UNIT-1
UNIT-1
Internet is a group of computer systems related from all around the world. And
it is a global network of billions of computers and other electronic devices. With
the Internet, it's possible to access almost any information, communicate with
anyone else in the world, and do much more.
The Internet is a worldwide connectivity of hundreds of thousands of computers
of various types that belong to multiple networks.
The Internet gives a huge variety of statistics and communique offerings, which
includes forums, databases, email, and hypertext. It is made of the neighborhood
to global personal, public networks connected through plenty of digital, wireless,
and networking technologies.
In the year 1991, a user-friendly internet interface was developed. Delphi was
the first national commercial online service to offer internet connectivity in July
1992.
Later in May 1995, all restrictions on commercial usage of the internet are lifted.
As a result, the internet has been able to diversify and grow swiftly.
Wi-Fi was first introduced in 1997.
The year is 1998, and Windows 98 is released. Smartphone use is widespread in
2007.
The 4G network is launched in 2009. The internet is used by 3 billion people
nowadays.
By 2030, there are expected to be 7.5 billion internet users and 500 billion
devices linked to the internet.
retrieval system searches for and locates data in a file, database, or other
collection of data.
3. File Transfer: The exchange of data files across computer systems is referred to
as file transfer. Using the network or internet connection to transfer or shift a file
from one computer to another is known as file transfer. To share, transfer, or
send a file or logical data item across several users and/or machines, both locally
and remotely, we use file transfer. Data files include – documents, multimedia,
pictures, text, and PDFs and they can be shared by uploading or downloading
them. To retrieve information from the internet, there are various services
available such as:
a. Gopher: A file retrieval application based on hierarchical, distributed
menus that is simple to use.
b. FTP (File Transfer Protocol): To share, transfer, or send a file or logical
data item across several users and/or machines, both locally and
remotely.
4. Web services: Web services are software that uses defined messaging protocols
and are made accessible for usage by a client or other web-based programs
through an application service provider’s web server. Web services allow
information to be exchanged across web-based applications. Using Utility
Computing, web services can be provided.
9. Time Services: Using facilities included in the operating system, you may set your
computer clock via the Internet. Some services are :
a. Network Time Protocol (NTP): It is a widely used internet time service
that allows you to accurately synchronize and adjust your computer
clock.
b. The Simple Network Time Protocol (SNTP): It is a time-keeping protocol
that is used to synchronize network hardware. When a full
implementation of NTP is not required, then this simplified form of NTP
is typically utilized.
11.News Group: It is a lively Online Discussion Forum that is easily accessible via
Usenet. Each newsgroup contains conversations on a certain topic, as indicated
by the newsgroup name. Users can use newsreader software to browse and
follow the newsgroup as well as comment on the posts. A newsgroup is a debate
about a certain topic made up of notes posted to a central Internet site and
distributed over Usenet, a global network of news discussion groups. It uses
Network News Transfer Protocol (NNTP).
Advantages:
E-mail: Email is now an essential communication tools in business. With e-mail
you can send and receive instant electronic messages, which work like writing
letters. Your messages are delivered instantly to people anywhere in the world,
unlike traditional mail that takes a lot of time. Email is free, fast and very cheap
when compared to telephone, fax and postal services.
24 hours a day - 7 days a week: Internet is available, 24x7 days for usage.
Online Chat: You can access many ‘chat rooms’ on the web that can be used to
meet new people, make new friends, as well as to stay in touch with old friends.
You can chat in MSN and yahoo websites.
Services: Many services are provided on the internet like net banking, job
searching, purchasing tickets, hotel reservations, guidance services on array of
topics engulfing every aspect of life.
E-commerce: Along with getting information on the Internet, you can also shop
online. There are many online stores and sites that can be used to look for
products as well as buy them using your credit card. You do not need to leave
your house and can do all your shopping from the convenience of your home. It
has got a real amazing and wide range of products from household needs,
electronics to entertainment.
Limitations of Internet
Theft of Personal information: Electronic messages sent over the Internet can
be easily snooped and tracked, revealing who is talking to whom and what they
are talking about.
If you use the Internet, your personal information such as your name, address,
credit card, bank details and other information can be accessed by unauthorized
persons.
Virus threat: Today, not only are humans getting viruses, but computers are also.
Computers are mainly getting these viruses from the Internet. Virus is a program
which disrupts the normal functioning of your computer systems.
2. Leased Connection
A leased line, sometimes called a dedicated line, is a dedicated point-to-point link
and fixed-bandwidth data connection.
A leased line is not a dedicated cable. It is a reserved dedicated leased line circuit
(either a copper or a fiber optic cable) between two points.
The leased line transfers data in both directions using a full-duplex transmission.
It uses two pairs of wires (full-duplex cable), that each wire is used in a
unidirectional transmission of data network.
A leased line is not a long physical cable extended to two or more locations as
others perceived. It uses a specialized switching device that acts as a signal
booster to make the connection a point-to-point link and reach a remote
destination.
Organizations are not building their infrastructure to create a dedicated
connection to their other branches as it is expensive and difficult to implement.
They use the infrastructure of an Internet Service Provider on a fixed monthly
fee, which is why it is called a leased line.
The below diagram shows how the leased line connects two branches:
3. Broadband Connection
Broadband refers to high-speed internet access that is faster than traditional dial-
up access. It is provided through either cable or telephone composition.
It does not require any telephone connection that’s why here we can use
telephone and internet connection simultaneously.
In this connection, more than one person can access the internet connection
simultaneously.
It is a wide bandwidth data transmission that transports several signals and traffic
types.
In this connection, the medium used is coaxial cable, optical fiber cable, radio, or
twisted pair cable.
4. Wi-fi
As the name suggests wireless connection does not use telephone lines or cables
to connect to the internet.
The wireless connection uses a radio frequency band to connect to the internet.
It is also an always-on connection and this connection can be accessed from
anywhere and speed may vary for different locations.
It ranges from 5Mbps to 20Mbps.
5. Mobile Broadband
Mobile broadband is the marketing term for wireless Internet access via mobile
networks. \Access to the network can be made through a portable
modem, wireless modem, or a tablet/smartphone (possibly tethered) or other
mobile device.
The first wireless Internet access became available in 1991 as part of the second
generation (2G) of mobile phone technology.
Mobile broadband is the marketing term for wireless Internet access delivered
through cellular towers to computers and other digital devices using portable
modems.
Although broadband has a technical meaning, wireless-carrier marketing uses
the phrase "mobile broadband" as a synonym for mobile Internet access.
Some mobile services allow more than one device to be connected to the
Internet using a single cellular connection using a process called tethering.
6. Mobile Hotspot
A mobile hotspot (sometimes called a portable hotspot) is a hotspot that’s just
that—mobile! While a “regular” Wi-Fi hotspot is tied to a physical location, you
can create a mobile hotspot by using your smartphone’s data connection to
connect your laptop to the Internet. This process is called “tethering.”
Hotspots utilize Wi-Fi technology, which allows electronic devices to connect to
the Internet or exchange data wirelessly through radio waves.
Hotspots can be phone-based or free-standing, commercial or free to the
public.
Generally, two main components uphold the functionality of the Internet, they
are:
o Packets
o Protocols
In networking, the data which is being transmitted through the internet is sent
via small segments which are later translated into bits and the packets get routed
to their endpoint (destination) through different networking devices i.e. routers
or switches. Later, once the packet arrives at the receiver’s end, that small chunks
of data get reassembled in order to utilize or check the data that he/she
requested. That’s why they are used to push ease in networking and large data
can be easily sent by sending small units and this whole process of
sending/receiving small bits is known as Packet Switching.
Connecting two computers with the help of any communication method and to
solve this, protocols were introduced. It is a standardized method of performing
certain tasks and data formatting so that two or more devices can communicate
with each other. However, if both systems are connected over the same network
i.e. Ethernet for receiving and sending packets from network to network i.e. IP
(Internet Protocol), and to ensure that those packets are arriving successfully in
the same order (TCP), and for formatting data over websites and apps (HTTP).
Besides this, there are several other protocols for testing, routing, and
encryption, and for streaming games/videos, rather than using TCP, we
use UDP (User Datagram Protocol).
Firstly, you’ll be required to connect your system or PC with any router or modem
to establish a connection. This connection is the base of the connection.
When you open the browser and start typing something like “www.google.com”,
your system will push a query command to your ISP (Internet Service Provider)
that is connected with other servers that store and process data.
Now, the web browser will start indexing the URL that you’ve entered and will
fetch the details in numeric format (in their own language to identify the
address (unique) that you’re trying to reach.
Next is, now your browser will start sending the HTTP request where you’re
trying to reach and sends a copy of the website on the user’s system. Note: The
server will send data in the form of small packets (from the website to the
browser)
Once all the data (of small packets) will be received at the user’s end (PC/Laptop),
the browser will start arranging all those small packets and later will form a
collective file (here, the browser will gather all the small packets and rearrange
them just like a puzzle) and then you’ll be able to see the contents of that website