SlideShare una empresa de Scribd logo
1 de 64
Descargar para leer sin conexión
Infrastructure of the
Information Super Highway 

      26 January 2004
       For PIMSAT
          By : Khawar Nehal
  Applied Technology Research Center
       khawar.nehal@atrc.net.pk
           92­333­2486216
           92­21­38180991
No one owns the Internet.
       It is collection of networks.
The name was derived from the collection.
      Started in 1969 with 4 hosts.
   Monitored by The Internet Society 
www.isoc.org which was created in 1992
You will learn about
            domain name servers
            network access points
                 backbones
and how your computer connect to the Internet.
The connectivity options are :
Dialup, ISDN, LAN, WLAN, V.35 Radio, VSAT, 
   DVB Satellite, DSL, GSM, Satellite Modem, 
 GPRS, UMTS, Bluetooth, Infrared, or any other 
      way two computers can communicate.
Basically all you need is an implementation of the 
 TCP/IP protocol from your computer to the other 
        computer connected to the Internet.
To make it easier to find a computer connected to 
 the Internet, ISPs came in to provide a 
 commercial service.
The ISPs charge to have your computer connected 
 to their computers. 
The ISPs help connect lots of computers to the 
 internet simultaneously.




http://127.0.0.1/connect.swf
The ISPs get one or more connections from large 
 communications companies.
The large communications companies sort of 
 provide a whole sale connection service for ISPs.
The large companies own or rent satellites and fiber 
 connectivity worldwide.
Instead of having just one large connection between 
  large companies there are several.


http://127.0.0.1/router­inet.swf
Example HK Telecom wants to connect to British 
 Telecom.
They can have three fiber connections going 
 through the middle east, Europe, and one through 
 the US. Along with a satellite or two to back that 
 up.
Imagine that Company A is a large ISP.
In each major city, Company A has a Point o 
  Presence (POP)
The POP in each city is a rack full of modems that 
 the ISP's customers dial into. 
Company A leases fiber optic lines from the phone 
 company to connect the POPs together 
Imagine that Company B is a corporate ISP.
Company B builds large buildings in major cities 
 and corporations locate their Internet server 
 machines in these buildings. 
Company B is such a large company that it runs its 
 own fiber optic lines between its buildings so that 
 they are all interconnected.
In this arrangement, all of Company A's customers 
  can talk to each other, and all of Company B's 
  customers can talk to each other, but there is no 
  way for Company A's customers and Company 
  B's customers to intercommunicate.
Therefore, Company A and Company B both agree 
 to connect to Network Access Points (NAPs) in 
 various cities, and traffic between the two 
 companies flows between the networks at the 
 NAPs.
Network Access Points are also known as network 
 peering points.


In the real Internet, dozens of large Internet 
  providers interconnect at NAPs in various cities, 
  and trillions of bytes of data flow between the 
  individual networks at these points.
Bridging The Divide
All of these networks rely on NAPs, backbones and 
 routers to talk to each other. 
What is incredible about this process is that a 
 message can leave one computer and travel 
 halfway across the world through several 
 different networks and arrive at another computer 
 in a fraction of a second!
Routers
The routers determine where to send 
 information from one computer to 
 another. 
Routers
Routers are specialized computers 
 that send your messages and those 
 of every other Internet user 
 speeding to their destinations 
 along thousands of pathways. 
Routers
A router has two separate, but related, jobs:
    * It ensures that information doesn't go where it's 
   not needed. This is crucial for keeping large 
   volumes of data from clogging the connections of 
   "innocent bystanders."
    * It makes sure that information does make it to 
   the intended destination. 
Routers
In performing these two jobs, a router is extremely 
  useful in dealing with two separate computer 
  networks. It joins the two networks, passing 
  information from one to the other. It also protects 
  the networks from one another, preventing the 
  traffic on one from unnecessarily spilling over to 
  the other. 
Routers
Regardless of how many networks are attached, the 
 basic operation and function of the router remains 
 the same. Since the Internet is one huge network 
 made up of tens of thousands of smaller 
 networks, its use of routers is an absolute 
 necessity.




http://127.0.0.1/router­lan.swf
NSF
The National Science Foundation (NSF) created the 
 first high­speed backbone in 1987. Called 
 NSFNET, it was a T1 line that connected 170 
 smaller networks together and operated at 1.544 
 Mbps (million bits per second).
Commercial Providers
IBM, MCI and Merit worked with NSF to create 
  the backbone and developed a T3 (45 Mbps) 
  backbone the following year.
Backbones
Backbones are typically fiber optic trunk lines. The 
 trunk line has multiple fiber optic cables 
 combined together to increase the capacity. Fiber 
 optic cables are designated OC for optical carrier, 
 such as OC­3, OC­12 or OC­48. An OC­3 line is 
 capable of transmitting 155 Mbps while an OC­
 48 can transmit 2,488 Mbps (2.488 Gbps). 
Backbones
Compare that to a typical 56K modem transmitting 
 56,000 bps and you see just how fast a modern 
 backbone is.
Today
Today there are many companies that operate their 
 own high­capacity backbones, and all of them 
 interconnect at various NAPs around the world. 
 In this way, everyone on the Internet, no matter 
 where they are and what company they use, is 
 able to talk to everyone else on the planet.
Today
The entire Internet is a gigantic, sprawling 
 agreement between companies to 
 intercommunicate freely.
Protocols
Every machine on the Internet has a unique 
 identifying number, called an IP Address. 
The IP stands for Internet Protocol, which is the 
 language that computers use to communicate 
 over the Internet. 
Protocols
A protocol is the pre­defined way that someone 
 who wants to use a service talks with that service. 
The "someone" could be a person, but more often it 
 is a computer program like a Web browser.
IP Address
A typical IP address looks like this:


216.27.61.137
IP Address
To make it easier for us humans to remember, IP 
 addresses are normally expressed in decimal 
 format as a dotted decimal number like the one 
 above. 
But computers communicate in binary form. Look 
 at the same IP address in binary:
11011000.00011011.00111101.10001001
IP Address
The four numbers in an IP address are called octets, 
 because they each have eight positions when 
 viewed in binary form. 
If you add all the positions together, you get 32, 
   which is why IP addresses are considered 32­bit 
   numbers. 
IP Address
Since each of the eight positions can have two 
  different states (1 or zero), the total number of 
  possible combinations per octet is 28 or 256. So 
  each octet can contain any value between zero 
  and 255. 
Combine the four octets and you get 232 or a 
 possible 4,294,967,296 unique values!
IP Address Restrictions
Out of the almost 4.3 billion possible combinations, 
 certain values are restricted from use as typical IP 
 addresses. 
For example, the IP address 0.0.0.0 is reserved for 
 the default network and the address 
 255.255.255.255 is used for broadcasts.
IP Address Classes
The octets serve a purpose other than simply 
 separating the numbers. 
They are used to create classes of IP addresses that 
 can be assigned to a particular business, 
 government or other entity based on size and 
 need. 
IP Address Classes
The octets are split into two sections: Net and Host. 
The Net section always contains the first octet. 
It is used to identify the network that a computer 
   belongs to. 
Host (sometimes referred to as Node) identifies the 
 actual computer on the network.
IP Address Classes
The Host section always contains the last octet. 
There are five IP classes plus certain special 
 addresses. 
Before DNS
When the Internet was in its infancy, it consisted of 
 a small number of computers hooked together 
 with modems and telephone lines. 
You could only make connections by providing the 
 IP address of the computer you wanted to 
 establish a link with. 
Before DNS
For example, a typical IP address might be 
 216.27.22.162. 
This was fine when there were only a few hosts out 
 there, but it became unwieldy as more and more 
 systems came online.
The /etc/hosts file
The first solution to the problem was a simple text 
 file maintained by the Network Information 
 Center that mapped names to IP addresses. 
Soon this text file became so large it was too 
 cumbersome to manage. 
The DNS
In 1983, the University of Wisconsin created the 
  Domain Name System (DNS), which maps text 
  names to IP addresses automatically. 
This way you only need to remember the domain 
 name of the site like yahoo.com instead of the IP 
 address.
The DNS
When you use the Web or send an e­mail message, 
 you use a domain name to do it. 
For example, the Uniform Resource Locator (URL) 
 "http://www.yahoo.com" contains the domain 
 name yahoo.com
The DNS
So does this e­mail address: example@yahoo.com. 
Every time you use a domain name, you use the 
 Internet's DNS servers to translate the human­
 readable domain name into the machine­readable 
 IP address. 
Top Level Domains
Top­level domain names, also called first­level 
 domain names, include .COM, .ORG, .NET, 
 .EDU, .GOV, .MIL, .PK, .INT, and a few 
 hundred more.
Within every top­level domain there is a huge list 
 of second­level domains. For example, in the 
 .COM first­level domain there is: yahoo.com 
Top Level Domains
Every name in the .COM top­level domain must be 
 unique. 
The left­most word, like www, is the host name. 
It specifies the name of a specific machine (with a 
   specific IP address) in a domain. 
A given domain can, potentially, contain millions 
 of host names as long as they are all unique 
 within that domain.
Top Level Domains
DNS servers accept requests from programs and 
 other name servers to convert domain names into 
 IP addresses. 
When a request comes in, the DNS server can do 
 one of four things with it:
Top Level Domains
# It can answer the request with an IP address 
  because it already knows the IP address for the 
  requested domain.
# It can contact another DNS server and try to find 
  the IP address for the name requested. It may 
  have to do this multiple times.
Top Level Domains


# It can say, "I don't know the IP address for the 
  domain you requested, but here's the IP address 
  for a DNS server that knows more than I do."
# It can return an error message because the 
  requested domain name is invalid or does not 
  exist.
Top Level Domains

Let's say that you type the URL www.yahoo.com 
 into your browser. 
The browser contacts a DNS server to get the IP 
 address. 
A DNS server would start its search for an IP 
 address by contacting one of the root DNS 
 servers. 
Top Level Domains

The root servers know the IP addresses for all of 
 the DNS servers that handle the top­level 
 domains (.COM, .NET, .ORG, etc.). 
Your DNS server would ask the root for 
 www.yahoo.com, and the root would say, "I don't 
 know the IP address for www.yahoo.com, but 
 here's the IP address for the .COM DNS server."
Top Level Domains

Your name server then sends a query to the .COM 
 DNS server asking it if it knows the IP address 
 for www.yahoo.com. 
The DNS server for the COM domain knows the IP 
 addresses for the name servers handling the 
 www.yahoo.com domain, so it returns those.
Top Level Domains

Your name server then contacts the DNS server for 
 www.yahoo.com and asks if it knows the IP 
 address for www.yahoo.com. 
It actually does, so it returns the IP address to your 
   DNS server, which returns it to the browser, 
   which can then contact the server for 
   www.yahoo.com to get a Web page.
Redundancy

One of the keys to making this work is redundancy. 
There are multiple DNS servers at every level, so 
 that if one fails, there are others to handle the 
 requests. 
The other key is caching. Once a DNS server 
 resolves a request, it caches the IP address it 
 receives.
Redundancy

Once it has made a request to a root DNS server for 
 any .COM domain, it knows the IP address for a 
 DNS server handling the .COM domain, so it 
 doesn't have to bug the root DNS servers again 
 for that information. 
DNS servers can do this for every request, and this 
 caching helps to keep things from bogging down.
Redundancy

Even though it is totally invisible, DNS servers 
 handle billions of requests every day and they are 
 essential to the Internet's smooth functioning. 
The fact that this distributed database works so well 
 and so invisibly day in and day out is a testimony 
 to the design.
Web Servers

Internet servers make the Internet possible. 
All of the machines on the Internet are either 
 servers or clients. 
The machines that provide services to other 
 machines are servers. 
Web Server


And the machines that are used to connect to those 
 services are clients. 
There are Web servers, e­mail servers, FTP servers 
 and so on serving the needs of Internet users all 
 over the world.
Web Server


When you connect to www.yahoo.com to read a 
 page, you are a user sitting at a client's machine. 
You are accessing the Yahoo Web server. The 
 server machine finds the page you requested and 
 sends it to you.
Web Server


Clients that come to a server machine do so with a 
 specific intent, so clients direct their requests to a 
 specific software server running on the server 
 machine. 
For example, if you are running a Web browser on 
 your machine, it will want to talk to the Web 
 server on the server machine, not the e­mail 
 server.
Web Server

A server has a static IP address that does not 
 change very often. 
A home machine that is dialing up through a 
 modem, on the other hand, typically has an IP 
 address assigned by the ISP every time you dial 
 in. 
Web Server

That IP address is unique for your session ­­ it may 
 be different the next time you dial in. 
This way, an ISP only needs one IP address for 
 each modem it supports, rather than one for each 
 customer.
Web Server

Any server machine makes its services available 
 using numbered ports ­­ one for each service that 
 is available on the server. 
Web Server

For example, if a server machine is running a Web 
 server and a file transfer protocol (FTP) server, 
 the Web server would typically be available on 
 port 80, and the FTP server would be available on 
 port 21. 
Clients connect to a service at a specific IP address 
 and on a specific port number.
Web Server

Once a client has connected to a service on a 
 particular port, it accesses the service using a 
 specific protocol. 
Protocols are often text and simply describe how 
  the client and server will have their conversation. 
  Every Web server on the Internet conforms to the 
  hypertext transfer protocol (HTTP). 
Web Server

Networks, routers, NAPs, ISPs, DNS and powerful 
 servers all make the Internet possible. 
It is truly amazing when you realize that all this 
   information is sent around the world in a matter 
   of milliseconds! 
Web Server

The components are extremely important in 
 modern life ­­ without them, there would be no 
 Internet. 
And without the Internet, life would be very 
 different indeed for many of us.

Más contenido relacionado

La actualidad más candente

Computer Networks And Topology
Computer  Networks And Topology Computer  Networks And Topology
Computer Networks And Topology Fatih Bingül
 
IMD 251 - INTERNET
IMD 251 - INTERNETIMD 251 - INTERNET
IMD 251 - INTERNETisma ishak
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
CE-Introduction-history-Draft
CE-Introduction-history-DraftCE-Introduction-history-Draft
CE-Introduction-history-DraftRoman Krzanowski
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyManas Saha
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1Aram Mohammed
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf Vignesh kumar
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 

La actualidad más candente (20)

Computer Networks And Topology
Computer  Networks And Topology Computer  Networks And Topology
Computer Networks And Topology
 
Data communication
Data communicationData communication
Data communication
 
IMD 251 - INTERNET
IMD 251 - INTERNETIMD 251 - INTERNET
IMD 251 - INTERNET
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
CE-Introduction-history-Draft
CE-Introduction-history-DraftCE-Introduction-history-Draft
CE-Introduction-history-Draft
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
IP Address
IP AddressIP Address
IP Address
 
Networking
NetworkingNetworking
Networking
 
Networking
NetworkingNetworking
Networking
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
Network devices
Network devicesNetwork devices
Network devices
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 

Similar a Internet Infrastructure 26 Jan 2004 3

Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLexume1
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network Faraz Ahmed
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 

Similar a Internet Infrastructure 26 Jan 2004 3 (20)

Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addresses
 
Data Communication & Computer Network
Data Communication & Computer Network Data Communication & Computer Network
Data Communication & Computer Network
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Computer network
Computer networkComputer network
Computer network
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Final isp
Final ispFinal isp
Final isp
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Seminar
SeminarSeminar
Seminar
 
Networks faq
Networks faqNetworks faq
Networks faq
 
information technology
information technologyinformation technology
information technology
 
information technology
information technologyinformation technology
information technology
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Computer network
Computer networkComputer network
Computer network
 

Más de Khawar Nehal khawar.nehal@atrc.net.pk

Más de Khawar Nehal khawar.nehal@atrc.net.pk (20)

Important questions which a business plan should address.
Important questions which a business plan should address.Important questions which a business plan should address.
Important questions which a business plan should address.
 
Dubai Computer Services Company Profile
Dubai Computer Services Company ProfileDubai Computer Services Company Profile
Dubai Computer Services Company Profile
 
Atrc shale gas in Pakistan presentation 6 may 2015 1
Atrc shale gas in Pakistan presentation 6 may 2015 1Atrc shale gas in Pakistan presentation 6 may 2015 1
Atrc shale gas in Pakistan presentation 6 may 2015 1
 
Linux intro cbm_2_oct_2004-2
Linux intro cbm_2_oct_2004-2Linux intro cbm_2_oct_2004-2
Linux intro cbm_2_oct_2004-2
 
Atrc dcs crm_presentation_10_sep_2014-1
Atrc dcs crm_presentation_10_sep_2014-1Atrc dcs crm_presentation_10_sep_2014-1
Atrc dcs crm_presentation_10_sep_2014-1
 
Password security by_khawar_6_sep_2014-1
Password security by_khawar_6_sep_2014-1Password security by_khawar_6_sep_2014-1
Password security by_khawar_6_sep_2014-1
 
Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014Service oriented architecture 27 May 2014
Service oriented architecture 27 May 2014
 
Atrc social media presentation 5 Jan 2013 for international
Atrc social media presentation 5 Jan 2013 for internationalAtrc social media presentation 5 Jan 2013 for international
Atrc social media presentation 5 Jan 2013 for international
 
Accident investigation course
Accident investigation courseAccident investigation course
Accident investigation course
 
Do not be_late_inshallah_5_jan_2014-1
Do not be_late_inshallah_5_jan_2014-1Do not be_late_inshallah_5_jan_2014-1
Do not be_late_inshallah_5_jan_2014-1
 
Accident Investigation and Analysis
Accident Investigation and AnalysisAccident Investigation and Analysis
Accident Investigation and Analysis
 
Monotheism in the Bible
Monotheism in the BibleMonotheism in the Bible
Monotheism in the Bible
 
Autism cure by_khawar_nehal_atrc_10_oct_2013-2
Autism cure by_khawar_nehal_atrc_10_oct_2013-2Autism cure by_khawar_nehal_atrc_10_oct_2013-2
Autism cure by_khawar_nehal_atrc_10_oct_2013-2
 
Global climate change by IPCC
Global climate change by IPCCGlobal climate change by IPCC
Global climate change by IPCC
 
Topic 7 access control
Topic 7 access controlTopic 7 access control
Topic 7 access control
 
Topic 6 authentication2 12_dec_2012-1
Topic 6 authentication2 12_dec_2012-1Topic 6 authentication2 12_dec_2012-1
Topic 6 authentication2 12_dec_2012-1
 
Lect5 authentication 5_dec_2012-1
Lect5 authentication 5_dec_2012-1Lect5 authentication 5_dec_2012-1
Lect5 authentication 5_dec_2012-1
 
Topic 10 Emarketing plan 1
Topic 10 Emarketing plan 1Topic 10 Emarketing plan 1
Topic 10 Emarketing plan 1
 
Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2
 
Network Security Topic 3 cryptography
Network Security Topic 3 cryptographyNetwork Security Topic 3 cryptography
Network Security Topic 3 cryptography
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Internet Infrastructure 26 Jan 2004 3