0% found this document useful (0 votes)
35 views166 pages

Internet Technologies

The document provides an overview of the Internet, detailing its evolution from the pre-Internet era with ARPANET to the commercialization and expansion in the 1990s. It classifies networks based on various criteria such as transmission media, physical topology, geographical area, and application-centric architecture. Additionally, it explains how data is transmitted over the Internet using protocols like TCP/IP and discusses Internet addressing through IP addresses and URLs.

Uploaded by

krohith9535
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views166 pages

Internet Technologies

The document provides an overview of the Internet, detailing its evolution from the pre-Internet era with ARPANET to the commercialization and expansion in the 1990s. It classifies networks based on various criteria such as transmission media, physical topology, geographical area, and application-centric architecture. Additionally, it explains how data is transmitted over the Internet using protocols like TCP/IP and discusses Internet addressing through IP addresses and URLs.

Uploaded by

krohith9535
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 166

Internet

Technologie
s

Lincy Joseph
Assistant Professor
Department of CS
Agenda

• Internet
• Evolution of Internet
• Classification of Networks
• Working
Internet
Internet
• A global system of interconnected computer networks that
use standard internet protocol suite(TCP/IP) to serve users
worldwide.
• It is a network of networks that consists of millions of
private, public, academic, business and government
networks of local to global scope that are linked by broad
array of electronic and optical networking technologies
Evolution

Pre- Internet Era (1960 - 70)

Modern Internet Era(1980-


1990)
Growth and Expansion(1990-
2000)
Pre-Internet Era
• ARPANET: The precursor to the Internet was ARPANET,
created in the late 1960s by the U.S. Department of
Defense. It was designed to connect computers at different
research institutions to share information.
• First Connection (1969): The first ARPANET connection was
made between UCLA and Stanford University, marking the
start of networked communication.
• TCP/IP Protocol (1970s): In the 1970s, Robert Kahn and
Vinton Cerf developed the TCP/IP protocol, which became
the foundation for the Internet. This protocol allowed different
types of networks to communicate with each other, marking a
turning point for the Internet's development.
Modern Internet
• 1980- National Science Foundation(NSF) developed NSFNET
• Internet Protocol Suite (TCP/IP): In 1983, ARPANET adopted
TCP/IP as its standard, making it a network of networks (the
Internet). It allowed different networks, including private and public
ones, to connect to each other, creating the first global network
• In 1985, the DNS system was introduced, which allowed users to
access websites using easy-to-remember domain names (e.g.,
www.example.com) instead of IP addresses.)
• WWW (1990s): The World Wide Web was introduced by Tim
Berners-Lee in 1991. The Web made the Internet more accessible
to the general public, offering a user-friendly way to browse and
share information.
Growth and Expansion
• Commercialization of the Internet (1990s): In the early 1990s, the
Internet was primarily used for research and communication. However,
commercial businesses, websites, and online services began to appear,
opening the door for online shopping, search engines, and news.
• Dial-Up Connections: Most early home users accessed the Internet
through dial-up connections, which were slow and required a telephone line
to connect.
• Rise of Web Browsers: Web browsers like Netscape Navigator (1994) and
Internet Explorer (1995) allowed users to easily navigate the Web. The
introduction of Google (1998) revolutionized searching the web, making it
much easier to find information online.
• E-commerce Boom: Companies like Amazon (founded in 1994) and eBay
(founded in 1995) began to change how people bought and sold goods
online, marking the birth of e-commerce.
Classificatio
n of
Networks
• Based on Transmission Media
• Based on Physical Topology
• Based on Geographical Area
Covered
• Based on Application Centric
Based On Transmission Media

Wired Networks

Wireless Networks
Wired • Uses Physical cables for data transmission such as
shielded twisted-pair cables , unshielded twisted
pair cables , coaxial cables or fiber –optic cables
Examples
• Ethernet uses a pair of twisted pair cables
• Coaxial cable – Cable television networks
• Fiber optics – High speed –reliability - long distance
communication
Wireless Wireless technologies such as Wi-Fi , Bluetooth,
Cellular network to transmit data without the need of
physical cables
Based On Physical Topology

Point–to– Point (PTP)


networks

Multi Point Networks


Point-to-Point Networks

• A type of network topology where there is a direct connection between


2 devices.
• Here 2 devices are connected by a dedicated communication link
which can be a physical cable or a wireless connection.
• Used for secure and reliable connection between 2 devices such as a
Bank’s ATM network or a point-of-sale system
• Example – Direct Ethernet Connection

- Satellite Communication – remote sensing , military


operations
Multi- Access Networks
• Multiple Devices to connect to and communicate over the
same network .
• Ring – Devices connected in a circular manner, where
each device is connected exactly to 2 neighbours
• Star Topology – Devices connected to a central hub or switch , forming a
star-like structure

• Bus Topology – Devices that are connected to a single communication


line , which acts as a shared medium for data transmission

• Ex – Ethernet networks
- WIFI

- Mobile Networks
Based On Geographical Area
Covered

LAN

MAN

WAN
LAN – Local Area Network
• A network used for communication between computer
devices within a limited area such as an office building or
home.
• Range – few hundred metres or upto a mile.
• Speed – 10Mbps to 10 Gbps
• Ex- Home Networks, Office Networks
Metropolitan Area Networks -
MAN
• Designed for a larger geographical area than LAN.
• Ranges from several blocks of buildings to entire cities.
• Range – 5 to 50 km.
• Speed – less than LAN and requires high-speed
connections such as fiberoptics
• Ex – City-wide Internet Services, Cable TV networks
Wide Area Networks -WAN
• Covers a large geographical area such as a country ,
continent or even the whole world.
• A WAN can combine multiple LANs and MANs into a
single, cohesive network. For example, a business with
offices in different cities or countries might use a WAN to
connect these offices, integrating various LANs and MANs
in the process.
• WAN’s transmit data over leased high-speed phone lines
or wireless links such as satellites to cover great distances
• Ex- Internet , Corporate Networks
Based on Application –Centric
Architecture

Peer to Peer (P2P)


Client Server
Networks
Peer-to-Peer
• All computers are known as peers having equal roles and
responsibilities .
• There is no central location or server for authenticating
users, storing files or accessing resources.
• Each peer in a P2P behaves both as a client and a server.
• They are also known as servents a combination of
“server” and “client”
• Maximum number of peers that can operate on a P2P is 10
• Types- Pure P2P, Hybrid P2P
Pure P2P- A system where communication occurs directly between
connected peers without any involvement of a central server
Ex – Freenet (File sharing network)

Hybrid P2P – Combines elements of both P2P and client- server


architecture . These systems may rely partially on central servers
or allocate specific functions to dedicated peers.
Central servers in hybrid P2P networks act as central directories,
mapping connected users or indexed content to their current
locations.
Ex- Skype
Client – Server Networks
• Here the end systems are divided into clients and servers ,
each with a specific role and function
• Client – Clients have an active role and initiate
communication sessions by sending requests to servers
• They rely on servers to provide services or resources
• Clients can only communicate with servers and cannot
communicate with other clients
Client – Server Networks
• Servers
• They have a passive role and respond to the clients
request by performing the requested actions and
returning results
• They are responsible for providing the shared services
and managing network resources
• A server supports multiple clients simultaneously
• Ex- Web–based Applications Email Systems, Database
systems
How Does it Work?
Data
Segmentati
on
Data
Transmissio
n

Routing

Travelling
the Path
Data
Reasemm
bly
Data Segmentation

• Data moves over the Internet in a manner called “Packet


Switching”
• This involves breaking down data into separate pieces or
packets for transmission.
• It sends data in separate pieces and once all of the pieces
reach their target , they are reassembled in their original order
Data Transmission

• The packets travel from the source to their destination using IP


and TCP , IP uses a numerical address to dictate how the
information is sent from one computer to another. TCP works
with IP to ensure data transfer is reliable
Routing
• Each data packet contains information about where it
came from and where its going .
• Routers are devices that connects networks, analyse the
data packet’s destination information and decide the best
path for the packet to travel. It is decided based on factors
like network traffic and the shortest route
Travelling the path
• The packets travel along the path decided by the routers
from one device to another device across networks , cities
, countries or even continents.
• All data packets may not take the same route but all of
them have the same destination
Data Reassembly
• Once the packet packets reach their destination they are
reassembled into the original data format by the TCP/IP
protocol at the receiving end
Communicating over the
internet
• OSI and TCP/IP Model on which the whole data
communication process relies.
• Provides a conceptual framework that describes how
different network protocols interact and work together to
provide network services
OSI Model
OSI

• Open System Interconnection is a reference model that describes how


information from a software application in one computer through physical
medium to software application in another computer
.
• Developed by ISO (InternationalOrganisagtion for Standarisation) in 1984

• It divides the task of transmitting information between computers over a


network into seven distinct and manageable layers.

• Each layer provides a service to the layer above it in protocol specification.

• Each layer communicates with the same layer’s software or hardware on other
computers.
TCP/IP
Internet Protocol Layering
TCP/IP
• TCP/IP is a application and a practical model
• The internet is based on TCP/IP - TCP/IP Protocol suite,
Internet Model, Internet Protocol Layering , Internet
Protocol Stack
TCP/IP
• This model defines how data is transmitted over networks,
ensuring reliable communication between devices. It
consists of four layers: the Link Layer, the Internet Layer,
the Transport Layer, and the Application Layer.
• TCP/IP was designed and developed by the Department of
Defense (DoD) in the 1960s and is based on standard
protocols.
Layers of TCP/IP Model

• Application Layer

• Transport Layer(TCP/UDP)

• Network/Internet Layer(IP)

• Network Access Layer


Application Layer
• Application Layer in the TCP/IP model combines the
functions of three layers from the OSI model:
the Application, Presentation, and Session layers.
• It is responsible for handling high-level protocols, issues of
representation.
• This layer allows the user to interact with the application.
• It consists of 2 protocols – User Protocols
- Support Protocols
• User Protocols – HTTP for web browsing, FTP for file
transfer, Telnet for remote login
• Support Protocols – DNS , SNMP used for network
management
Transport Layer
• It is responsible for reliable source-to-destination delivery
of the entire message.
• Protocols:
TCP – Establishes a connection before sending data and
ensures all packets arrive correctly , reliable but slower
due to the checks
• UDP – Doesn’t require a connection and sends data
without checking if it arrives , faster but less relaible
Network / Internet Layer
• Handles the movement of packets around the network,
including routing of packets from source to destination,
across multiple networks
• Protocol
• IP- Sends data from one host to another , it is a
connectionless protocol
• ICMP (Internet Control Message Protocol) – This tells if
something is wrong with the delivery , reports congestion
in the network and redirects data if needed
• IGMP(Internet Group Management Protocol) – Helps group
of computers to receive the same information at the same
time
Network Access Layer
• Responsible for transmission between devices on the same
network.
• It includes hardware component required for establishing a
network connection and provides the functional and procedural
means to transfer the data between network entities.
• It makes sure the messages are packaged properly and sent
successfully within the network
• Protocols
• Ethernet
• WIFI
• POP
• ARP
Physical Layer
• Responsible for physical connection and transmission of
information .
• Such as cables , connectors, electrical signals
Hour Glass Model
• A conceptual representation of the Internet Protocol
architecture – relationship between different protocols and
layers
• Proposed by Dave Clark
• Highlights the importance of IP as the waist of the
hourglass, representing the network layer.
• IP is responsible for addressing and routing the data
packets across the networks – acts as a bridge between
higher layer protocols and lower layer protocols
• Above the IP Layer: Multiple high layer protocols that
provide specific services and functionalities – HTTP, SMTP,
RTP, FTP

• Below IP Layer- Physical transmission of data – Ethernet,


SONET(Synchronous Optical Networking), Wi-Fi.
Internet Addressing
• Internet addressing refers to the way devices
(computers, smartphones, servers, etc.) are
identified and located on the internet.
IP – Internet Protocol Address
• An IP address, or Internet Protocol address, is a unique
string of numbers assigned to each device connected to a
computer network that uses the Internet Protocol for
communication. It serves as an identifier that allows
devices to send and receive data over the network,
ensuring that this data reaches the correct destination.
192.168.1.10

• 4 sets of numbers also known as octets , each ranging from 0 to


255.
• Dotted Decimal Notation.
• An IP address is spilt to 2 parts : a prefix (network part) and a
suffix (host part)
• Prefix: Identifies the physical network
• Suffix: Identifies a specific computer or host on that network
• Each network on Internet has its own unique network number
• And each computer on a network has a unique suffix
URN – Uniform Resource
Identifier
• A URI (Uniform Resource Identifier) is a string used to
identify a resource on the internet or within a system. It
can be a name, location, or both.

• Types
• URN- Uniform Resource Name
• URL –Uniform Resource Locator
URN
• Identify a resource by a unique and persistent name .
• It begins with prefix urn
• urn:isbn:0451450523 (identifies a book but doesn’t
specify where to find it).
URL – Uniform Resource Locator
• A URL (Uniform Resource Locator) is the web address
you type into a browser to access a website or resource on
the internet. It tells the browser where to find a webpage
and how to retrieve it.
https://www.example.com/products/shoes/
index.html

• Protocol
• Domain Name
• Path
• File Name
https://www.example.com/products/shoes/
index.html

• Protocol: This defines the method of data transfer


• http:// → Unsecure web browsing
• https:// → Secure web browsing (encrypted)
• ftp:// → File Transfer Protocol
• mailto: → Opens email clients
https://www.example.com/products/shoes/
index.html

• Domain : The website name that maps to an IP address


• www- Subdomain(optional)
• example – website name
• .com – Top level Domain
https://www.example.com/products/shoes/
index.html

• Path – This represents the specific directory or folder on


the server where the desired resources resides
https://www.example.com/products/shoes/
index.html

• Filename – This specifies the name of the file being


accessed
https://
blr.stpaulscollege.edu.in/gallery/
Domain Name System
• A domain name is the human-readable address of a
website, used to access web pages on the internet. It is
part of a URL (Uniform Resource Locator) and maps to
an IP address, making it easier for users to access
websites without remembering numerical IP addresses.
Top Level Domain
• TLDs tell users the general purpose of the service behind the domain
name. The most generic TLDs (.com, .org, .net) don't require web
services to meet any particular criteria, but some TLDs enforce stricter
policies to clarify their purpose. For example:
• Local TLDs such as .us, .fr, or .in can require the service to be provided
in a given language or hosted in a certain country — they are
supposed to indicate a resource in a particular language or country.
• TLDs containing .gov are only allowed to be used by government
departments.
• The .edu TLD is only for use by educational and academic institutions.
• TLDs can contain special as well as Latin characters. A TLD's maximum
length is 63 characters, although most are around 2–3.
Second Level Domain
• This is the main part of a domain name, just before the
TLD.It is typically chosen by the domain owner and
represents the brand, organization, or service.
• Example:In example.com, "example" is the Second-Level
Domain (SLD).In harvard.edu, "harvard" is the SLD.
Third-Level Domain (Subdomain)

• This is the part before the Second-Level Domain.


• Used for organizing sections of a website or different
services.
• Ex: www, blog
Domain Name System
• It is a distributed naming system that is used to translate
domain names into IP addresses and vice versa
• It is like a phonebook of the internet
• DNS directory is distributed worldwide, stored in special
servers called DNS servers that are interconnected and
communicate regularly to synchronize directory
information and create redundancy
DNS Hierachy
• It operates as a distributed database, working
through a hierarchical structure of servers
• When a user requests a domain, the query
passes through multiple levels—starting with the
Root server.
• Then the Top-Level Domain (TLD) server and
finally the authoritative server that holds the
specific IP address for the domain
Root Level (.) – The Top of the DNS
TreeThe starting point of all domain
lookups.Represented by a dot (.) but is
usually hidden in domain names.
Example: In www.example.com., the
final dot (.) is the root.

Top Level Domains- Divides domains into


broad categories
like .com, .org, .edu, .gov, or country-
specific ones like .uk, .jp, .in.Example: In
www.example.com, .com is the TLD.

Second Level Domain - This is the main


domain name chosen by the owner.
Example: In www.example.com, example
is the SLD.

Third Level Domain-These are before the


SLD and help organize different sections
of a website.Example: In
Working of DNS
• A browser , application or a device is called DNS client , issues DNS
request or DNS address lookup providing a host name
• The request is received by DNS resolver , which is responsible to find
the correct IP address for the host name
• It starts with the Root server moving down the hierarchy to Top level
Domain server down to name server responsible for the specific
domain “amazon .com”
• When the resolver reaches the authoritative DNS server for
“amazon.com” it receives the IP address and othe relevant details
and returns it to DNS client . The request is now resolved.
• DNS client device can connect to the server directly using correct IP
address
Internet Configuration
• Internet Service Provider (ISP):Any device that wants to
access the internet must connect through an ISP.ISPs
provide internet access to homes, businesses, and
organizations.
• Network Service Provider (NSP):ISPs rely on larger networks
known as NSPs.NSPs provide backbone services that
connect ISPs to the global internet.
• Internet Backbone:The backbone is like the main highway
that carries internet traffic across large distances.It consists
of high-speed fiber-optic connections and routing
infrastructure.The interconnections between different ISPs,
NSPs, and backbones together form the Internet Backbone.
Network Access Points -
• Routers that serve as meeting points for different
backbones , they allow traffic from one backbone to be
transferred to another.

• You connect to Airtel (Local ISP) →Airtel gets internet from


a regional ISP →The regional ISP is connected to Tata
Communications (NSP) →Tata Communications is linked to
other NSPs via NAPs (exchange points) →This connects
you to the global internet!
Internet Service Providers
(ISP’s)
• It is a company that provides Internet connections and
services to indivigulas and organisations
• It provides customers access to one or more high –speed
internet lines.
• Ex: Jio, Airtel , BSNL
Levels OF ISP
• Tier-1 ISP’s :Tier 1 ISPs are the backbone of the internet.
They own and operate massive global networks and have
direct access to the entire internet routing table without
paying transit fees to any other ISP.
• They establish peering agreements with other Tier 1 ISPs
to exchange traffic freely.
• Examples : AT&T (USA), CenturyLink (USA),NTT
Communications (Japan),Tata Communications (India)
Tier 2
• Tier 2 ISPs purchase transit from Tier 1 ISPs to access
some parts of the internet while also peering with other
Tier 2 ISPs to reduce costs.
• They serve as regional or national ISPs, acting as
intermediaries between Tier 1 and Tier 3 ISPs.
• Example : Airtel (India),Vodafone Idea (India), British
Telecom (UK)
Tier 3
• Tier 3 ISPs are the local ISPs that purchase internet access
from Tier 2 ISPs and provide services to end users (homes,
businesses, etc.).
• They do not peer with other ISPs; instead, they rely on
upstream providers (Tier 2 ISPs) for internet connectivity.
• Example :BSNL Broadband (India),Excitel (India), ACT
Fibernet (India), Suddenlink (USA)
Network Service Providers
• A Network Service Provider (NSP) is a company that
provides network services, such as data transport and
connectivity, primarily to Internet Service Providers (ISPs),
businesses, and other organizations.
• NSPs typically own and operate large-scale infrastructure,
including high-capacity fiber optic networks, data centers,
and routing equipment, enabling them to facilitate
efficient communication across different networks.

• Ex: BSNL, Tata


Internet Backbone
• The internet backbone refers to the principal data
routes and high-capacity network connections that form
the core of the internet.
• It consists of a series of interconnected networks and
high-speed data links that enable data to be transmitted
over long distances quickly and efficiently.
• Ex: AT&T
Network Access Points (NAP)

• A Network Access Point (NAP) is a physical location


where different networks interconnect and exchange
traffic. NAPs are critical components of the internet
infrastructure, enabling different Internet Service
Providers (ISPs) and other network operators to connect
their networks and facilitate data transfer between them.

• Ex: DE-CIX Mumbai


• DE-CIX Mumbai is the largest Internet Exchange in India
Multiple ISP’s including large ones like Airtel , Jio connect
their networks at this exchange
So if a user with an Airtel Internet connection wants to
access a website hosted on Jio’s network , data might
travel through DE-CIXm Mumbai
Point of Presence
• A physical location where NSP or an ISP has a presence in
a particular geographical area
• It is a network node that serves as an access point for
customers to connect to the internet or other network
services
• Play a crucial role between end user’s device and broader
Internet
• Serve as a bridge between end user’s local network and
ISP network
Types of Connections Off ered by
ISP
• Dial up Access - Dial-up access is a method of
connecting to the internet using a standard telephone line
and a modem.
• It involves dialing a phone number associated with an
Internet Service Provider (ISP) to establish a connection,
allowing users to send and receive data over the internet.
• Dial-up connections typically offer low data transfer
speeds (usually up to 56 Kbps) and occupy the telephone
line while in use, preventing voice calls during the session.
• Dial-up access was one of the earliest forms of internet
connectivity but has largely been replaced by faster
broadband technologies.
High Speed Access
• High-speed access is an internet connection that offers
data transfer rates significantly greater than those of dial-
up connections, typically starting from speeds of at least 1
Mbps (megabit per second) and going up to several
gigabits per second (Gbps) with modern technologies.
Types
• Digital Subscriber Line (DSL):

Description: DSL uses existing telephone lines to provide


internet access. It allows simultaneous voice and data
transmission, enabling users to make phone calls while
connected to the internet.
Speed: DSL speeds vary depending on the distance from
the service provider's central office, typically ranging from 1
Mbps to 100 Mbps.
• Cable Internet:

Description: Cable internet uses coaxial cables, the same


technology that delivers cable television. It provides high-
speed access through a cable modem.
Speed: Cable internet offers higher speeds, typically
ranging from 10 Mbps to 1 Gbps, depending on the plan and
provider.
• Integrated Services Digital Network (ISDN)

is a digital telecommunication technology that provides


end-to-end digital connections for various types of data,
including voice calls, video conferencing, and data
transmission. It enables simultaneous transmission of
multiple types of data over a single line, offering higher
quality and faster transmission rates than traditional
analog systems.
• Digital Satellite Systems (DSS)

Digital Satellite Systems refer to technologies that


utilize satellites to transmit and receive digital signals for
various services, including television broadcasting,
internet access, and telecommunications. These systems
offer a reliable way to deliver content and connectivity
over large geographic areas, especially in remote or rural
locations where traditional infrastructure may be limited
• Leased lines

are dedicated telecommunications connections that


provide a permanent, private line for data transmission
between two points. These lines are typically used by
businesses and organizations for reliable, high-speed
communication and internet access
Wireless Access
• Wireless access refers to the ability to connect to a
network or the internet without the use of physical cables,
utilizing radio waves or infrared signals for
communication. It enables devices such as smartphones,
laptops, tablets, and other portable devices to access
networks and the internet seamlessly
FTP – File Transfer Protocol
• FTP (File Transfer Protocol) is a standard network
protocol used to transfer files between a client and a
server on a network, typically over the internet. It
operates on a client-server model using separate control
and data connections.
• Transfering files from a client computer to a server is
called “uploading”
• Transfering from server to a client is “downloading”
• It is a connection-oriented protocol and relies on TCP/IP for
transferring files
FTP CLIENT
• An FTP client is software that enables users to connect to
an FTP server to upload, download, or manage files.
• Examples: FileZilla – An open source FTP client that
supports FTP and SFTP , available in windows, mac and
Linux
• WinSCP – a free open source FTP client for Windows that
supports SFTP and FTP , it offers a graphical user interface
and supports file synchronization and transfers
FTP SERVER
• An FTP server is a software application that provides file
storage and management services, allowing clients to
connect and transfer files.
• Examples: Microsoft IIS(Internet Information server) FTP
Server, FileZilla Server
Types of Connections in FTP
• FTP uses two separate connections for communication
between the client and the server:
1.Control Connection (Command Channel)
2.Data Connection (Data Channel)
Control Connection
• Also known as command connection , it is established
when an FTP client connects to an FTP server . It’s
maintained throughout the entire interactive FTP session
and is used to send administrative data , client commands
and server responses .
• It operates on TCP port 21 by default
DATA CONNECTION
• It is used for the actual transmission of file data . Data
connections are established and then closed for each file
transfer , directory listing or any other data request.
• It operates on TCP port 20
File Transfer Protocol Modes
• Connection Modes
• Transfer Modes
• Connection Modes : Used to determine how the data being
transferred is formatted
It operates in two connections modes
• ASCII mode : Used for text files , it allows transmission
of text data and converts between the different
character sets used on host and client systems
• Binary Mode: Transferring non-text files like images ,
audio files , video files , executable files etc. There isno
dtaa conversion in this mode
Transfer Mode
• Defines the way data is transferred between client and
server
• Active Mode: Client initiates the connection and tells the
server its IP address and port number using PORT
command.
• When the server receives the request, it initiates data
connection back to the client for data transfer
• The server attempts to connect to the clients IP address
from TCP port 20
PASSIVE MODE
• The client initiates both the command and the data
connection.
• Scenarios where the client Is behind a firewall and can’t
accept incoming connections .
Using Windows CMD to interact
with FTP server
• Initiate the cmd prompt
• Start an FTP session
• Connect to the FTP server
• Credential submission
• Using FTP commands
FTP Server Response Codes
Examples
Working Of FTP
• Client side consists of 3 components – user interface ,
control process and data transfer process
• On server “ server control process and server data
process
• Transmission occurs through TCP/IP
Steps
Establishing a connection:
• The client initiates a connection to the server , the
connection is established through TCP/IP
• The client contacts the server on port 21 (Control
Connection).
• The server responds with a 220 Service Ready message.
Authentication
• After initial connection the client sends credentials to the
server , these are checked against the server’s records , if
the authentication is successful access is granted
• Command Connection Interaction
• Client interacts with server using command
connection. This allows the client to issue FTP
commands to the server
• Ex: LIST- used to list the files and directories in the
current directory of the current directory
• Data Connection
• When a command involves data transfer
a second connection- data connection is
established
• File Transfer
• File data is transferred over the data connection . This
involves uploading a file(STOR), downloading a
file(RETR) or sending list of filenames(LIST)
• Connection Termination
• After data transfer , the data connection is closed . The
command connection can remain open or can be
closed using QUIT command
Advantages
• Allows transfer of multiple files and folders
• Even when the connection is lost once resumed it has the
ability to transfer
• No limitations to size of data
• Faster than HTTP
• Recovers lost data during unexpected situation
Disadvantages
• Lacks security – FTP doesn’t encrypt the traffic so
usernames , paswords and other data can be easily read
by capturing data packets.
• FTP can be vulnerable to packet capture and other attacks
• Monitoring activity is difficult , they are inconsistent
tracking of what has been uploaded on the remote system
IRC- Internet Relay Chat
• Earliest forms of interactive online communication having
developed in late 1980
• Operates using TCP/IP over the internet and enables real-
time , interactive exchange of text messages.
• It supports multi-user , multi-channel teleconferencing
systems.
Its predominantly used for group discussions in chat
rooms known as channels .
• IRC clients- mIRC, Hexchat and Irssi that provide interface
for users to connect to IRC servers and engage in
communication
• It operates on distributes servers . These servers
interconnect to form a network that can support numerous
clients.
• Ubuntu – #ubuntu on Libera.Chat
• Fedora – #fedora on Libera.Chat
• Arch Linux – #archlinux on Libera.Chat
Features
• Real-Time communication : real-time , interactive
exchange of text messages.
• Multi-user and Multi-channel : Multiple users and
channels , numerous individuals can participate in
different conversations simultaneously.
• Private and Group Messaging : It also supports multiple
one –on-one messaging between indiviguals.
• Distributed Servers: IRC servers enhancethe robustness
and scability of the platform .
• Various clients: mIRC, Hexchat , Irssi . Users can choose
clients depending on their preferences and needs.
• Text-Based: It enables faster , direct and clear exchange
of information.
• Platform independent : IRC can be used on various os .
• Customisable: Ability to create primary channels , set user
permissions , use IRC scripts to automate tasks.
• Lightweight: bandwidth usage. It works well with limited
internet speed
Working
• Client – Server Model: Relayed across network of servers
to reach intended recipients
• A channel – chat rooms.
• Named group of one or more users which will receive
all messages addressed to that channele
• Channel provides a way to send the message to
several clints .
• Host channels are responsible for managing channels
by keeping track of channel numbers
• Can be delivered using one-to-many and one-to-all
Steps
• IRC client and server installation – Install clients on the
devices and IRC servers to be set up by organisations to
host IRC chat rooms.
• IRC server: By inputing server’s address
• Authentication: Provide credentials
• Joining a channel: Join an existing channel or create new
one .
• Ex: # BCA
• Chatting- Sending the message
• Private messaging
• Leaving the channel and Disonnecting
Issues
• Scalability
• Reliability
• Network Congestion
• Privacy
Advantages
• Real-time communiation
• Wide user base
• Multiple channels and communication
• Privacy and anonymity
• Customisation control
Disadvantages
• Lack of multimedia support
• Learning curve
• Lack of moderation
• Security risks
• Reliance on servers
TELNET
• Remote Login: Refers to the process of accessing a
computer system, network or server over a network from
a different physical location.
• Telnet- Terminal Network is a network protocol in the
TCP/IP suite that provides a command-line-interface for
communication by allowing a user to type commands on a
local host and have them executed on a remote system
• It creates a 2 way interactive communication by allowing a
user to type commands on a local host and have them
executed on the remote host
• It operates on a client/server principle .
• Local computer uses telnet client software and the remote
computers uses telnet server software
• A telnet client allows user to access or edit files or issue or
execute commands on the remote computer .
Features
• Remote Access: It allows users to remotely access and
control a computer or network device from a different
location. This enables users to manage and troubleshoot
system without being physically present.
• Terminal Emulation: Remote system appears as if it is
directly connected to the user’s terminal, this a users to
interact with the remote system using their own computer
as if they were using a local terminal
• Text-Based Communication: It transmits and receives
text-based data
• Portability: It is a platform independent protocol , it can
operate on different OS and devices
• Network Virtual Terminal(NVT): A standardised
terminal interface that allows communication between the
Telnet client and server . It ensures that both end of the
Telnet connection can interpret and display text-based
data correctly
• Session Management: It allows user to establish
simultaneous sessions with different remote systems .

• Flexibility: Telnet allows various options and negotiations


such as DO, WILL, WON’T and DON’T commands , these
allow the Telnet client and server to negotiate and agree
on specific features, settings or capabilities during the
session
Working
• Setting up Telnet Client on the user’s device – On
windows this is available via the command prompt
• Establishing the connection to the server: The server
is a device connected to the internet or a network and is
configured to accept Telnet connections typically via port
23 .
• We can use command like telnet hostname port
• Intiating Network Virtual (NVT) Characterization –
This is to ensure different systems (having different
capabilities and features) can communicate in a
standardised way
• Negotiating options: The client and the server then
determine the specifics of their communication during the
session . It involves 4 commands: WILL(offer to enable a
feature) , WON’T(refusal to enable a feature), DO(request
to enable feature) ,DON’T(demand to disable a feature)
• Exchanging data: Once all negotiations are complete
the user (client) can start sending commands that are
executed on the server and the server sends back
responses . All the communication happens in form of a
text
• Terminating the session: End the Telnet session ,
sending a command such as logout or exit.
Advantages
• It provides remote access to another computer system
• Can be used to send or receive information
• Helps in administration of network elements
• Supports User authentication
• Universal protocol that can be used on any computer
Disadvantages
• Unencrypted data exchange
• Full access makes it easier for hackers
• It is not possible to run GUI tools over Telnet connection as
it is character based communication tool
Usenet
• User Network is a global distributed discussion network
system – Tom Truscott and Jim Ellis in 1979
• Globally distributed discussion network that allows people to
share and exchange information on various topics of interest.
• It is a collection of special interest groups called newsgroups ,
where users can post messages and participate in discussions
related to specific subjects.
• It serves as a platform for communication , information
sharing and collaboration among users worldwide.
• Ex: Giganews, Easynews, Usenet Server
• Network News Transport Protocol – It facilitates the
transfer of news articles between news clients and news
servers .
• It is essential for posting, distributing, and retrieving
Usenet news articles
• News Administrator: Person responsible for running news
server
• News Server: A computer that stores , forwards and
manages news articles
• News Reader: A software program that allows users to
read , post, subscribe or unsubscribe from a newsgroup.
• Newsgroup: Online forum enabling Internet users to
participate in discussions on a specific topic
• UseNet: Collection of newsgroup
Use Of Usenet
• Discussion and Information exchange
• File Sharing
• Access to News and Articles
• Colloboration and support
Features
• Hierarchical Organisation: Usenet groups are arranged in a tree-like
structure with broad categories (e.g., "comp." for computers) and
subcategories (e.g., "comp.lang.python" for Python discussions).
• Global Distribution : Messages are shared across a worldwide
network of interconnected servers, allowing users everywhere to
access the same discussions.
• Hierarchical Naming System: Newsgroups follow a structured
naming convention (e.g., rec.sports.soccer for soccer discussions),
making it easy to find topics.
• News Articles: Messages posted on Usenet are called "articles" and
function similarly to emails but are publicly shared within a specific
newsgroup
Working
• User Interaction:Users utilize a news reader software to access
USeNet
• Interaction with News Server: Server acts as a Central Hub for
USeNet communication
• News Article Transfer: When users post a news article in a
newsgroup it becomes accessible to all the readers of that
newsgroup. The NNTP ensures reliable and efficient transfer
• Negotitation and transfer between servers: News servers negotiate
with each other to tranfer certain newgroup between them.
• Storage and expiration: The articles are discarded at their
expiration date
Advantages/ Disadvantages

Extensive/ Diverse Content Complexity and Learning Curve


High Retention Rates Limited Moderation
Fast Download Speeds Subscription Costs
Privacy and Anonymity Legal Concerns
No reliance on centralised servers Reliance on Usenet Providers
Eff ective delivery techniques

This is a powerful tool in public Effective body language enhances


speaking. It involves varying pitch, your message, making it more
tone, and volume to convey impactful and memorable:
emotion, emphasize points, and
maintain interest: • Meaningful eye contact

• Pitch variation • Purposeful gestures

• Tone inflection • Maintain good posture

• Volume control • Control your expressions


1. Know your material in advance
2. Anticipate common questions
3. Rehearse your responses

Maintaining composure during the Q&A


session is essential for projecting
confidence and authority. Consider the
following tips for staying composed:
• Stay calm
• Actively listen
• Pause and reflect Navigating
• Maintain eye contact Q&A sessions
Speaking
impact

Your ability to communicate effectively


will leave a lasting impact on your
audience
Effectively communicating involves not
only delivering a message but also
resonating with the experiences,
values, and emotions of those
listening
Metric Measurement Target Actual
Learn to infuse
energy into your Audience
delivery to leave a # of attendees 150 120
attendance
lasting impression.
Engagement
Minutes 60 75
One of the goals of duration
effective Q&A
communication is to # of questions 10 15
interaction
motivate your
audience. Positive
Percentage (%) 90 95
feedback
Rate of
information Percentage (%) 80 85
retention

Dynamic delivery
Final tips & takeaways

Consistent rehearsal • Seek feedback


• Strengthen your familiarity
• Reflect on performance
Refine delivery style
• Explore new techniques
• Pacing, tone, and emphasis
• Set personal goals
Timing and transitions
• Aim for seamless, professional • Iterate and adapt
delivery
Practice audience
• Enlist colleagues to listen & provide
feedback
Speaking engagement metrics

Impact factor Measurement Target Achieved

Audience interaction Percentage (%) 85 88

Knowledge retention Percentage (%) 75 80

Post-presentation
Average rating 4.2 4.5
surveys

Referral rate Percentage (%) 10 12

Collaboration
# of opportunities 8 10
opportunities
Thank you
Brita Tamm
502-555-0152
[email protected]
www.firstupconsultants.com

You might also like