wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERNET

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
49 Reads

1. The internet is the worldwide system of interrelated computer network.

2.These interconnected computer network uses the Internet protocol suite to link several different devices worldwide.

3. It is a network of network that includes of private, public, business and government network,which is connected by a wide collection of electronic, wired, wireless and optical networking methods.

4. The Internet has no Central control in both technological implementation or policies for internet access and it's usage.

5. Each network sets has it's own policies. Internet works and operates without a central governing body.

6. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, and file sharing.

7. The most prominent component of the Internet model is the Internet Protocol (IP). IP enables internetworking and, in essence, establishes the Internet itself. 

8. ARPANENT, the U.S government decided to make a network of computers that can allow communication among government agency and educational centers.

9. In addition to the ARPANENT, other countries also Started to develop their own personal computer network which rapidly connected up to ARPANENT.

10. Connecting all this network together would help to develop a global internetwork . Later the ARPANENT was known has the Internet.

11. The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers


Comments ()


Sign in

Read Next

Threads

Blog banner

RAID

Blog banner

Os Virtual Memory

Blog banner

Password Generator - Lisp

Blog banner

What is Amazon?

Blog banner

MAILFENCE

Blog banner

MENDELEY

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Fault Tolerance in an Operating System

Blog banner

File Sharing

Blog banner

Traditional UNIX Scheduling

Blog banner

Honeypot in cyber security

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Buffers in Operating Systems

Blog banner

IO Buffers

Blog banner

Microsoft powerpoint presentation

Blog banner

Short note on expert system

Blog banner

Earth with no trees

Blog banner

On-Page SEO

Blog banner

CRISP-DM Methodology

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

What is process

Blog banner

Disk scheduling

Blog banner

OS Assignment 3 Deadlock

Blog banner

Raid and levels of raid.

Blog banner

Firewall in Computer Network

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Yoga in INDIA and ABROAD

Blog banner

What is Spyware?

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

IT security management

Blog banner

Twisted world

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

I/O Buffering

Blog banner

What is Vishing?

Blog banner

TAILS OS

Blog banner

1.1 basic elements

Blog banner

Deadlock and Starvation

Blog banner

Dos (Denial of service) Attack

Blog banner