|Previous Page||Home Page||Next Page|
In 1969, the U.S. Defence Department funded a project to develop a network, which can withstand the bombing. Basically the idea was to develop a very secure network which can work even after a nuclear attack. This project was known as ARPANET. The proposed network was not supposed to have a central control – which would be an obvious target. Ten years of research brought Local Area Ethernet Networks (LANs) and workstations were developed to get connected to LAN. These workstations and LANs were then connected to the ARPANET. For next decade the ARPANET grew and its decentralized features helped its rapid expansion. Computers connected to ARPANET used to standard or rule to communicate with each other. This standard used by ARPANET is known as NCP (National Control Protocol). Protocol is a network term used to indicate the standard used by a network for communication. But the passing time and rapid change in information technology suppressed NCP and brought TCP/IP (Transmission Control Protocol/Internet Protocol) in to the world of networking. TCP converts messages into streams of packets at the source, and they are reassembled back into messages at the destination. IP handles the dispatch of these packets. It handles the addressing, and makes sure that a packet reaches its destination through multiple nodes and even across multiple networks with multiple standards. This flexibility of TCP/IP to handle multiple networks with multiple protocols encourages other networks to get connected to ARPANET. Slowly the ARPANET became a massive network of networks and now it is known as ‘Internet’.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/ IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.
Uses of Internet
Internet has been the most useful technology of the modern times which helps us not only in our daily lives, but also our personal and professional lives developments. The internet helps us achieve this in several different ways.
For the students and educational purposes the internet is widely used to gather information so as to do the research or add to the knowledge of various subjects. Even the business professionals and the professions like doctors, access the internet to filter the necessary information for their use. The internet is therefore the largest encyclopedia for everyone, in all age categories. The internet has served to be more useful in maintaining contacts with friends and relatives who live abroad permanently.
Advantages of Internet:
• E-mail: Email is an essential communication tools in todays world. With e-mail one can send and receive instant electronic messages, which works like writing letters. Messages are delivered instantly to people anywhere in the world, unlike traditional mail that takes a lot of time. Email is free, fast and very cheap when compared to telephone, fax and postal services.
• 24 hours a day - 7 days a week: Internet is available, 24x7 days for usage.
• 'Information: There is a huge amount of information available on the internet for just about every subject, ranging from government law and services, trade fairs and conferences, market information, new ideas and technical support. One can find any type of data on almost any kind of subject by using search engines like google, yahoo, msn, etc.
• Online Chat: Chat facility can be used to meet new people, make new friends, as well as to stay in touch with friends. Commonly used chat messangers are MSN, gmail and yahoo websites.
• Services: Many services are provided on the internet like net banking, job searching, purchasing tickets, hotel reservations, guidance services on array of topics engulfing the every aspect of life.
• Communities: Communities of all types have sprung up on the internet. Its a great way to meet up with people of similar interest and discuss common issues.
• Shopping: There are many online stores and sites that can be used to look for products as well as buy them using credit card. Through internet all shopping could be done sitting conveniently @ your home.
• Entertainment: Internet provides facility to access wide range of Audio/Video songs, plays films. Many of which can be downloaded. One such popular website is YouTube.
• Software Downloads: You can freely download innumerable, softwares like utilities, games, music, videos, movies, etc from the Internet.
Limitations of Internet
• Theft of Personal information: With the use of Internet there are chances that personal information such as name, address, credit card, bank details and other information can be accessed by unauthorized persons. If you use a credit card or internet banking for online shopping, then your details can also be ‘stolen’.
• Most parents do not realize the dangers involved when their children log onto the Internet. When children talk to others online, they do not realize they could actually be talking to a harmful person. Moreover, pornography is also a very serious issue concerning the Internet, especially when it comes to young children.
• Virus threat: Virus is a program created to disrupts the normal functioning of computer systems. Computers attached to internet are more prone to virus attacks and they can end up into crashing your whole hard disk.
• Spamming: It is often viewed as the act of sending unsolicited email. This multiple or vast emailing is often compared to mass junk mailings.
• Phishing : Phishing attack refers to sending a convincing mail to targetted user with an embedded url in the same. When the user clicks the url it directs the user to the phishing website. And when the person enters there personal details , the same is utilized by phisher to transfer money.
|Previous Page||Home Page||Next Page|