from the bottom up.  The Sending Computer  Protocols at the sending computer:  Break the data into smaller sections, called packets, that the protocol can handle.  Add addressing information to the packets so that the destination computer on the network can determine that the data belongs to it.  Prepare the data for transmission through the NIC and out onto the network cable.
  • 7.  The Receiving Computer- Protocols at the receiving computer carry out the same series of steps in reverse order. They:  Take the data packets off the cable.  Bring the data packets into the computer through the NIC.  Strip the data packets of all the transmitting information that was added by the sending computer.  Copy the data from the packets to a buffer for reassembly.  Pass the reassembled data to the application in a usable form.  Both sending and receiving computers need to perform each step in the same way so that the data will have the same structure when it is received as it did when it was sent.
  • 8.  TCP/IP – It consists of multiple protocols, each of which transfer data across the network in a different form at with different option such as error checking.  X.25- It uses packet switching. Difference :-  TCP/IP has only end-to-end error checking and flow control; X.25 has error checking from node to node.  To compensate for the fact that a TCP/IP network is completely passive, TCP/IP has a more complicated flow control and window mechanism than X.25 has.  X.25 has tightly specified the electrical and link levels; TCP/IP is designed to travel over many different kinds of media, with many different types of link service.
  • 9.  Other protocols written specifically for the TCP/IP suite include:  SMTP (Simple Mail Transfer Protocol) E- mail.  FTP (File Transfer Protocol) For exchanging files among computers running TCP/IP.  SNMP (Simple Network Management Protocol) For network management.
  • 10. Types of Internet Protocol ?- A. Electronic Mail- SMTP,IMAP (Internet Message Access Protocol), POP3 (POST OFFICE PROTOCOL3) B. FTP C. HTTP- It allows to shown the web page in web broswer. D. Telnet E. Gopher F. Usenet What is Domain ? Role on Domain Name System . Role of DHCP- ( Dynamic Host Configuration Protocol)
  • 11.  Difference between TCP and IP. IP Addressing Domain Name Server
  • 12.  Domain Name Server  It’s a network service that translate “names” into IP Address.  Domain Name & Host Name  .com Yahoo -  .com google  ac.in upes  Host Name
  • 13.  IP uses 32 bits  1 byte= 8 bits  4 bytes= 32 bits  IP consists of 4 numbers and number always between 0 to 255.  It consists of two components –One component is network portion of the address.  Second component is Host portion of the address.
  • 14. Types of OSI Layers : 1. Application Layer 2. Presentation Layer 3. Session Layer 4. Transport Layer 5. Network Layer 6. Data Link Layer 7. Physical Layer
  • 15. OSI- Open System Interconnection was developed in 1984 by ISO (International Standard Organization) . OSI model is a set of seven layers that ensure that must travel from one device to another device over the network. In earlier it was called internetworking. Application Layer – This layer actually interact with the operating system or application whenever user transfer file,read message and perform other network activities
  • 16. Presentation Layer takes the data provided by the Application layer and converts it into a standard format that the other layers can understand. SESSION LAYER : The session layer tracks connections, also called sessions. The session layer should keep track of multiple file downloads requested by a particular FTP application, or multiple telnet connections from a single terminal client, or web page retrievals from a web server. TRANSPORT LAYER :-  DATA LINK LAYER  The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the link. To do this, the data link layer provides:
  • 17.  The upper layers of the OSI model represent software that implements network services like encryption and connection management.  The lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control.
  • 18.  PHYSICAL LAYER  The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. Network Layer of the OSI model known as OSI Network Layer has a role to carry data from the source address to destination address . Like, TCP/IP address.
  • 19.  Cloud computing is basically an Internet-based network made up of large numbers of  servers - mostly based on open standards, modular and inexpensive. Clouds contain  vast amounts of information and provide a variety of services to large numbers of  people. The benefits of cloud computing are Reduced Data Leakage, Decrease evidence  acquisition time, they eliminate or reduce service downtime, they Forensic readiness, they  Decrease evidence transfer time
  • 21.  History  The Cloud is a metaphor for the Internet, derived from its common depiction in network diagrams  (or more generally components which are managed by others) as a cloud outline.  The underlying concept dates back to 1960 when John McCarthy opined that "computation may  someday be organized as a public utility" (indeed it shares characteristics with service bureaus  which date back to the 1960s) and the term The Cloud was already in commercial use around  the turn of the 21st century. Cloud computing solutions had started to appear on the market,  though most of the focus at this time was on Software as a service.
  • 22.  Types of services:  These services are broadly divided into three categories:  Infrastructure-as-a-Service (IaaS)  Platform-as-a-Service (PaaS)  Software-as-a-Service (SaaS).
  • 23.  Types by visibility:  Public Cloud  Hybrid Cloud  Private Cloud
  • 24.  Public Clouds  A public cloud is one in which the services and infrastructure are provided off-site over the Internet. These clouds offer the greatest level of efficiency in shared resources; however, they are also more vulnerable than private clouds. A public cloud is the obvious choice  when :-  Our standardized workload for applications is used by lots of people, such as e-mail.  we need to test and develop application code.  we have SaaS (Software as a Service) applications from a vendor who has a well-implemented security strategy.  We need incremental capacity (the ability to add computer capacity for peak times).  We are doing collaboration projects.  We are doing an ad-hoc software development project using a Platform as a Service (PaaS) offering cloud.