SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Internet, Intranet
& Extranet
Presented By:
Asmita Singh
Asst. Professor
(Swami Keshwanand Rajasthan
Agriculture University, Bikaner)
Internet
 Internet is defined as an Information super Highway, to access
information over the web. However, It can be defined in many
ways as follows:
 Internet is a world-wide global system of interconnected
computer networks.
 Internet uses the standard Internet Protocol (TCP/IP).
 Every computer in internet is identified by a unique IP
address.
 IP Address is a unique set of numbers (such as
110.22.33.114) which identifies a computer location.
 A special computer DNS (Domain Name Server) is used to
give name to the IP Address so that user can locate a
computer by a name.
 For example, a DNS server will resolve a
name http://www.tutorialspoint.com to a particular IP address to uniquely
identify the computer on which this website is hosted.
 Internet is accessible to every user all over the world.
Intranet
 The term Intranet is derived from two words: ‘Intra’ which
means within and ‘net’ which means group of interconnected
computers.
 Intranet is system in which multiple PCs are networked to
be connected to each other. PCs in intranet are not available
to the world outside of the intranet.
 Usually each company or organization has their own
Intranet network and members/employees of that company
can access the computers in their intranet.
 Each computer in Intranet is also identified by a IP
Address, which is unique among the computers in that
Intranet.
EXTRANET
 is an intranet for outside authorized users
using same internet technologies. The outside
users are trusted partners of the organization
who have access to information of their
interest & concern.
 extends the intranet concept to provide a
network that connects a company’s network to
the networks of its business partners, selected
customers, or suppliers.
Domain Name Systems
 If you've ever used the Internet, it's a good bet that you've
used the Domain Name System, or DNS, even without
realizing it.
 DNS is a protocol within the set of standards for how
computers exchange data on the Internet and on many
private networks, known as the TCP/IP protocol suite.
 Its basic job is to turn a user-friendly domain
name like "howstuffworks.com" into
an Internet Protocol (IP) address like
70.42.251.42 that computers use to identify
each other on the network. It's like your
computer's GPS for the Internet.
INTERNET PROTOCOL (IP)
 IP address is a numerical label assigned to each
device connected to a computer network that uses
the Internet Protocol for communication.
 An IP address serves two principal functions: host
or network interface identification and
location addressing.
 Your IP can change with the change in network.
 It is a 32 bit address ( binary address) often written in
4 groups of 3 decimals each i.e 192.168.1.2
 This is a logical address for your device through
which it communicates to the outside world.
MEDIA ACCESS CONTROL
(MAC ADDRESS)
 Mac address is your machine address . This address
will never change & is the unique machine address
given to your device .
 Your device will have communication with the
local area network or any network using this
address.
 Once you use the network your mac address is
stored in the network table so that network does not
have to search your mac address again and again.
 It is 48 bits (6 bytes) hexadecimal address.
 MAC address is assigned by the manufacturer
of NIC ( Network Interface Card).
 NIC is a chip installed in the computer that lets
you connect your device with any network.
 For example, consider a network adapter with
the MAC address "00-14-22-01-23-45."
Simple Mail Transfer Protocol
(SMTP)
 The Simple Mail Transfer Protocol (SMTP) is used to transfer
electronic mail from one user to another. This task is done by means
of email client software (User Agents) the user is using.
 User Agents help the user to type and format the email and store it
until internet is available.
 When an email is submitted to send, the sending process is handled by
Message Transfer Agent which normally comes inbuilt in email client
software.
 Message Transfer Agent uses SMTP to forward the email to another
Message Transfer Agent (Server side).
 Client software uses Internet Message Access Protocol (IMAP) or POP
protocols to receive emails.
POP/
IMAP
FTP
 The File Transfer Protocol (FTP) is the most
widely used protocol for file transfer over the
network. FTP uses TCP/IP for communication.
 The client requests the server for a file. When the
server receives a request for a file, it opens a TCP
connection for the client and transfers the file.
 After the transfer is complete, the server closes
the connection. For a second file, client requests
again and the server reopens a new TCP
connection.
Internet, Intranet & Extranet: Understanding Key Concepts

Más contenido relacionado

La actualidad más candente

System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architectureAmir Hossain
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
User administration concepts and mechanisms
User administration concepts and mechanismsUser administration concepts and mechanisms
User administration concepts and mechanismsDuressa Teshome
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Networking Models
Networking ModelsNetworking Models
Networking ModelsAftab Mirza
 

La actualidad más candente (20)

Chapter3
Chapter3Chapter3
Chapter3
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Network management
Network managementNetwork management
Network management
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
X.25 protocol
X.25 protocolX.25 protocol
X.25 protocol
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Database
DatabaseDatabase
Database
 
User administration concepts and mechanisms
User administration concepts and mechanismsUser administration concepts and mechanisms
User administration concepts and mechanisms
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Networking Models
Networking ModelsNetworking Models
Networking Models
 
Vlan
Vlan Vlan
Vlan
 

Similar a Internet, Intranet & Extranet: Understanding Key Concepts

Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eightShaheen Khan
 
How does the internet work
How does the internet workHow does the internet work
How does the internet workmraheel205
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologiesRajesh R Singh
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologiesRajeshRaushan8
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 

Similar a Internet, Intranet & Extranet: Understanding Key Concepts (20)

Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Iap final
Iap finalIap final
Iap final
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologies
 
General it terminologies
General it terminologiesGeneral it terminologies
General it terminologies
 
Internet
InternetInternet
Internet
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Mcse question
Mcse questionMcse question
Mcse question
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Sem
SemSem
Sem
 
Ip
IpIp
Ip
 

Último

eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Anthony Dahanne
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 

Último (20)

eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024Not a Kubernetes fan? The state of PaaS in 2024
Not a Kubernetes fan? The state of PaaS in 2024
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 

Internet, Intranet & Extranet: Understanding Key Concepts

  • 1. Internet, Intranet & Extranet Presented By: Asmita Singh Asst. Professor (Swami Keshwanand Rajasthan Agriculture University, Bikaner)
  • 2. Internet  Internet is defined as an Information super Highway, to access information over the web. However, It can be defined in many ways as follows:  Internet is a world-wide global system of interconnected computer networks.  Internet uses the standard Internet Protocol (TCP/IP).  Every computer in internet is identified by a unique IP address.  IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer location.  A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
  • 3.  For example, a DNS server will resolve a name http://www.tutorialspoint.com to a particular IP address to uniquely identify the computer on which this website is hosted.  Internet is accessible to every user all over the world.
  • 4. Intranet  The term Intranet is derived from two words: ‘Intra’ which means within and ‘net’ which means group of interconnected computers.  Intranet is system in which multiple PCs are networked to be connected to each other. PCs in intranet are not available to the world outside of the intranet.  Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet.  Each computer in Intranet is also identified by a IP Address, which is unique among the computers in that Intranet.
  • 5.
  • 6.
  • 7. EXTRANET  is an intranet for outside authorized users using same internet technologies. The outside users are trusted partners of the organization who have access to information of their interest & concern.  extends the intranet concept to provide a network that connects a company’s network to the networks of its business partners, selected customers, or suppliers.
  • 8.
  • 9. Domain Name Systems  If you've ever used the Internet, it's a good bet that you've used the Domain Name System, or DNS, even without realizing it.  DNS is a protocol within the set of standards for how computers exchange data on the Internet and on many private networks, known as the TCP/IP protocol suite.
  • 10.  Its basic job is to turn a user-friendly domain name like "howstuffworks.com" into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network. It's like your computer's GPS for the Internet.
  • 11.
  • 12. INTERNET PROTOCOL (IP)  IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.  An IP address serves two principal functions: host or network interface identification and location addressing.  Your IP can change with the change in network.
  • 13.  It is a 32 bit address ( binary address) often written in 4 groups of 3 decimals each i.e 192.168.1.2  This is a logical address for your device through which it communicates to the outside world.
  • 14. MEDIA ACCESS CONTROL (MAC ADDRESS)  Mac address is your machine address . This address will never change & is the unique machine address given to your device .  Your device will have communication with the local area network or any network using this address.  Once you use the network your mac address is stored in the network table so that network does not have to search your mac address again and again.
  • 15.  It is 48 bits (6 bytes) hexadecimal address.  MAC address is assigned by the manufacturer of NIC ( Network Interface Card).  NIC is a chip installed in the computer that lets you connect your device with any network.  For example, consider a network adapter with the MAC address "00-14-22-01-23-45."
  • 16. Simple Mail Transfer Protocol (SMTP)  The Simple Mail Transfer Protocol (SMTP) is used to transfer electronic mail from one user to another. This task is done by means of email client software (User Agents) the user is using.  User Agents help the user to type and format the email and store it until internet is available.  When an email is submitted to send, the sending process is handled by Message Transfer Agent which normally comes inbuilt in email client software.  Message Transfer Agent uses SMTP to forward the email to another Message Transfer Agent (Server side).  Client software uses Internet Message Access Protocol (IMAP) or POP protocols to receive emails.
  • 18. FTP  The File Transfer Protocol (FTP) is the most widely used protocol for file transfer over the network. FTP uses TCP/IP for communication.  The client requests the server for a file. When the server receives a request for a file, it opens a TCP connection for the client and transfers the file.  After the transfer is complete, the server closes the connection. For a second file, client requests again and the server reopens a new TCP connection.