• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What is the Internet?

Extracts from this document...

Introduction

Internet and World Wide Web What is the Internet? The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can get information from any other computer (and sometimes talk directly to users at other computers). The communication links that interconnect each host computer use a common method of transmission, known as TCP/IP, which stands for Transmission Control Protocol/Internet Protocol which is the suite of communications protocols used to connect hosts on the Internet. Communication protocols determine the format of data that all communications between devices require that the devices agree on. TCP/IP is used because TCP guarantees users that data are transmitted properly and safely without any loss of files to and fro among computers, hosts or servers and clients and IP transmit data across network routes in packets which are just pieces of messages or data. Due to its high security and speed, TCP/IP is commonly used. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community including files, pictures and audios. Host is a computer system that is accessed by a user working at a remote location. It is then connected to another computer systems or a TCP/IP network, including the Internet, connected by modems and telephone lines or routers. ...read more.

Middle

Below is a diagram of WAN of a company: Each host computer is identified in two ways. Firstly, each computer on the Internet has a unique assigned name, such as host1.eastern.com.bn which is referred to as its domain name. (Note: TLD is top-level domain which is the last part of the URL. There are two types of TLD. One is generic TLD and another is country code.) Secondly, each computer on the Internet also has a unique numerical address, called a TCP/IP address. This is a group of four numbers joined by dots. For example, the computer known as host1.eastern.com.bn could have a TCP/IP address of 202.72.78.5 A server is a computer or device on a network that manages network resources. It also provides resources for other computer to use as mention above. No one controls Internet and no one can claim that Internet belongs to whom even though governing bodies are responsible for issuing IP addresses and domain names depending on the type and the location of the organisations. This is to set the standards in the internet that there is no confusion. For example, a school is given a domain name of www.jis.edu.bn and another school has www.rbis.biz.uk. World Wide Web (WWW) is an Internet service that links documents locally and remotely. It also contains videos, sounds, graphics and Hyper Text links. ...read more.

Conclusion

Nowadays people also use messenger services to reduce the steps required to send and receive mails, and read as well as write. Using e-mail systems, one has to click on icons presented on the toolbars to do so. In a messenger system, users can send others instant messages by selecting on their names which are stored in the Name List. It allows users to see from his name list who is online. Examples of such software systems are ICQ, MSN Messenger and Yahoo! Messenger FTP is a communication protocol used to transmit files without loss of data. A file transfer protocol can handle all types of files including binary files and ASCII text files. Another type of communication protocol is Hyper Text Transfer/Transport Protocol (HTTP). It guides the Web servers and browsers how to transmit and format the data and response to certain actions like clicking on the hyperlink to the another document causes the HTTP to ask the web servers to load the document wanted and browsers to translate the HTML format into English format which users can understand. Facts about school websites : 1.What is the school's domain name ? It is http://www.jis.edu.bn 2.Who maintains the school domain name ? It is Jabatan Telekom Brunei (JTB) 3.What are the some if the school's IP addresses ? They are 172.16.123.1 ; 172.16.128.254 ans many more 4.Where are the location of school's DNS server ? The school's internal servers are jisfnp01 &jisfnpo2, whereas the external DNS server is at jtb.brunet.bn ?? ?? ?? ?? 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    The application layer contains the logic needed to support the various user applications. The topics of this layer in wireless environment include service location, support for multimedia applications, adaptive applications that can handle the large variations in transmission characteristics, and also wireless access to the World Wide Web using a portable device.

  2. ICT Systems in Everyday Life: Your Local Community

    quality or the target person is far too small to be recognised. As with most things, CCTV can be as simple or as complex as the occasion demands. Many factors have to be taken into account when producing a technical specification - among them, the aspirations for the system and

  1. Information Security.

    and don't know who want the get information for your computer and who will used it. The business on the internet The internet has become a marketplace , with millions of customers from around the world able to enter an electronic store and make purchases at any hour of the day .

  2. Free essay

    Impact of ICT in Community

    The software converts on screen display to speech. The soft ware enables you to do all the different features I have listed below: The Hal Screen Reading Software meets Mary needs: * Easy browsing of Internet web pages and other applications even where there is little or no keyboard access.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    $12,500 Half.com Inc. $12,000 GiftCertificates.com $9,750 SelfCare If you were selling someone else's product and making $20 per sale. No inventory, no credit card processing or customer service, simply marketing and making $20, free and clear. Here's the income you could be looking at : Orders Each Day Weekly Income (US$)

  2. Unit 23: Investigating Communications and Networks

    * Repeater: receives and then immediately retransmits each bit. It has no memory and does not depend on any particular protocol. It duplicates everything, including the collisions between data streams. * Patch Leads: A cord resembling that of a telephone wire but thicker with slightly larger connectors, that physically connects the computer to the network.

  1. Computer Networks and Distributed Systems - Wireless network of devices: General packet radio services ...

    Newer GPRS handsets have four down channels, and can reach speeds of 48Kbit/s. With improved compression technologies in future, data rates per channel could go considerably higher. . Figure 1: Motorola Timeport T260 GPRS Mobile Phone 3. Key Network Features of GPRS 3.1 PACKET SWITCHING GPRS involves overlaying a packet based air interface on the existing circuit switched GSM network.

  2. OCR GCSE Business & Communication Task 7 Report

    Legal Issues: Whilst completing this task I had to ensure I was complying the laws of the Computer Misuse Act (1990). This law was introduced in 1990 due to the increase in computer usage. This law helps to ensure users were not hacking into other people's accounts, systems or electronic files.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work