SlideShare una empresa de Scribd logo
1 de 16
M.Raj shree
M.SC(IT)
Nadar saraswathi college of arts&science
Internet Protocol
 The Internet Protocol (IP) is the method or
protocol by which data is sent from one computer to
another on the internet. Each computer on the
Internet has at least one ip address that uniquely
identifies it from all other computers on the
Internet.
 The Internet Protocol (IP) is a protocol, or set of
rules, for routing and addressing packets of data so
that they can travel across networks and arrive at the
correct destination.
 When you send or receive data (for example, an e-
mail note or a Web page), the message gets divided
into little chunks called packets. Each of these
packets contains both the sender's Internet
address and the receiver's address. Any packet is
sent first to a gateway computer that understands a
small part of the Internet
 IP is a connectionless protocol, which means that
there is no continuing connection between the end
points that are communicating
 IP has the task of delivering packets from the
source host to the destination host solely based on
the IP address in the packet headers
 The Internet Protocol is the principal
communications protocol in the Internet protocol
suite for relaying datagrams across network
boundaries. Its routing function enables
internetworking, and essentially establishes the
Internet
 Internet Protocol is very crucial because the
entire web keeps running over it.
Types of internet protocol
 Several protocols are used on the Internet,
including Electronic Mail (e-mail), File
Transfer Protocol (FTP), HTTP (World
Wide Web), News (or Usenet), Gopher and
Telnet. Each of these has its own standard
and usage.
File Transfer Protocol
 File Transfer Protocol, or FTP, is a means of
transferring a file from one computer to another. FTP
is commonly used for uploading a web page to a web
server so that it may be seen on the World Wide Web.
A special program, called a client, is usually needed to
use FTP.
 The File Transfer Protocol (FTP) is a standard
network protocol used for the transfer of computer
files between a client and server on a computer
network. FTP is built on a client-server model
architecture using separate control and data
connections between the client and the server
FTP Clients
 FTP client is a program that implements a file transfer
protocol which allows you to transfer files between two
hosts on the internet.
 It allows a user to connect to a remote host and upload
or download the files.
 It has a set of commands that we can use to connect to
a host, transfer the files between you and your host
and close the connection.
 The FTP program is also available as a built-in
component in a Web browser. This GUI based FTP
client makes the file transfer very easy and also does
not require to remember the FTP commands.
HTTP
 HTTPS stands for Hyper Text Transfer Protocol
Secure. It is a protocol for securing the
communication between two systems e.g. the
browser and the web server.
 Hypertext transfer protocol secure (HTTPS) is the
secure version of http, which is the primary
protocol used to send data between a web browser
and a website. HTTPS is encrypted in order to
increase security of data transfer.
 "https://example.com"
Secure Socket Layer (SSL)
 SSL is the standard security technology for
establishing an encrypted link between the two
systems. These can be browser to server, server to
server or client to server. Basically, SSL ensures
that the data transfer between the two systems
remains encrypted and private.
 The https is essentially http over SSL. SSL
establishes an encrypted link using an SSL
certificate which is also known as a digital
certificate.
 Secure Communication: https makes a secure
connection by establishing an encrypted link
between the browser and the server or any two
systems.
 Data Integrity: https provides data integrity by
encrypting the data and so, even if hackers
manage to trap the data, they cannot read or
modify it.
 Privacy and Security: https protects the privacy
and security of website users by preventing
hackers to passively listen to communication
between the browser and the server.
Advantage of http
 Faster Performance: https increases the
speed of data transfer compared to http by
encrypting and reducing the size of the
data.
 SEO: Use of https increases SEO ranking. In
Google Chrome, Google shows the Not
Secure label in the browser if users' data is
collected over http.
 Future: https represents the future of the
web by making internet safe for users and
website owners.
Telnet
 Telnet lets you log in to a remote computer just as
you would if you were there. So any commands
that you would be able to run from the remote
computer if you were sitting in front of it, you
would be able to run from the computer you
logged in from.
 Telnet provides a connection to the remote
computer in such a way that a local terminal
appears to be at the remote side
Local Login
 When a user logs into a local computer, then it is
known as local login.
 When the workstation running terminal emulator, the
keystrokes entered by the user are accepted by the
terminal driver. The terminal driver then passes these
characters to the operating system which in turn,
invokes the desired application program
Remote login
 When the user wants to access an application program
on a remote computer, then the user must perform
remote login.
Gopher
 Another tool of the Internet is Gopher, a
menu-based program that enables you to
browse for information without knowing
where the material is located. It lets you
search a list of resources and then sends the
material to you.
 A Gopher system consists of a series of
hierarchical hyperlinkable menus. The
choice of menu items and titles is controlled
by the administrator of the server

Más contenido relacionado

La actualidad más candente

Types of network
Types of networkTypes of network
Types of network
ishjari
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
raniseetha
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
Arushi Garg
 

La actualidad más candente (20)

Types of network
Types of networkTypes of network
Types of network
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Network topology
Network topologyNetwork topology
Network topology
 
Protocols
ProtocolsProtocols
Protocols
 
Data transmission
Data transmissionData transmission
Data transmission
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Transmission Modes in Computer Networks
Transmission Modes in Computer Networks Transmission Modes in Computer Networks
Transmission Modes in Computer Networks
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Internet basic
Internet basicInternet basic
Internet basic
 

Similar a internet protocol

The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
Priyanka Shinde
 

Similar a internet protocol (20)

application layer
application layerapplication layer
application layer
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 

Más de rajshreemuthiah (20)

oracle
oracleoracle
oracle
 
quality
qualityquality
quality
 
bigdata
bigdatabigdata
bigdata
 
polymorphism
polymorphismpolymorphism
polymorphism
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
 
interface
interfaceinterface
interface
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
 
concurrency control
concurrency controlconcurrency control
concurrency control
 
Education
EducationEducation
Education
 
Formal verification
Formal verificationFormal verification
Formal verification
 
Transaction management
Transaction management Transaction management
Transaction management
 
Multi thread
Multi threadMulti thread
Multi thread
 
System testing
System testingSystem testing
System testing
 
software maintenance
software maintenancesoftware maintenance
software maintenance
 
exception handling
exception handlingexception handling
exception handling
 
e governance
e governancee governance
e governance
 
recovery management
recovery managementrecovery management
recovery management
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
 
os linux
os linuxos linux
os linux
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

internet protocol

  • 1. M.Raj shree M.SC(IT) Nadar saraswathi college of arts&science
  • 2. Internet Protocol  The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet. Each computer on the Internet has at least one ip address that uniquely identifies it from all other computers on the Internet.  The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.
  • 3.  When you send or receive data (for example, an e- mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet  IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating
  • 4.  IP has the task of delivering packets from the source host to the destination host solely based on the IP address in the packet headers  The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet  Internet Protocol is very crucial because the entire web keeps running over it.
  • 5.
  • 6. Types of internet protocol  Several protocols are used on the Internet, including Electronic Mail (e-mail), File Transfer Protocol (FTP), HTTP (World Wide Web), News (or Usenet), Gopher and Telnet. Each of these has its own standard and usage.
  • 7. File Transfer Protocol  File Transfer Protocol, or FTP, is a means of transferring a file from one computer to another. FTP is commonly used for uploading a web page to a web server so that it may be seen on the World Wide Web. A special program, called a client, is usually needed to use FTP.  The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server
  • 8. FTP Clients  FTP client is a program that implements a file transfer protocol which allows you to transfer files between two hosts on the internet.  It allows a user to connect to a remote host and upload or download the files.  It has a set of commands that we can use to connect to a host, transfer the files between you and your host and close the connection.  The FTP program is also available as a built-in component in a Web browser. This GUI based FTP client makes the file transfer very easy and also does not require to remember the FTP commands.
  • 9. HTTP  HTTPS stands for Hyper Text Transfer Protocol Secure. It is a protocol for securing the communication between two systems e.g. the browser and the web server.  Hypertext transfer protocol secure (HTTPS) is the secure version of http, which is the primary protocol used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer.  "https://example.com"
  • 10. Secure Socket Layer (SSL)  SSL is the standard security technology for establishing an encrypted link between the two systems. These can be browser to server, server to server or client to server. Basically, SSL ensures that the data transfer between the two systems remains encrypted and private.  The https is essentially http over SSL. SSL establishes an encrypted link using an SSL certificate which is also known as a digital certificate.
  • 11.  Secure Communication: https makes a secure connection by establishing an encrypted link between the browser and the server or any two systems.  Data Integrity: https provides data integrity by encrypting the data and so, even if hackers manage to trap the data, they cannot read or modify it.  Privacy and Security: https protects the privacy and security of website users by preventing hackers to passively listen to communication between the browser and the server. Advantage of http
  • 12.  Faster Performance: https increases the speed of data transfer compared to http by encrypting and reducing the size of the data.  SEO: Use of https increases SEO ranking. In Google Chrome, Google shows the Not Secure label in the browser if users' data is collected over http.  Future: https represents the future of the web by making internet safe for users and website owners.
  • 13.
  • 14. Telnet  Telnet lets you log in to a remote computer just as you would if you were there. So any commands that you would be able to run from the remote computer if you were sitting in front of it, you would be able to run from the computer you logged in from.  Telnet provides a connection to the remote computer in such a way that a local terminal appears to be at the remote side
  • 15. Local Login  When a user logs into a local computer, then it is known as local login.  When the workstation running terminal emulator, the keystrokes entered by the user are accepted by the terminal driver. The terminal driver then passes these characters to the operating system which in turn, invokes the desired application program Remote login  When the user wants to access an application program on a remote computer, then the user must perform remote login.
  • 16. Gopher  Another tool of the Internet is Gopher, a menu-based program that enables you to browse for information without knowing where the material is located. It lets you search a list of resources and then sends the material to you.  A Gopher system consists of a series of hierarchical hyperlinkable menus. The choice of menu items and titles is controlled by the administrator of the server