wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERNET

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
49 Reads

1. The internet is the worldwide system of interrelated computer network.

2.These interconnected computer network uses the Internet protocol suite to link several different devices worldwide.

3. It is a network of network that includes of private, public, business and government network,which is connected by a wide collection of electronic, wired, wireless and optical networking methods.

4. The Internet has no Central control in both technological implementation or policies for internet access and it's usage.

5. Each network sets has it's own policies. Internet works and operates without a central governing body.

6. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, and file sharing.

7. The most prominent component of the Internet model is the Internet Protocol (IP). IP enables internetworking and, in essence, establishes the Internet itself. 

8. ARPANENT, the U.S government decided to make a network of computers that can allow communication among government agency and educational centers.

9. In addition to the ARPANENT, other countries also Started to develop their own personal computer network which rapidly connected up to ARPANENT.

10. Connecting all this network together would help to develop a global internetwork . Later the ARPANENT was known has the Internet.

11. The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers


Comments ()


Sign in

Read Next

Zero-Day Attack

Blog banner

Types Of scheduling

Blog banner

Deadlock

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

The Peephole

Blog banner

Ethical Hacking

Blog banner

Interrupts in operating system.

Blog banner

A BLOG ON MYSQL

Blog banner

How to tie a Tie

Blog banner

The launch of UniMap by HERE

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Jira Software

Blog banner

Decision Tree: A Diagram Model

Blog banner

TAILS OS

Blog banner

Types of Malware in Cyber Security

Blog banner

E-security systems | CCTV

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Virtual Machine

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Place to visit in pune

Blog banner

Impact of social media on the human life

Blog banner

Concurrency and memory

Blog banner

Threats To Computer System

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Session Hijacking

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

LiquidPlanner

Blog banner

Latest Email Marketing Techniques

Blog banner

Cache memory

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

MYNTRA

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Assignment 2

Blog banner

Buffering

Blog banner

Stop Racism

Blog banner

E-learning

Blog banner