SlideShare una empresa de Scribd logo
1 de 50
Respected Sir & Dear friends
Welcome
Arfa Karim
(1995-2012)
Dedicated to department of CS&IT
&
Presented by
SE-I Group
( Bilal Maqbool )
AN INTRODUCTION TO
INTERNET TECHNOLOGY
Group Members
1. Bilal Maqbool. 10
2. Abdul Ghafar. 14
3. Nisar Ahmed. 06
4. Shahzad Tanvir. 21
5. Muhammad Junaid. 45
First Member
Bilal Maqbool
Roll # 10
Internet Introduction & History
Definition of Internet
By the turn of the century, information, including access to the
Internet, will be the basis for personal, economic, and political
advancement. The popular name for the Internet is the information
superhighway.
The Internet links are computer networks all over the world so that
users can share resources and communicate with each other. Some
computers have direct access to all the facilities on the Internet
such as the universities. And other computers, eg privately-owned
ones, have indirect links through a commercial service provider, who
offers some or all of the Internet facilities.
Who Pays for the Internet?
There is no clear answer to this
question because the Internet is not
one "thing", its many things. No one
central agency exists that charges
individual Internet users.
Electronic mail, or e-mail, is probably the
most popular and widely used Internet
function. E-mail, email, or just mail, is a fast
and efficient way to communicate with friends
or colleagues. You can communicate with one
person at a time or thousands
Electronic mail on
the internet:
Domains
EDU Educational sites
COM Commercial sites
GOV Government sites
NET Network administrative organizations
MIL Military sites
ORG Organizations
.xx where xx is the country code (e.g., .eg for Egypt).
Introduction to Gopher:
Gopher is a client/server system that
allows you to access many Internet
resources simply by making selections
from a sequence of menus. Each time
you make a selection, Gopher carries
out your request to the computer that
contains the information and "serves"
it up.
Where did Gopher come
from?
"Born" in April 1991, gopher began as a
project at the Microcomputer,
Workstation, and Networks Center at
the University of Minnesota to help
people on campus get answers to
computer-related questions. At the
time, the computer center staff had
accumulated answers to thousands of
questions regarding computers and
software.
Why is it called
Gopher?
The name "Gopher" is appropriate for three
reasons:
1.Just as a real gopher successfully navigates
beneath the prairie, the Internet Gopher tunnels
through the invisible paths of the Internet to
help you find the information you want.
2. The name refers to someone who fetches
things or provides service for other people.
3. The Golden Gopher is the mascot of the
University of Minnesota.
A look at search
engines:
The World Wide Web is "indexed" through the
use of search engines, which are also referred to
as "spiders," "robots," "crawlers," or "worms".
These search engines comb through the Web
documents, identifying text that is the basis for
keyword searching. Each search engine works in a
different way. Some engines scan for information
in the title or header of the document; others
look at the bold "headings" on the page for their
information. The fact that search engines gather
information differently means that each will
probably yield different results.
History Of Internet
Defense Advanced Research Projects
Agency (DARPA) in late 1962 to head the
work to develop it.
The Internet, then known as ARPANET,
was brought online in 1969 under a
contract let by the renamed Advanced
Research Projects Agency (ARPA) which
initially connected four major computers
at universities in the southwestern US
Who was the first to
use the Internet?
Charley Kline at UCLA sent the first
packets on ARPANet as he tried to
connect to Stanford Research
Institute on Oct 29, 1969.
Did Al Gore invent the
Internet?
According to a CNN transcript of an
interview with Wolf Blitzer, Al Gore
said,"During my service in the United
States Congress, I took the initiative in
creating the Internet." Al Gore was not
yet in Congress in 1969 when ARPANET
started or in 1974 when the term Internet
first came into use. Gore was elected to
Congress in 1976.
THANKS FOR YOUR ATTENTION
Second Member
Abdul Ghafar.
Roll # 14
Working of Internet
How does Internet work?
The unique thing about the Internet is that it
allows many different computers to connect and
talk to each other. This is possible because of a
set of standards, known as protocols, that govern
the transmission of data over the network:
TCP/IP (Transmission Control Protocol/Internet
Protocol). Most people who use the Internet
aren't so interested in details related to these
protocols. They do, however, want to know what
they can do on the Internet and how to do it
effectively.
Internet Addresses
Because the Internet is a global network
of computers each computer connected to
the Internet must have a unique address.
Internet addresses are in the form
nnn.nnn.nnn.nnn where nnn must be a
number from 0 - 255. This address is
known as an IP address.
Protocol Stacks and
Packets
Your computer is connected to the
Internet and has a unique address. How
does it 'talk' to other computers
connected to the Internet? An example
should serve here: Let's say your IP
address is 1.2.3.4 and you want to send a
message to the computer 5.6.7.8. The
message you want to send is "Hello
computer 5.6.7.8!".
Domain Names and
Address Resolution
The DNS is a distributed database
which keeps track of computer's names
and their corresponding IP addresses
on the Internet.
Many computers connected to the
Internet host part of the DNS database
and the software that allows others to
access it. These computers are known as
DNS servers.
Application Protocols: HTTP
and the World Wide Web
One of the most commonly used services on the
Internet is the World Wide Web (WWW). The
application protocol that makes the web work is
Hypertext Transfer Protocol or HTTP. Do not
confuse this with the Hypertext Markup
Language (HTML). HTML is the language used to
write web pages. HTTP is the protocol that web
browsers and web servers use to communicate
with each other over the Internet.
Uniform Resource
Locators, or URLs:
A Uniform Resource Locator or URL is the
address of a document you'll find on the
WWW. Your WWW browser interprets
the information in the URL in order to
connect to the proper Internet server and
to retrieve your desired document.
Transmission Control
Protocol
Under the application layer in the protocol stack
is the TCP layer. When applications open a
connection to another computer on the Internet,
the messages they send (using a specific
application layer protocol) get passed down the
stack to the TCP layer. TCP is responsible for
routing application protocols to the correct
application on the destination computer.
Internet Protocol
Unlike TCP, IP is an unreliable, connectionless
protocol. IP doesn't care whether a packet
gets to its destination or not. Nor does IP
know about connections and port numbers. IP's
job is too send and route packets to other
computers. IP packets are independent
entities and may arrive out of order or not at
all.
THANKS FOR YOUR ATTENTION
Third Member
Nisar Ahmed.
Roll # 06
Security of Internet
Internet security
Internet security is a branch of computer security
specifically related to the Internet. Its objective is
to establish rules and measures to use against attacks
over the Internet. The Internet represents an
insecure channel for exchanging information leading
to a high risk of intrusion or fraud, such as phishing.
Different methods have been used to protect the
transfer of data, including encryption.
Security problems
Most of the security problems encountered
on the Internet are due to human mistakes.
The first level of security "leaks" usually
occurs during the development of the
website. If a website developer doesn't
correctly plan or proof test his scripts, an
eventual hacker could extract confidential
information from the website itself. This is
usually done by exploiting particular errors
or by inserting some particular code
snippets into an input field or website URL.
Types of security
1. Network layer security
2. IP Protocol
Electronic mail security (E-mail)
1. Pretty Good Privacy (PGP)
2. Multipurpose Internet Mail
Extensions (MIME)
3. Secure/Multipurpose Internet Mail
Extensions (S/MIME)
4. Message Authentication Code
Firewalls
A firewall controls access between
networks. It generally consists of
gateways and filters which vary from
one firewall to another. Firewalls also
screen network traffic and are able to
block traffic that is dangerous.
Firewalls act as the intermediate server
between SMTP and HTTP connections.
Role of firewalls in Internet
security and web security
Firewalls impose restrictions on incoming
and outgoing packets to and from private
networks. All the traffic, whether
incoming or outgoing, must pass through
the firewall; only authorized traffic is
allowed to pass through it. Firewalls create
checkpoints between an internal private
network and the public Internet, also
known as choke points.
Viruses
• Trojan horse
• Spyware
• Worms
• Botnet
Antivirus
Antivirus programs and Internet security
programs are useful in protecting a computer or
programmable device from malware.
Such programs are used to detect and usually
eliminate viruses; however, it is now common to
see security suites, containing also firewalls, anti-
spyware, theft protection, and so on to more
thoroughly protect users.
THANKS FOR YOUR ATTENTION
Fourth Member
Shahzad Tanvir.
Roll # 21
Advantages & Disadvantages of Internet
Advantages
• E-mail:
• 24 hours a day - 7 days a week:
• Information:
• Online Chat:
• Services:
• Communities:
• Ecommerce:
• Software Downloads:
• Entertainment:
Disadvantages
• Theft of Personal information:
• Negative effects on family
communication:
• Internet addiction:
• Children using the Internet
• Virus threat:
• Spamming:
The Disadvantages of the
Internet at Home
• Isolation
• Addiction
• Inaccurate Information
• Hacking of Personal Information
• Viruses
• Inappropriate Websites
THANKS FOR YOUR ATTENTION
Fifth Member
Muhammad Junaid.
Roll # 45
Future of Internet
The Future of the internet
– Some of the major trends shaping the future of the
Internet are summarized below, along with extrapolated
predictions:
– Globalism
– Communities
– Virtual reality
– Bandwidth.
– Wireless.
– Grids
– Integration
Audio web surfing
Building the web
with standards
and accessibility
in mind brings
the Internet to as
wide an audience
as possible.
Web surf on any device
• It seems the tech
industry is eager to
integrate the Internet
into every device these
days. It’s the equivalent
to adding a digital clock
to a coffee maker. Why
not? Adding a touch-
screen to your fridge and
other appliances might
create new opportunities
and challenges for
interfacing
Dishwasher Safe
• Input revisited
• Mobile networking
• The end of .com domination
• IE6 stops being used
THANKS FOR YOUR ATTENTION
Questions
?
?
??
?
?
‫سواالت‬
Internet Introduction by SE-I Group

Más contenido relacionado

La actualidad más candente

presentation on internet (power point presentation)
presentation on internet (power point presentation)presentation on internet (power point presentation)
presentation on internet (power point presentation)shaloof shaan
 
Internet (uses,merits and demerits)
Internet (uses,merits and demerits)Internet (uses,merits and demerits)
Internet (uses,merits and demerits)Saba96
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growthvenkatesh y
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.pptgasumova
 
Internet ppt
Internet pptInternet ppt
Internet ppttej_vish
 
Advantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratAdvantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratGurpreet Kaur
 
Internet and computer
Internet and computerInternet and computer
Internet and computerRhea Dellosa
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNETSaleh Ibne Omar
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internetnivi88
 
advantages and disadvantages of internet
advantages and disadvantages of internetadvantages and disadvantages of internet
advantages and disadvantages of internetAli Şahin
 
Best invention ever
Best invention everBest invention ever
Best invention everJahid Hasan
 

La actualidad más candente (18)

Internet surfing
Internet surfingInternet surfing
Internet surfing
 
presentation on internet (power point presentation)
presentation on internet (power point presentation)presentation on internet (power point presentation)
presentation on internet (power point presentation)
 
Internet (uses,merits and demerits)
Internet (uses,merits and demerits)Internet (uses,merits and demerits)
Internet (uses,merits and demerits)
 
Imagine Your Life Without the Internet
Imagine Your Life Without the InternetImagine Your Life Without the Internet
Imagine Your Life Without the Internet
 
Internet info
Internet infoInternet info
Internet info
 
2002 0918 Internet History And Growth
2002 0918 Internet History And Growth2002 0918 Internet History And Growth
2002 0918 Internet History And Growth
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
 
Internet history and growth
Internet history and growthInternet history and growth
Internet history and growth
 
Exposé anglais -The internet
Exposé anglais -The internetExposé anglais -The internet
Exposé anglais -The internet
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Advantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkiratAdvantages n disadvantages of intenet by harkirat
Advantages n disadvantages of intenet by harkirat
 
Internet and computer
Internet and computerInternet and computer
Internet and computer
 
Internet
InternetInternet
Internet
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internet
 
advantages and disadvantages of internet
advantages and disadvantages of internetadvantages and disadvantages of internet
advantages and disadvantages of internet
 
Best invention ever
Best invention everBest invention ever
Best invention ever
 
Internet
InternetInternet
Internet
 

Similar a Internet Introduction by SE-I Group

Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming reportBilal Maqbool ツ
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)IMRAN KHAN
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentialschris30931
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...Sijuna Aetta
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)IMRAN KHAN
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantagesHamza Iqbal
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet ArchDuty
 
Elements Of Communication
Elements Of CommunicationElements Of Communication
Elements Of CommunicationSheena Crouch
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEUsama ahmad
 
INTERNET BY TUSHAR & GROUP
INTERNET BY TUSHAR & GROUPINTERNET BY TUSHAR & GROUP
INTERNET BY TUSHAR & GROUPmanetushar
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till nowknowldge
 
Chapter 5 Networking and Communication Learning Objecti.docx
Chapter 5 Networking and Communication Learning Objecti.docxChapter 5 Networking and Communication Learning Objecti.docx
Chapter 5 Networking and Communication Learning Objecti.docxrobertad6
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Megha V
 

Similar a Internet Introduction by SE-I Group (20)

Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
 
History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
 
Internet
Internet Internet
Internet
 
Elements Of Communication
Elements Of CommunicationElements Of Communication
Elements Of Communication
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
INTERNET BY TUSHAR & GROUP
INTERNET BY TUSHAR & GROUPINTERNET BY TUSHAR & GROUP
INTERNET BY TUSHAR & GROUP
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
Chapter 5 Networking and Communication Learning Objecti.docx
Chapter 5 Networking and Communication Learning Objecti.docxChapter 5 Networking and Communication Learning Objecti.docx
Chapter 5 Networking and Communication Learning Objecti.docx
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,
 

Más de Bilal Maqbool ツ (20)

Dld lecture module 01
Dld lecture module 01Dld lecture module 01
Dld lecture module 01
 
Complement
ComplementComplement
Complement
 
Chapter10
Chapter10Chapter10
Chapter10
 
Uncdtalk
UncdtalkUncdtalk
Uncdtalk
 
Okkkkk
OkkkkkOkkkkk
Okkkkk
 
Good
GoodGood
Good
 
Dld lecture module 06
Dld lecture module 06Dld lecture module 06
Dld lecture module 06
 
Dld lecture module 05
Dld lecture module 05Dld lecture module 05
Dld lecture module 05
 
Dld lecture module 04 01
Dld lecture module 04  01Dld lecture module 04  01
Dld lecture module 04 01
 
Dld lecture module 03
Dld lecture module 03Dld lecture module 03
Dld lecture module 03
 
Dld lecture module 02
Dld lecture module 02Dld lecture module 02
Dld lecture module 02
 
Lecture 3 report writtng
Lecture 3 report writtngLecture 3 report writtng
Lecture 3 report writtng
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1 report writing
Lecture 1 report writingLecture 1 report writing
Lecture 1 report writing
 
Bill gates
Bill gatesBill gates
Bill gates
 
Programming assignment 02 (bilal maqbool 10) 2011
Programming assignment 02    (bilal maqbool 10) 2011Programming assignment 02    (bilal maqbool 10) 2011
Programming assignment 02 (bilal maqbool 10) 2011
 
Programming assignment 30 12-11
Programming assignment 30 12-11Programming assignment 30 12-11
Programming assignment 30 12-11
 
Magnetic storage devices
Magnetic storage devicesMagnetic storage devices
Magnetic storage devices
 
How internet technology be used to spread scientific awareness among pakistan...
How internet technology be used to spread scientific awareness among pakistan...How internet technology be used to spread scientific awareness among pakistan...
How internet technology be used to spread scientific awareness among pakistan...
 
Math assignment Program
Math assignment ProgramMath assignment Program
Math assignment Program
 

Último

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Internet Introduction by SE-I Group

  • 1.
  • 2. Respected Sir & Dear friends Welcome
  • 3. Arfa Karim (1995-2012) Dedicated to department of CS&IT &
  • 4. Presented by SE-I Group ( Bilal Maqbool ) AN INTRODUCTION TO INTERNET TECHNOLOGY
  • 5. Group Members 1. Bilal Maqbool. 10 2. Abdul Ghafar. 14 3. Nisar Ahmed. 06 4. Shahzad Tanvir. 21 5. Muhammad Junaid. 45
  • 6. First Member Bilal Maqbool Roll # 10 Internet Introduction & History
  • 7. Definition of Internet By the turn of the century, information, including access to the Internet, will be the basis for personal, economic, and political advancement. The popular name for the Internet is the information superhighway. The Internet links are computer networks all over the world so that users can share resources and communicate with each other. Some computers have direct access to all the facilities on the Internet such as the universities. And other computers, eg privately-owned ones, have indirect links through a commercial service provider, who offers some or all of the Internet facilities.
  • 8. Who Pays for the Internet? There is no clear answer to this question because the Internet is not one "thing", its many things. No one central agency exists that charges individual Internet users.
  • 9. Electronic mail, or e-mail, is probably the most popular and widely used Internet function. E-mail, email, or just mail, is a fast and efficient way to communicate with friends or colleagues. You can communicate with one person at a time or thousands Electronic mail on the internet:
  • 10. Domains EDU Educational sites COM Commercial sites GOV Government sites NET Network administrative organizations MIL Military sites ORG Organizations .xx where xx is the country code (e.g., .eg for Egypt).
  • 11. Introduction to Gopher: Gopher is a client/server system that allows you to access many Internet resources simply by making selections from a sequence of menus. Each time you make a selection, Gopher carries out your request to the computer that contains the information and "serves" it up.
  • 12. Where did Gopher come from? "Born" in April 1991, gopher began as a project at the Microcomputer, Workstation, and Networks Center at the University of Minnesota to help people on campus get answers to computer-related questions. At the time, the computer center staff had accumulated answers to thousands of questions regarding computers and software.
  • 13. Why is it called Gopher? The name "Gopher" is appropriate for three reasons: 1.Just as a real gopher successfully navigates beneath the prairie, the Internet Gopher tunnels through the invisible paths of the Internet to help you find the information you want. 2. The name refers to someone who fetches things or provides service for other people. 3. The Golden Gopher is the mascot of the University of Minnesota.
  • 14. A look at search engines: The World Wide Web is "indexed" through the use of search engines, which are also referred to as "spiders," "robots," "crawlers," or "worms". These search engines comb through the Web documents, identifying text that is the basis for keyword searching. Each search engine works in a different way. Some engines scan for information in the title or header of the document; others look at the bold "headings" on the page for their information. The fact that search engines gather information differently means that each will probably yield different results.
  • 15. History Of Internet Defense Advanced Research Projects Agency (DARPA) in late 1962 to head the work to develop it. The Internet, then known as ARPANET, was brought online in 1969 under a contract let by the renamed Advanced Research Projects Agency (ARPA) which initially connected four major computers at universities in the southwestern US
  • 16. Who was the first to use the Internet? Charley Kline at UCLA sent the first packets on ARPANet as he tried to connect to Stanford Research Institute on Oct 29, 1969.
  • 17. Did Al Gore invent the Internet? According to a CNN transcript of an interview with Wolf Blitzer, Al Gore said,"During my service in the United States Congress, I took the initiative in creating the Internet." Al Gore was not yet in Congress in 1969 when ARPANET started or in 1974 when the term Internet first came into use. Gore was elected to Congress in 1976.
  • 18. THANKS FOR YOUR ATTENTION
  • 19. Second Member Abdul Ghafar. Roll # 14 Working of Internet
  • 20. How does Internet work? The unique thing about the Internet is that it allows many different computers to connect and talk to each other. This is possible because of a set of standards, known as protocols, that govern the transmission of data over the network: TCP/IP (Transmission Control Protocol/Internet Protocol). Most people who use the Internet aren't so interested in details related to these protocols. They do, however, want to know what they can do on the Internet and how to do it effectively.
  • 21. Internet Addresses Because the Internet is a global network of computers each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is known as an IP address.
  • 22. Protocol Stacks and Packets Your computer is connected to the Internet and has a unique address. How does it 'talk' to other computers connected to the Internet? An example should serve here: Let's say your IP address is 1.2.3.4 and you want to send a message to the computer 5.6.7.8. The message you want to send is "Hello computer 5.6.7.8!".
  • 23. Domain Names and Address Resolution The DNS is a distributed database which keeps track of computer's names and their corresponding IP addresses on the Internet. Many computers connected to the Internet host part of the DNS database and the software that allows others to access it. These computers are known as DNS servers.
  • 24. Application Protocols: HTTP and the World Wide Web One of the most commonly used services on the Internet is the World Wide Web (WWW). The application protocol that makes the web work is Hypertext Transfer Protocol or HTTP. Do not confuse this with the Hypertext Markup Language (HTML). HTML is the language used to write web pages. HTTP is the protocol that web browsers and web servers use to communicate with each other over the Internet.
  • 25. Uniform Resource Locators, or URLs: A Uniform Resource Locator or URL is the address of a document you'll find on the WWW. Your WWW browser interprets the information in the URL in order to connect to the proper Internet server and to retrieve your desired document.
  • 26. Transmission Control Protocol Under the application layer in the protocol stack is the TCP layer. When applications open a connection to another computer on the Internet, the messages they send (using a specific application layer protocol) get passed down the stack to the TCP layer. TCP is responsible for routing application protocols to the correct application on the destination computer.
  • 27. Internet Protocol Unlike TCP, IP is an unreliable, connectionless protocol. IP doesn't care whether a packet gets to its destination or not. Nor does IP know about connections and port numbers. IP's job is too send and route packets to other computers. IP packets are independent entities and may arrive out of order or not at all.
  • 28. THANKS FOR YOUR ATTENTION
  • 29. Third Member Nisar Ahmed. Roll # 06 Security of Internet
  • 30. Internet security Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption.
  • 31. Security problems Most of the security problems encountered on the Internet are due to human mistakes. The first level of security "leaks" usually occurs during the development of the website. If a website developer doesn't correctly plan or proof test his scripts, an eventual hacker could extract confidential information from the website itself. This is usually done by exploiting particular errors or by inserting some particular code snippets into an input field or website URL.
  • 32. Types of security 1. Network layer security 2. IP Protocol Electronic mail security (E-mail) 1. Pretty Good Privacy (PGP) 2. Multipurpose Internet Mail Extensions (MIME) 3. Secure/Multipurpose Internet Mail Extensions (S/MIME) 4. Message Authentication Code
  • 33. Firewalls A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
  • 34. Role of firewalls in Internet security and web security Firewalls impose restrictions on incoming and outgoing packets to and from private networks. All the traffic, whether incoming or outgoing, must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points.
  • 35. Viruses • Trojan horse • Spyware • Worms • Botnet
  • 36. Antivirus Antivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware. Such programs are used to detect and usually eliminate viruses; however, it is now common to see security suites, containing also firewalls, anti- spyware, theft protection, and so on to more thoroughly protect users.
  • 37. THANKS FOR YOUR ATTENTION
  • 38. Fourth Member Shahzad Tanvir. Roll # 21 Advantages & Disadvantages of Internet
  • 39. Advantages • E-mail: • 24 hours a day - 7 days a week: • Information: • Online Chat: • Services: • Communities: • Ecommerce: • Software Downloads: • Entertainment:
  • 40. Disadvantages • Theft of Personal information: • Negative effects on family communication: • Internet addiction: • Children using the Internet • Virus threat: • Spamming:
  • 41. The Disadvantages of the Internet at Home • Isolation • Addiction • Inaccurate Information • Hacking of Personal Information • Viruses • Inappropriate Websites
  • 42. THANKS FOR YOUR ATTENTION
  • 43. Fifth Member Muhammad Junaid. Roll # 45 Future of Internet
  • 44. The Future of the internet – Some of the major trends shaping the future of the Internet are summarized below, along with extrapolated predictions: – Globalism – Communities – Virtual reality – Bandwidth. – Wireless. – Grids – Integration
  • 45. Audio web surfing Building the web with standards and accessibility in mind brings the Internet to as wide an audience as possible.
  • 46. Web surf on any device • It seems the tech industry is eager to integrate the Internet into every device these days. It’s the equivalent to adding a digital clock to a coffee maker. Why not? Adding a touch- screen to your fridge and other appliances might create new opportunities and challenges for interfacing Dishwasher Safe
  • 47. • Input revisited • Mobile networking • The end of .com domination • IE6 stops being used
  • 48. THANKS FOR YOUR ATTENTION