0% found this document useful (0 votes)
78 views27 pages

WP Lec1 Segment

The document discusses internetworking, which connects independent computer networks to facilitate communication and resource sharing. It covers types of internetworks such as intranet, extranet, and the internet, along with the history and architecture of the internet. Additionally, it explains various protocols like TCP/IP, HTTP, and FTP that govern data transmission and communication over networks.

Uploaded by

ai6209255
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views27 pages

WP Lec1 Segment

The document discusses internetworking, which connects independent computer networks to facilitate communication and resource sharing. It covers types of internetworks such as intranet, extranet, and the internet, along with the history and architecture of the internet. Additionally, it explains various protocols like TCP/IP, HTTP, and FTP that govern data transmission and communication over networks.

Uploaded by

ai6209255
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Internet Fundamental

Md. Sabbir Ejaz


Assistant Professor, ICE
Internetworking

• Internetworking refers to the process of connecting two or more independent


computer networks to form a larger network, often called an internetwork. This
allows devices on different networks to communicate with each other, sharing
resources and data.

• Internetworking aims to establish a seamless and cohesive network


environment in which data can transfer efficiently and effectively across several
interconnected networks, regardless of their underlying technologies or
architectures.

2
Internetworking

The three types of internetworking are as follows:


• Extranet
• Intranet
• Internet

3
Intranet

• An Intranet is a local area network that has been designed for use within an
organization by its employees to share information as well as work together.

• It is a private and internal network within a company that uses internet protocols and
technology to allow employees or members to share information, resources, and
services.

• It functions similarly to the internet but is limited to the members of the organization.

• It operates under the jurisdiction of a single administrative entity. This entity restricts
external access to the network, permitting entry exclusively to designated users.

4
Extranet

• In computer networks, an extranet refers to a controlled and secure extension


of an organization's internal network that allows authorized external parties,
such as clients, partners, suppliers, or customers, to access certain resources,
services, and information.

• It is a network of internetwork that is restricted in scope to one organization or


entity but also has restricted links to the networks of one or more other
organizations or entities at times, but not always.

5
Internet

The Internet, sometimes called simply "the Net" is a worldwide system of


computer networks -- a network of networks in which users at any one computer
can get information from any other computer if they have permission.

6
History of the Internet
• The Internet started in the 1960s as a way for government researchers to share
information.

• The ARPANet, the predecessor of the Internet, was first deployed in 1969. It was
created by the Advanced Research Projects Agency (ARPA) of the U.S. Department
of Defense. Established the first host-to-host network connection.

• In 1983, the ARPANet transitioned into using the TCP/IP open networking protocol
suite and January 1, 1983 is considered the official birthday of the Internet.

7
History of the Internet
• In 1985, the National Science Foundation Network (NSFN) designed the network to
connect university computer science departments around the country.

• Communications over the Internet greatly improved in 1989 when the Hypertext
Transfer Protocol (HTTP) was created, giving different computer platforms the ability to
connect to the same Internet sites.

• In 1993, the University of Illinois made widely available the Mosaic Web browser.

• The Internet has continued to grow and evolve over the years of its existence.

8
Uses of the internet
• In general, the Internet can be used to communicate across large or small distances,
share information from any place in the world and access information or answers to
almost any question in moments.

• Some specific examples of how the Internet is used include:


• Electronic mail

• Social Networking

• Research

• File Transfer

• Reading electronic newspapers and magazines

• Online shopping, or e-commerce.

• Etc. 9
Internet Architecture
• Internet architecture is a meta-network, which refers to a convention of
thousands of distinct networks interacting with a common protocol.

• In simple terms, it is referred as an inter-network that is connected using


protocols which connects any two networks that differ in hardware, software
and design.

10
How the Internet Works

Generally, two main components uphold the functionality of the Internet, they
are:

• Packets

• Protocols

11
Packet

• A packet is a small segment of a larger message. Each packet contains both data and
information about that data. The information about the packet's contents is known as
the "header" and it goes at the front of the packet so that the receiving machine
knows what to do with the packet.

• When data gets sent over the Internet, it is first broken up into smaller packets, which
are then translated into bits. The packets get routed to their destination by various
networking devices such as routers and switches. When the packets arrive at their
destination, the receiving device reassembles the packets in order and can then use or
display the data.
12
Packet

13
Protocols

• A protocol is a standardized way of doing certain actions and formatting data so that
two or more devices are able to communicate with and understand each other.

• There are protocols for sending packets between devices on the same network
(Ethernet), for sending packets from network to network (IP), for ensuring those
packets successfully arrive in order (TCP), and for formatting data for websites and
applications (HTTP). In addition to these foundational protocols, there are also
protocols for routing, testing, and encryption. And there are alternatives to the
protocols listed above for different types of content — for instance, streaming video
often uses UDP instead of TCP.
14
TCP/IP Protocols
• Transmission Control Protocol & Internet Protocol are a set of standard rules
that allows different types of computers to communicate with each other. The
IP protocol ensures that each computer that is connected to the Internet is
having a specific serial number called the IP address.

• TCP specifies how data is exchanged over the internet and how it should be
broken into IP packets. It also makes sure that the packets have the information
about the source of the message data, the destination of the message data,
the sequence in which the message data should be re-assembled, and checks
if the message has been sent correctly to the specific destination.
15
TCP/IP Protocols
The functionality of TCP/IP is divided into 4 layers with each one having specific
protocols:

16
TCP/IP Protocols
• Application Layer: The application layer makes sure that the data from the sending
end is received in a format that is acceptable and supported at the receiving end.

• Transport Layer: The transport layer is responsible for the smooth transmission of data
from one end to the other. It is also responsible for reliable connectivity, error recovery,
and flow control of the data.

• Internet Layer: This Internet Layer moves packets from source to destination by
connecting independent networks. Logical transmission of data take place here.

• Network Access Layer: The Network Access Layer sees how a computer connects to a
network. It defines how the data Physical transmitted through the network.
17
PPP Protocol
• Point to Point Protocol: It is a communication protocol that is used to create a
direct connection between two communicating devices. This protocol defines
the rules using which two devices will authenticate with each other and
exchange information with each other.

• For example, A user connects his PC to the server of an Internet Service


Provider also uses PPP. Similarly, for connecting two routers for direct
communication it uses PPP.

18
FTP Protocol
• File Transfer Protocol: This protocol is used for transferring files from one
system to the other. This works on a client-server model. When a machine
requests for file transfer from another machine, then a connection sets up
between the two and authenticates each other using their ID and Password.
And, the desired file transfer takes place between the machines. It is used for
communicating from one point to another (computer) over LAN (Local Area
Network) or WAN (Wide Area Network).

19
SFTP Protocol
• Secure File Transfer Protocol: SFTP which is also known as SSH FTP refers to File
Transfer Protocol (FTP) over Secure Shell (SSH) as it encrypts both commands
and data while in transmission.

• SFTP acts as an extension to SSH and encrypts files and data then sends them
over a secure shell data stream. This protocol is used to remotely connect to
other systems while executing commands from the command line.

20
HTTP Protocol
• Hyper Text Transfer Protocol: This protocol is used to transfer hypertexts over
the internet and it is defined by the www(world wide web) for information
transfer. This protocol defines how the information needs to be formatted and
transmitted. And, it also defines the various actions the web browsers should
take in response to the calls made to access a particular web page. Whenever
a user opens their web browser, the user will indirectly use HTTP as this is the
protocol that is being used to share text, images, and other multimedia files on
the World Wide Web.

21
HTTPS Protocol
• Hyper Text Transfer Protocol Secure: HTTPS is an extension of the Hypertext Transfer
Protocol (HTTP). It is used for secure communication over a computer network with
the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocol for
encryption and authentication. So, generally, a website has an HTTP protocol but if
the website receives some sensitive information such as credit card details, debit card
details, OTP, etc then it requires an SSL certificate installed to make the website more
secure.

• So, before entering any sensitive information on a website, we should check if the link
is HTTPS or not. If it is not HTTPS then it may not be secure enough to enter sensitive
information. 22
HTTP/HTTPS

23
SMTP Protocol
• Simple Mail Transfer Protocol: This protocol is important for sending and
distributing outgoing emails. This protocol uses the header of the mail to get
the email id of the receiver and enters the mail into the queue of outgoing
mails. And as soon as, it delivers the mail to the receiving email id, it removes
the email from the outgoing list.

24
POP3 Protocol
• Post Office Protocol 3: POP3 stands for Post Office Protocol version 3. It has
two Message Access Agents (MAAs) where one is client MAA (Message Access
Agent) and another is server MAA(Message Access Agent) for accessing the
messages from the mailbox. This protocol helps us to retrieve and manage
emails from the mailbox on the receiver mail server to the receiver’s computer.
This is implied between the receiver and receiver mail server.

25
TELNET Protocol
• Terminal Network: Telnet is an application protocol that allows a user to
communicate with a remote device. A user on a client machine can use a
software (known as a Telnet client) to access a command-line interface of
another, remote machine that is running a Telnet server program.

• The computer which is being connected is called a remote computer and


which is connecting is called the local computer.

• TELNET operation lets us display anything being performed on the remote


computer in the local computer. This operates on the client/server principle.
26
UDP Protocol
• User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of
the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an
unreliable and connectionless protocol. So, there is no need to establish a
connection prior to data transfer.

• Since high performance is needed, UDP permits packets to be dropped instead


of processing delayed packets. There is no error checking in UDP, so it also
saves bandwidth.

27

You might also like