The Internet Protocols

Description

Slide Set on The Internet Protocols, created by SABAtoothtiga on 04/11/2015.
SABAtoothtiga
Slide Set by SABAtoothtiga, updated more than 1 year ago
SABAtoothtiga
Created by SABAtoothtiga about 9 years ago
97
0

Resource summary

Slide 1

    The internet Protocols
    Point of presence (PoP) Network Access Point (NAP) Internet Protocol (IP) Transmission Control Protocol (TCP) File Transfer Protocol (FTP) Internet Service Provider (ISP)

Slide 2

    Point of presence (PoP)
    A point of presence is a physical location. It acts as access point from on place to the rest of the internet. It generally has a unique IP address and  two or more different networks or communication devices build a connection with each other when this happens. It also helps other devices establish a connection with the Internet.
    Caption: : How PoP works.

Slide 3

    Network Access Point (NAP)
     A network access point (NAP) is one of several major Internet interconnection points. These serve to connect all the  Internet access providers together so that people can contact or send files to each other all over the world. The backbone of the Internet actually consists of sections of high-speed fiber-optic cabling that are owned by different carriers. NAPs are places at which these carriers interconnect their lines so that the Internet can function singly.

Slide 4

    Internet Protocol (IP)
    An IP is digital message formats and rules for exchanging messages between computers. These are interconnected between networks and will sent across a single one. Messages are exchanged as datagrams, also known as data packets or just packets. Every machine on the Internet has a unique identifying number, called an IP Address. 
    Caption: : (A typical IP address looks like this: 216.27.61.137.)

Slide 5

    Transmission Control Protocol (TCP)
    Transmission Control Protocol is is a standard that shows how to get and maintain a network conversation so that two devices can exchange data. TCP is designed to send packages over the internet. TCP works in collaboration with Internet Protocol and both TCP and IP are basic rules that are defining the internet.
    Caption: : How TCP works

Slide 6

    File Transfer Protocol (FTP)
    FTP is the protocol for exchanging files over the internet. File Transfer Protocol uses the Internet's TCP and IP protocols to transmit this data. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server.

Slide 7

    Internet Service Provider (ISP)
    An Internet Service Provider refers to a company that provides your internet access.  For broadband access you would receive the broadband hardware or pay a monthly fee for this equipment that is added to your ISP account billing.

Slide 8

    Internet Infrastructure/hardware
    Server Client Router Backbone

Slide 9

    Servers
    Servers run special software to serve other computers. For example: file servers, print servers, web servers and email servers. A server is a powerful computer the controls the network. 

Slide 10

    Clients
    A client is a user's device such as a laptop or a smartphone. This client is a computer/device that gains services from servers. The computer/device that we use to access the internet is a client. 

Slide 11

    Routers
    Routers are devices which directs traffic over the network. This is when devices direct data or 'route' traffic through a network. These routers are intelligent and will try to find the best routes.

Slide 12

    Backbone
    This is the part of the computers network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks. A backbone may interconnect different local area networks in offices, campuses or buildings. .A backbone is a big cable (often made out of fibre) that connects a large number of devices together.

Slide 13

    Connection methods
    Wireless Broadband Dial-up

Slide 14

    Wireless
    Wireless connection is not fixed to a stationary computer and can also be used whenever wireless internet is available. Although, there are some disadvantages to wireless connection. For example: You can't access it if wireless internet isn't available. It also tends to be slower and less secure than wired.

Slide 15

    Broadband
    This is a wired connection through a broadband supplier. An advantage of this is that there is better reception and it is also faster that dial-up. A disadvantage of this is that it is wired so it has to be used on a stationary computer to function.

Slide 16

    Dial-up
    This is a wired connection using a modem and telephone lines. It can use existing telephone line, giving connection where broadband is not available. Although, it's old technology and can give poor reception. Conversion between digital and analogue signals are also in risk of causing errors. On top of this, it is usually slower that other methods.

Slide 17

    Key words - definitions
    Hyperlink Web server Wizard HTML HTML element URL Search Engine

Slide 18

    Hyperlink
    In computing, a hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks.

Slide 19

Slide 20

    Wizard
    A wizard guides through steps to help you understand what you have to do. - 'A sequence of dialogue boxes which lead the userthrough a series of well-defined steps'
    Caption: : Gandalf

Slide 21

Slide 22

Slide 23

    URL
    URL stands for Uniform Resource locator. This includes a protocol which tells the browser what to do with the URl, a path which points to a specific web page and a domain name that is the name of the website.

Slide 24

Slide 25

    Key Terms
    CODEC Devices/components Peripheral Internet Packet

Slide 26

    CODEC
    We need codecs because video and music files are large, they become difficult to transfer across the Internet quickly. To help speed up downloads, mathematical "codecs" were built to encode ("shrink") a signal for transmission and then decode it for viewing or editing. Without codecs, downloads would take three to five times longer than they do now.

Slide 27

    Devices/components

Slide 28

    Peripheral
    A peripheral device is an internal or external device that connects directly to a computer but does not contribute to the computer's primary function, such as computing. It helps end users access and use the functionalities of a computer.

Slide 29

Slide 30

    Byte USB Client side processing (example and advantages/disadvantage) Server side processing (example and advantages/disadvantages) Bi-directional transmission Packet switching Simplex Half Duplex Full Duplex
    Keywords

Slide 31

    Byte
    In most computer systems, a byte is a unit of data that is eight binary digits long. A byte is the unit most computers use to represent a character such as a letter, number, or typographic symbol (for example, "g", "5", or "?"). A byte can also hold a string of bits that need to be used in some larger unit for application purposes (for example, the stream of bits that constitute a visual image for a program that displays images or the string of bits that constitutes the machine code of a computer program).

Slide 32

    USB
    A USB drive -- also known as a flash drive or keychain drive -- is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a keychain. A USB drive can be used in place of a floppy disk, Zip drive disk or CD. When the user plugs the device into the USB port, the computer's operating system recognizes the device as aremovable drive and assigns it a drive letter.

Slide 33

    Client side processing 
    The majority of the processing will be done at the server and not on the client's internet browser. When a database needs to be accessed on a server, the web application will post the page back to the web server and server-side code will process the request.

Slide 34

    Server side processing 
    Processing or content generation that is done on the web server or other server, as opposed to on the client computer where the web browser is running. An example is server-side include where one file is inserted in another before it is served, rather than, say, having the browser request the files separately and combine them using an iframe. A very common kind of server-side processing is the inclusion of data from a database in a web page. 

Slide 35

    Bi-directional transmission
    Bi-directional transmission has several meanings within data communication, but it is essentially about transmitting in both directions. Most recently the term has been applied to fibre optics. Using the current technology, light passes in one direction only, so you have to add extra fibres to the bundle to carry a signal in the opposite direction.

Slide 36

    Packet switching
    Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless (rather than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a connectionless network.

Slide 37

    Simplex
    Simplex communication is a communication channel that sends information in one direction only. Simplex refers to one-way communications where one party is the transmitter and the other is the receiver.

Slide 38

    Half Duplex
    Refers to the transmission of data in just one direction at a time. For example, a walkie-talkie is a half-duplex device because only one party can talk at a time. In contrast, a telephone is a full-duplex device because both parties can talk simultaneously.

Slide 39

    Full Duplex
    In a full duplex system, both parties can communicate with each other simultaneously. An example of a full-duplex device is a telephone; the parties at both ends of a call can speak and be heard by the other party simultaneously.

Slide 40

    Key terms
    Database Table Record Field Primary key Foreign key DBMS SQL DDL DML

Slide 41

    Database
    Online databases are databases which are accessible using a network, including the Internet. They are very different to local databases as they have to be accessed, and possibly updated, by millions of users. Normally these databases will have thousands of rows of information. Usually information is found in online databases by using asearch engine

Slide 42

    Primary Key
     The primary key of a relational table uniquely identifies each record in the table. It can either be a normal attribute that is guaranteed to be unique (such as Social Security Number in a table with no more than one record per person) or it can be generated by the DBMS (such as a globally unique identifier, or GUID, in Microsoft SQL Server). Primary keys may consist of a single attribute or multiple attributes in combination.

Slide 43

    Foreign Key
    A foreign key is a column (or columns) that references a column (most often the primary key) of another table. The purpose of the foreign key is to ensure referential integrity of the data. In other words, only values that are supposed to appear in the database are permitted.

Slide 44

    A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyse data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.
    DBMS

Slide 45

    SQL
    SQL is a standard language for accessing databases. Our SQL tutorial will teach you how to use SQL to access and manipulate data in: MySQL, SQL Server, Access, Oracle, Sybase, DB2, and other database systems.

Slide 47

    Legislation
    A number of relatively laws exist within the UK in response to the increased use of computer systems.Data Protection Act 1998 - Provide 8 principles that govern the way data about individuals is stored and used.Computer Misuse Act 1990 - Introduced to protect from hackers and malicious use of viruses.Copyright, Designs and Patents Act 1988 - Protects creators of original work.Freedom of Information Act 2000 - Provides the individual the right to see information stored about them. Data can also be accessed about public bodies.

Slide 48

    Key Terms
    Physical barriers Password control Access Levels Anti virus software Firewall Encryption Backup

Slide 49

    Physical Barriers

Slide 50

    Firewall
    Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. In addition to limiting access to your computer and network, a firewall is also useful for allowing remote access to a private network through secure authentication certificates and logins.

Slide 51

    Encryption
    Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;encrypted data is referred to as cipher text.

Slide 52

    Anti virus software
    Virus protection software is designed to prevent viruses, worms and Trojan horses from getting onto a computer as well as remove any malicious software code that has already infected a computer. Most virus protection utilities now bundle anti-spyware and anti-malware capabilities to go along with anti-virus protection. Internet security suites go a step further by including additional capabilities like anti-spam, anti-phishing, firewall, file protection and PC optimization.

Slide 53

    To find out what permissions your account has, go to Special:Preferences. Your permissions are listed in the user profile tab under "Member of groups". A contributor's ability to perform certain actions in Wikipedia depends on their user access level.
    Access Levels

Slide 54

    Password control
    Password Control is a tool designed to allow help desk staff and other IT support personnel to reset user passwords.  It has a simple and intuitive interface that many users find more productive than a custom MMC console.  Password Control is designed to work with Active Directory based domains.  It also features other functions such as the ability to enable and disable user accounts (you can edit a config file to remove these features if required). 

Slide 55

    Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless –(a) at least one of the conditions in Schedule 2 is met, and(b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data shall be processed in accordance with the rights of data subjects under this Act. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
    The 8 principles of the data protection act

Slide 56

Show full summary Hide full summary

Similar

Describe - Practice questions and answers for AS Physics A
nikeishabk
AP Psychology Practice Exam
Jacob Simmons
Characters in "An Inspector Calls"
Esme Gillen
GCSE Maths Conversions
EmilieT
PSBD TEST # 3_1
yog thapa
Cells And Cell Techniques - Flashcards (AQA AS-Level Biology)
Henry Kitchen
Vampires, Dracula, and Morality Victorian Anxieties!
Anna-Maria Kotulski
What is Marketing?
Stephanie Natasha
Treaty of Versailles (1919)
Inez Simpson
NSI Course
Yuvraj Sunar
Salem does not remember
Salma Moustafa