0% found this document useful (0 votes)
15 views59 pages

Unit VI - Internet & Services

The document provides an overview of the Internet, detailing its definition, history, and architecture. It discusses the control of the Internet, various connection types, and the significance of IP addresses and the Domain Name System (DNS). Additionally, it covers the evolution from IPv4 to IPv6 and the hierarchical structure of domain names.

Uploaded by

pokhrelrupak948
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views59 pages

Unit VI - Internet & Services

The document provides an overview of the Internet, detailing its definition, history, and architecture. It discusses the control of the Internet, various connection types, and the significance of IP addresses and the Domain Name System (DNS). Additionally, it covers the evolution from IPv4 to IPv6 and the hierarchical structure of domain names.

Uploaded by

pokhrelrupak948
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

INTERNET & SERVICES

INTRODUCTION

• By definition the Internet is a worldwide, publicly accessible series of


interconnected computer networks that transmit data by packet switching using the
standard Internet Protocol.
• The Internet is a vast network that connects computers all over the world. Through the
Internet, people can share information and communicate from anywhere with an Internet
connection.
HISTORY OF INTERNET

• The Internet consists of technologies developed by different individuals and organizations.


• Important figures include Robert W. Taylor, who led the development of the ARPANET (an early prototype
of the Internet), and Vinton Cerf and Robert Kahn, who developed the Transmission Control
Protocol/Internet Protocol (TCP/IP) technologies.
• Although the basic applications and guidelines that make the Internet possible had existed for almost a
decade, the network did not gain public face until the 1990s. On August 6, 1991, the European
Organization for Nuclear Research, (CERN), which straddles the border between France and Switzerland,
publicized the new World Wide Web project.
• The web was invented by English scientist Tim Berners-Lee in 1989.

Detailed History
WHO CONTROLS THE INTERNET?

• While the Internet is theoretically decentralized and thus controlled by no single entity,
many argue that tech companies such as Amazon, Facebook, and Google represent a
small concentration of organizations that have unprecedented influence over the
information and money on the Internet. In some countries, certain parts of the Internet
are blocked via censorship.
INTERNET ARCHITECTURE

• The architecture of the Internet is ever-changing due to


continuous changes in the technologies as well as the nature of
the service provided. The heterogeneity and vastness of the
Internet make it difficult to describe every aspect of its
architecture.
• The overall architecture can be described in three levels −
1. Backbone ISP (Internet Service Provider)
2. Regional ISPs
3. Clients

The following diagram shows the three levels −>


INTERNET ARCHITECTURE

• Backbone ISP (Internet Service Provider) − Backbone ISPs are large international backbone networks.
They are equipped with thousands of routers and store enormous amounts of information in data
centers, connected through high bandwidth fiber optic links. Everyone needs to connect with a
backbone ISP to access the entire Internet.
• There are different ways through which a client can connect to the ISP. A commonly used way is DSL
(Digital Subscriber Line) which reuses the telephone connection of the user for transmission of digital
data. The user uses a dial-up connection instead of the telephone call. Connectivity is also done by
sending signals over cable TV system that reuses unused cable TV channels for data transmission. For
high-speed Internet access, the connectivity can be done through FTTH (Fiber to the Home), that uses
optical fibers for transmitting data. Nowadays, most Internet access is done through the wireless
connection to mobile phones from fixed subscribers, who transmit data within their coverage area.
CONNECTING THE INTERNET

• To be able to connect your computer to the Internet you require:


 A TCP/IP enabled computer.
 Software (like web browser).
 An account with an ISP.
 Connection line (telephone line , coaxial cable or fiber connection),
 Hardware (like modem or Network Interface Card (NIC) to connect compare to the
network Governing bodies of Internet Functions
INTERNET CONNECTIONS

• There exist several ways to connect to the internet. Following are these connection types available:
1. Dial-up Connection
2. Leased Line
3. ISDN
4. DSL
5. Cable TV Internet connections
6. Satellite Internet connections
7. Wireless Internet Connections
INTERNET CONNECTIONS

• Dial-up Connection
• Dial-up connection uses telephone line to connect PC to the
internet. It requires a modem to setup dial-up connection. This
modem works as an interface between PC and the telephone
line.
• There is also a communication program that instructs the
modem to make a call to specific number provided by an ISP.
• Dial-up connection uses either of the following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
• The following diagram shows the accessing internet using
modem:
INTERNET CONNECTIONS

• Leased Line
• A leased line is a dedicated, fixed-bandwidth data connection. It allows data-hungry
businesses to have a reliable, high-quality internet connection with guarantees of upload
and download speed, uptime and resilience. “Leased” refers to the connection which is
rented by the Internet Service Provider (ISP) directly to a business, resulting in a service
above and beyond what standard broadband provides.
INTERNET CONNECTIONS

• ISDN
• ISDN is acronym of Integrated Services Digital Network. It
establishes the connection using the phone lines which carry digital
signals instead of analog signals.
• There are two techniques to deliver ISDN services:

1. Basic Rate Interface (BRI)


2. Primary Rate Interface (PRI)
INTERNET CONNECTIONS

• ISN
• Key points:
• The BRI ISDN consists of three distinct channels on a
single ISDN line: t1o 64kbps B (Bearer) channel and one
16kbps D (Delta or Data) channels.
• The PRI ISDN consists of 23 B channels and one D
channels with both have operating capacity of 64kbps
individually making a total transmission rate of 1.54Mbps.
• The following diagram shows accessing internet using
ISDN connection:
INTERNET CONNECTIONS

• DSL
• DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it
provides connection over ordinary telephone lines.
• Following are the several versions of DSL technique available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
7. All of the above mentioned technologies differ in their upload and download speed, bit transfer
rate and level of service.
INTERNET CONNECTIONS

• Satellite Internet Connection


• Satellite Internet connection offers high speed connection to
the internet. There are two types of satellite internet
connection: one way connection or two way connection.
• In one way connection, we can only download data but if we
want to upload, we need a dialup access through ISP over
telephone line.
• In two way connection, we can download and upload the
data by the satellite. It does not require any dialup
connection.
INTERNET CONNECTIONS

• Wireless Internet Connection


• Wireless Internet Connection makes use of radio frequency bands to connect to the internet
and offers a very high speed. The wireless internet connection can be obtained by either WiFi
or Bluetooth.
• Key Points:
• Wi Fi wireless technology is based on IEEE 802.11 standards which allow the electronic
device to connect to the internet.
• Bluetooth wireless technology makes use of short-wavelength radio waves and helps to
create personal area network (PAN).
INTERNET PROTOCOL (IP)

• An IP address is a unique address that identifies a device on the internet or a local network. IP
stands for "Internet Protocol," which is the set of rules governing the format of data sent via
the internet or local network.
• In essence, IP addresses are the identifier that allows information to be sent between devices
on a network: they contain location information and make devices accessible for
communication. The internet needs a way to differentiate between different computers,
routers, and websites. IP addresses provide a way of doing so and form an essential part of
how the internet works.
• An IP address is a string of numbers separated by periods. IP addresses are expressed as a set
of four numbers — an example address might be 192.158.1.38. Each number in the set can
range from 0 to 255. So, the full IP addressing range goes from 0.0.0.0 to 255.255.255.255
INTERNET PROTOCOL (IP)

• The IP address have the following characteristics ;in common.


 IP address are unique.
 No two machine can have the same IP number.
 IP address are also global and standardized.
 All machines connected to the Internet agree to use the same scheme for establishing an
address.
18 IP ADDRESSING

• IPv4: 32-bit addresses


• Usually written in dotted notation, e.g. 192.168.21.76
• Each number is a byte
• Stored in Big Endian order

0 8 16 24 31
Decimal 192 168 21 76

Hex C0 A8 15 4C

Binary 11000000 10101000 00010101 01001100


IP ADDRESSING AND FORWARDING

• Routing Table Requirements


• For every possible IP, give the next hop
• But for 32-bit addresses, 232 possibilities!
• Too slow: 48GE ports and 4x10GE needs 176Gbps bandwidth
DRAM: ~1-6 Gbps; TCAM is fast, but 400x cost of DRAM

• Hierarchical address scheme


• Separate the address into a network and a host
0 31
Pfx Network Host

Known by all Known by edge


routers (LAN) routers
CLASSES OF IP ADDRESSES
0 1 8 16 24 31
• Class A Example: MIT
0 Ntwk Host
18.*.*.*

1-126
0 2 8 16 24 31
Example: NEU
 Class B 10 Network Host
129.10.*.*
128-191
0 3 8 16 24 31
Example:
 Class C 110 Network Host
216.63.78.*

192-223
CLASS SIZES

Way too big


Class Prefix Networ Number of Classes Hosts per Class
Bits k Bits
A 1 7 27 – 2 = 126 224 – 2 = 16,777,214
(0 and 127 are reserved) (All 0 and all 1 are reserved)
B 2 14 214 = 16,398 216 – 2 = 65,534
(All 0 and all 1 are reserved)
C 3 21 221 = 2,097,512 28 – 2 = 254
(All 0 and all 1 are reserved)
Total: 2,114,036

Too many Too small to


network IDs be useful
SUBNETS

• Problem: need to break up large A and B classes


• Solution: add another layer to the hierarchy
• From the outside, appears to be a single network
• Only 1 entry in routing tables
• Internally, manage multiple subnetworks
• Split the address range using a subnet mask

Pfx Ntwk Subnet Host


Subnet Mask: 11111111 11111111 11000000 00000000
INTERNET PROTOCOL (IP)

• IPV6
• IPv6 is the latest version of the Internet Protocol, which identifies devices across the internet so they can be
located. Every device that uses the internet is identified through its own IP address in order for internet
communication to work. In that respect, it’s just like the street addresses and zip codes you need to know in
order to mail a letter.
• The previous version, IPv4, uses a 32-bit addressing scheme to support 4.3 billion devices, which was
thought to be enough at the time it was implemented. However, with the growth of the internet, personal
computers, smartphones and now Internet of Things, it became clear that the world needed more addresses.
• Fortunately, the Internet Engineering Task Force (IETF) recognized this nearly 25 years ago. In 1998, it created
IPv6, which instead uses 128-bit addressing to support approximately 340 trillion trillion (or 2 to the 128th
power). Instead of the IPv4 address method of four sets of one- to three-digit numbers, IPv6 uses eight groups of
four hexadecimal digits, separated by colons.
INTERNET PROTOCOL (IP)
DOMAIN NAME SYSTEM (DNS)

• The Domain Name System (DNS) is the Internet's system for mapping alphabetic names
to numeric Internet Protocol (IP) addresses like a phone book maps a person's name to
a phone number.

• DNS, or the Domain Name System, translates human readable domain names (for
example, www.amazon.com) to machine readable IP addresses (for example,
192.0.2.44).
• For example, when a Web address (URL) is typed into a browser, a DNS query is made
to learn an IP address of a Web server associated with that name.
DOMAIN NAME SYSTEM (DNS)

• Name space
The name assigned to a machine must be unique because the addresses are unique. A name space that maps
each address to a unique name cab be organised in two ways:
 Flat name space
 Hierarchical name space
• Flat Name Space
In flat name space, a name is provided to an address. The name is this space is a sequence of
characters without structure. (like com1,com2 etc). The main disadvantages of flat name space is that it
cannot be used in large system such as internet as it must be centrally controlled to avoid the ambiguity
and duplication. Hierarchical name space overcomes the disadvantages of flat name space.
DOMAIN NAME SYSTEM (DNS)

• Hierarchical name space


• In Hierarchical Name Space, each name is made of several parts in a tree structure and
each part is separated by dot (.) eg www.ict.tu.edu.np
 First Part – nature of the organization (edu: education)
 Second Part – Name (tu : tribhuban university)
 Third Part – department( ict:: information and communication technology department)
 So the authority to assign and control the name space can be determined.
 Suffix can be added to the name to define the host or resources.
DOMAIN NAME SYSTEM (DNS)

• The DNS Name Space


The DNS name space is a hierarchical name space in which the names are defined
inverted-tree structure with the root at the top.
The tree can have only 128 levels, level 0 to level 127. The root glues the whole tree together,
each level of the tree define hierarch level.
This name space is also referred to as for Internet domain name space.
The address space is divided into different level of domains such as top level domain
subdomains. The internet is divided into over 200 top level domains where each domain covers
many hosts. The last portion of the domain name is the top-level domain name and describe the
type of organization holding that name. for example; in the domain name gmail.com, asp.net,
standford.edu, cancer.org, whitehouse.gou com, net, edu, org, and gov represents the top level
domain name.
DOMAIN NAME SYSTEM (DNS)

• The DNS Name Space


• Each domain is partitioned into subdomains, these are further partitioned and so on. All
these represents by the tree. The leaves of tree represent the domains that have no
subdomains. A leaf domain may contain a single host or it may represent a company; and
thousand of hosts. The top level domain come in two flavors :
 Generic
 Country
DOMAIN NAME SYSTEM (DNS)
DOMAIN NAME SYSTEM (DNS)

• The Organizational generic domains such as com, gov, edu, org etc and listed as below:
• com: commercial organization
• int: International organizations Some new generic domains are:
• biz: Business
• gov: Government institutions • info: Information
• name: Peoples' name
• edu: Educational institutions .
• pro: Professional such as doctor, layer
• mil: U.S. military institutions. • aero: Aerospace industries
• coop: Co-operative
• net: Networking organizations • museum: Museums
• org: Non-profit organizations
DOMAIN NAME SYSTEM (DNS)

• The advantages of domain names are as follows:


 Domain names tend to be memorable, so that people can find and return to the site. For
example if the organization manufactures widgets, it would probably choose
“Widgets.com”.
 The domain name is unique and cannot be used by anyone else anywhere in the world.
 It gives the organization tremendous mileage in terms of image and memorability of the
Internet address.
CLIENT SERVER ARCHITECTURE

• The Client-server model is a distributed application


structure that partitions task or workload between the
providers of a resource or service, called servers, and
service requesters called clients.
• In the client-server architecture, when the client
computer sends a request for data to the server through
the internet, the server accepts the requested process
and deliver the data packets requested back to the client.
• Clients do not share any of their resources. Examples of
Client-Server Model are Email,World Wide Web, etc.
HOW THE CLIENT-SERVER MODEL WORKS ?

• In this article we are going to take a dive into the Client-Server model and have a look at how
the Internet works via, web browsers. This article will help us in having a solid foundation of the WEB and help in
working with WEB technologies with ease.
• Client: When we talk the word Client, it mean to talk of a person or an organization using a particular service.
Similarly in the digital world a Client is a computer (Host) i.e. capable of receiving information or using a particular
service from the service providers (Servers).
• Servers: Similarly, when we talk the word Servers, It mean a person or medium that serves something. Similarly in
this digital world a Server is a remote computer which provides information (data) or access to particular services.
• So, its basically the Client requesting something and the Server serving it as long as its present in the database.
HYPER TEXT TRANSFER PROTOCOL (HTTP)

• Definition : The Hypertext Transfer Protocol is an application protocol for distributed, collaborative,
hypermedia information systems that allows users to communicate data on the World Wide Web.
• Purpose : HTTP was invented alongside HTML to create the first interactive, text-based web browser: the
original World Wide Web.Today, the protocol remains one of the primary means of using the Internet.
• How HTTP works : As a request-response protocol, HTTP gives users a way to interact with web resources
such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally
use Transmission Control Protocol (TCP) connections to communicate with servers.
• HTTP utilizes specific request methods in order to perform various tasks. All HTTP servers use the GET and
HEAD methods, but not all support the rest of these request methods:
HYPER TEXT TRANSFER PROTOCOL (HTTP)
(HOW HTTP WORKS)

• GET requests a specific resource in its entirety


• HEAD requests a specific resource without the body content
• POST adds content, messages, or data to a new page under an existing web resource
• PUT directly modifies an existing web resource or creates a new URI if need be
• DELETE gets rid of a specified resource
• TRACE shows users any changes or additions made to a web resource
• OPTIONS shows users which HTTP methods are available for a specific URL
• CONNECT converts the request connection to a transparent TCP/IP tunnel
• PATCH partially modifies a web resource
FILE TRANSFER PROTOCOL (FTP)

• File Transfer Protocol(FTP) is an application layer


protocol that moves files between local and
remote file systems. It runs on the top of TCP,
like HTTP. To transfer a file, 2 TCP connections
are used by FTP in parallel: control connection
and data connection.
HOW FTP WORKS?

• FTP works on the client server model. FTP client is a program running on the user’s computer that enables the user to
talk to and get the files from remote computers. FTP server is the remote computer or the host computer from
which files are accessed by the FTP client.
• The FTP client –server works as fallows:
 The FTP client gives the ftp command with the addresses of FTP server, using a URL.
 When the FTP client gets connected to FTP server the user enters the User Login and password. A user can login to a
FTP server even if they don’t have an account on the FTP server. For this the user uses the anonymous login, where
the User Login is anonymous and password is the email address of the FTP client.
 FTP servers verifies the user login and password to allow the FTP client to access its files.
 FTP client gets the requested files and quits.
WORLD WIDE WEB (WWW)

• World Wide Web is an architecture framework for accessing interlinked hypertext documents spread out
over millions of computers all over the internet.
• Information in WWW as a collection of documents that are interconnected with each other via links.
• The interconnected documents may be located on one or more than one computer worldwide thus the
name world wide web.
• WWW uses the concept of hypertext and hyper media.
• In hyper text environment information is stored in the form of documents that are linked together.
• In hyper media document can contain pictures , graphics, animation and sound.
WORLD WIDE WEB (WWW)

• Features of WWW :
• HyperText Information System
• Cross-Platform
• Distributed
• Open Standards and Open Source
• Uses Web Browsers to provide a single interface for many services
• Dynamic, Interactive and Evolving.
• “Web 2.0”
HOW WWW WORKS?

• The World Wide Web is based on several different technologies: Web browsers,
Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
• A Web browser is used to access web pages. Web browsers can be defined as programs
which display text, data, pictures, animation and video on the Internet. Hyperlinked
resources on the World Wide Web can be accessed using software interfaces provided
by Web browsers. Initially, Web browsers were used only for surfing the Web but now
they have become more universal. Web browsers can be used for several tasks including
conducting searches, mailing, transferring files, and much more. Some of the commonly
used browsers are Internet Explorer, Opera Mini, and Google Chrome.
REMOTE LOGIN (TELNET_

• Telnet, developed in 1969, is a protocol that provides a command line interface for communication with a
remote device or server, sometimes employed for remote management but also for initial device setup like
network hardware.
• Telnet stands for Teletype Network, but it can also be used as a verb; 'to telnet' is to establish a connection
using the Telnet protocol.
• Because it was developed before the mainstream adaptation of the internet, Telnet on its own does not employ
any form of encryption, making it outdated in terms of modern security.
• It has largely been overlapped by Secure Shell (SSH) protocol (which has its own security considerations
around remote access), at least on the public internet, but for instances where Telnet is still in use, there are a
few methods for securing your communications.
WEB BROWSER

• Web Browser is a client program that runs on an Internet-connected computer and uses
the Hypertext Transport Protocol (HTTP) to connect to Web servers. Web browsers are
of two kinds: text-only browsers and graphical Web browsers.
• Basic web browsers examples are Microsoft Internet Explorer, Google Chrome, Mozilla
Firefox, and Apple Safari.
UNIFORM RESOURCE LOCATOR (URL)

• URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given
unique resource on the Web.
• In theory, each valid URL points to a unique resource. Such resources can be an HTML page, a
CSS document, an image, etc.
• In practice, there are some exceptions, the most common being a URL pointing to a resource
that no longer exists or that has moved. As the resource represented by the URL and the
URL itself are handled by the Web server, it is up to the owner of the web server to carefully
manage that resource and its associated URL.
• Examples of URL :https://developer.mozilla.org
• https://developer.mozilla.org/en-US/docs/Learn/
• https://developer.mozilla.org/en-US/search?q=URL
SEARCH ENGINE

• A search engine is a software system designed to carry out web searches.


• They search the World Wide Web in a systematic way for particular information specified
in a textual web search query.T
• he search results are generally presented in a line of results, often referred to as search
engine results pages (SERPs). The information may be a mix of links to web pages, images,
videos, infographics, articles, research papers, and other types of files.
• Google, Excite, Lycos,AltaVista, Infoseek, and Yahoo are all search engines.
STATIC VS DYNAMIC WEBPAGES

• Static Web pages:


Static Web pages are very simple. It is written in languages such as HTML, JavaScript, CSS, etc. For
static web pages when a server receives a request for a web page, then the server sends the response to
the client without doing any additional process. And these web pages are seen through a web browser. In
static web pages, Pages will remain the same until someone changes it manually.
• Dynamic Web Pages
Dynamic web pages , websites are constructed “on the fly” when a page is requested from web
browser. These are written in languages such as CGI, AJAX, ASP, ASP.NET, etc. In dynamic web pages, the
Content of pages is different for different visitors. It takes more time to load than the static web page.
Dynamic web pages are used where the information is changed frequently, for example, stock prices,
weather information, etc.
E COMMERCE

• The term electronic commerce (ecommerce) refers to a business model that allows
companies and individuals to buy and sell goods and services over the Internet.
• Ecommerce operates in four major market segments and can be conducted over
computers, tablets, smartphones, and other smart devices.
• Nearly every imaginable product and service is available through ecommerce
transactions, including books, music, plane tickets, and financial services such as stock
investing and online banking.As such, it is considered a very disruptive technology.
E COMMERCE

• These business transactions can be done in four ways:


Business to Business (B2B), Business to Customer
(B2C), Customer to Customer (C2C), Customer to
Business (C2B).
• The standard definition of E-commerce is
a commercial transaction which is happened over the
internet. Online stores like Amazon, Flipkart, Shopify,
Myntra, Ebay, Quikr, Olx are examples of E-commerce
websites. By 2020, global retail e-commerce can reach
up to $27 Trillion.
E COMMERCE ADVANTAGES

• E-commerce provides the sellers with a global reach. They remove the barrier of place
(geography). Now sellers and buyers can meet in the virtual world, without the hindrance of
location.
• Electronic commerce will substantially lower the transaction cost. It eliminates many fixed
costs of maintaining brick and mortar shops. This allows the companies to enjoy a much
higher margin of profit.
• It provides quick delivery of goods with very little effort on part of the
customer. Customer complaints are also addressed quickly. It also saves time, energy and
effort for both the consumers and the company.
• One other great advantage is the convenience it offers. A customer can shop 24×7. The
website is functional at all times, it does not have working hours like a shop.
ECOMMERCE DISADVANTAGES

• The start-up costs of the e-commerce portal are very high. The setup of the hardware and the software, the
training cost of employees, the constant maintenance and upkeep are all quite expensive.
• Although it may seem like a sure thing, the e-commerce industry has a high risk of failure. Many companies
riding the dot-com wave of the 2000s have failed miserably.The high risk of failure remains even today.
• At times, e-commerce can feel impersonal. So it lacks the warmth of an interpersonal relationship which is
important for many brands and products. This lack of a personal touch can be a disadvantage for many types
of services and products like interior designing or the jewelry business.
• Security is another area of concern. Only recently, we have witnessed many security breaches where the
information of the customers was stolen. Credit card theft, identity theft etc. remain big concerns with the
customers.
E GOVERNANCE

• Electronic governance or e-governance is the application of information


technology for delivering government services, exchange of information, communication
transactions, integration of various stand-alone systems between government to citizen
(G2C), government-to-business (G2B), government-to-government (G2G), government-
to-employees (G2E) as well as back-office processes and interactions within the entire
governance framework.
• Through e-governance, government services are made available to citizens through IT.
The three main target groups that can be distinguished in governance concepts are
government, citizens, and businesses/interest groups
SMART CITY

• A smart city is a technologically modern urban area that uses different types
of electronic methods, voice activation methods and sensors to collect specific data.
• Information gained from that data is used to manage assets, resources and services efficiently; in return,
that data is used to improve operations across the city.
• This includes data collected from citizens, devices, buildings and assets that is processed and analyzed to
monitor and manage traffic and transportation systems, power plants, utilities, water supply
networks, waste, crime detection, information systems, schools, libraries, hospitals, and other
community services.
• Smart cities are defined as smart both in the ways in which their governments harness technology as
well as in how they monitor, analyze, plan, and govern the city.
SMART CITY FEATURES

• Combining automation, machine learning and the IoT is allowing for the adoption of smart city technologies for a
variety of applications. For example, smart parking can help drivers find a parking space and also allow for digital
payment.
• Another example would be smart traffic management to monitor traffic flows and optimise traffic lights to reduce
congestion, while ride-sharing services can also be managed by a smart city infrastructure.
• Smart city features can also include energy conservation and environmental efficiencies, such as streetlights that
dim when the roads are empty. Such smart grid technologies can improve everything from operations to
maintenance and planning to power supplies.
• Smart city initiatives can also be used to combat climate change and air pollution as well as waste management and
sanitation via internet-enabled rubbish collection, bins and fleet management systems.
• Aside from services, smart cities allow for the provision of safety measures such as monitoring areas of high crime
or using sensors to enable an early warning for incidents like floods, landslides, hurricanes or droughts.
CENSORSHIP AND PRIVACY ISSUE

• Internet censorship is the control or suppression of what can be accessed, published,


or viewed on the Internet enacted by regulators, or on their own initiative.
• Internet censorship puts restrictions on what information can be put on the internet or
not.
• Individuals and organizations may engage in self-censorship for moral, religious, or
business reasons, to conform to societal norms, due to intimidation, or out of fear of
legal or other consequences.
CENSORSHIP AND PRIVACY ISSUE

• The definition of online privacy is the level of privacy protection an individual has while
connected to the Internet.
• It covers the amount of online security available for personal and financial
data, communications, and preferences.
• Internet users often attempt to increase online privacy through anti-virus software, strong
password choices, turning off tracking, reviewing site security, and opting for stricter privacy
settings.
• Risks to online privacy range from phishing scams to malware, while problems with website
security may result in identity theft.
CENSORSHIP AND PRIVACY ISSUE

• Three major issues concerning online privacy


 Spying and snooping
 Information Mishandling
 Location Tracking
THANK YOU
DETAILED HISTORY OF INTERNET

• The Internet’s origin have their roots in a military project, the Semi-Automatic Ground Environment (SAGE)
program, which networked country-wide radar systems together for the first time. This was created around 1958
as part of an attempt to regain the lead in technology from the Soviet Union which had recently launched Sputnik.
• J.C.R. Licklider was selected to head the committee which controlled the SAGE project. He envisioned universal
networking as a unifying human revolution. Licklider recruited Lawrence Roberts to head a project which
implemented a network. Roberts had worked with the U.S. Air Force on a packet switching system as opposed to
a circuit switching system. On October 29, 1969, Licklider and Roberts interconnected the first two nodes
between UCLA and SRI International at Menlo Park, California. This was the beginning of the Advanced Research
Projects Agency Network (ARPANET) which was one of the key networks which our Internet today was based off
of. Soon after the first international packet-switched network service was created between U.S. and U.K.
DETAILED HISTORY OF INTERNET

• Vint Cerf and Bob Kahn developed the first description of TCP (covered more deeply in the Introduction
to Networking lesson) in 1973. The term “Internet” was first used in 1974 to describe a single global
TCP/IP network detailed in the first full specification of TCP written by Cerf and his colleagues. The first
TCP/IP-wide area network was created on January 1, 1983 when all hosts on the ARPANET were switched
over from the older protocols to TCP/IP.
• In 1984, the National Science Foundation (NSF) commissioned the construction of a 1.5 megabit/second
network which became known as NSFNET. In 1989 the US Federal Networking Council approved the
interconnection of the NSFNET to the commercial MCI Mail system.

You might also like