Professional Documents
Culture Documents
A)INTERNET ORIGIN
1) PACKET SWITCHING:
Packets are units of electronic information or data while switching refers to the way that packets are transmitted over a network. Under this theory information would continue to flow even if some paths to a particular destination became unavailable.
B) INTERNET ARCHITECHTURE
TCP/IP: TCP breaks down and reassembles the packets whereas IP is responsible for ensuring the packets are sent to the right destination. TCP is responsible for the data delivery of a packet and IP is responsible for the logical addressing. IP obtains the address and TCP guarantees delivery of data to that address.
ROUTERS: They are the traffic cops of the internet. They open the IP packets of data to read the destination address, calculate the best route and then send the packet toward its final destination. When routers determine the next router to receive packets factors like traffic congestion and the number of hops come into play. They have 2 or more physical ports: receiving (input) and sending(output)
B)PROTOCOLS: All computers connected to the internet operate on a set of rules or protocols: TCP or IP C) COMMUNICATING ON THE INTERNET
APPLICATIONS
ONLINE LEARNING
E COMMERCE
INTERNET MARKETING AND BUSINESS TECHNOLOGY E SERVICE INTERNET JOB SEARCHING
BLOGGING
SOCIAL NETWORKING
INTERNET TOOLS
A)TELNET: From your own home or office you
B) FILE TRANSFER PROTOCOL Many tens of thousands of files are downloaded every day over internet. Most of these files are downloaded using FTP. You can also upload files from your computer to another computer on the internet. C)JAVA: Java programs run inside your web browser if you have java enabled browser such as Netscape.
components.
E)JAVA SCRIPT: It is a scripting language that is less complex and therefore much easier to learn than Java and ActiveX.
CGI
SCRIPT:
It
refers
to
the
The Internet enables criminals to target larger numbers of victims more quickly and at greater distances ever before. Cybercriminals take form as hackers who break into computer systems to steal information. One of the most common sources of viruses are files attached to email messages which automatically send copies of themselves to everyone on an infected computers email address list.
INTERNET SECURITY
A)FIREWALLS: They are hardware and