Download internet connection through isp

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer network wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Net neutrality wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Net neutrality law wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Net bias wikipedia , lookup

Transcript
INTERNET CONNECTION
THROUGH ISP
 NUR AZUREEN BINTI SAHABUDIN (12DEP11F1034)
 NOOR FARHANA BINTI ABDULLAH (12DEP11F1022)
 MUHD ALIF IZMER BIN ZULKIFLI (12DEP11F1035)
 MUHD AZHAR BIN OSMAN (12DEP11F1025)
THE BASIC CONCEPT OF
INTERNET CONNECTION
WHAT IS INTERNET?

A means of connecting a computer to any other computer anywhere
in the world via dedicated routers and servers.

When two computers are connected over the internet,they can send
and receive all kinds of information such as text,graphics,voice,video
and compuer programs.
WHAT IS INTERNET SERVICE PROVIDER (ISP)?
 A service (an access) provider is a business/company that
provides individuals and organizations access to the Internet
free or for a monthly or yearly fee.
 An Internet Service Providers are categorized as regional
or national ISPs.
 A regional ISP usually provides Internet access to a
specific geographic area.

A national ISP is a business that provides Internet access in cities and towns
nationwide.

Other than Internet connection, ISPs may also provide related services like
Web site hosting & development, e-mail hosting, domain name registration
etc.
EXAMPLES OF ISP IN MALAYSIA
EXAMPLES OF ISP IN MALAYSIA
THE OPTIONS OF CONNECTIONS TO THE ISP
 ISPs provide a variety of ways to connect to the Internet,
depending on location and desired connection speed.
 Each Internet access technology uses a network access
device, such as a modem, in order to connect to the ISP. It
may be built in to your computer or may be provided by the
ISP.
 The simplest arrangement is a modem that provides a direct
connection between a computer and the ISP.
 The choice of Internet access technologies depends on
availability, cost, access device used, media used and the
speed of the connection.
THE OPTIONS OF CONNECTIONS TO THE ISP
APPROPRIATE ISP LEVELS OF SERVICE TO MEET THE
USER REQUIREMENT
 Depending on the ISP and the connection technology, various
services are available such as virus scanning, video on
demand, and file storage.

Home service is normally less expensive than business
services, and generally provides scaled-down services such as
slower connection speed, reduced web space storage, and
fewer email accounts.

Business class service is more expensive but provides faster
connection speeds and additional web space and email
accounts.

Business service also includes Service Level Agreements
(SLAs) agreements between the ISP and the customer
specifying items such as network availability and service
response time.
RELATIONSHIP BETWEEN INTERNET & ISP
 ISP,Internet Service Provider (telephone, cable or wireless) creates the
medium/link under which homeowners, businesses or almost any
entity can connect the world wide web (Internet), by configuring
computing equipment that can send and receive different types of
queries (send) and data/web pages (receive).
RELATIONSHIP BETWEEN INTERNET & ISP
Transmission
Media
Communication
Device
ISP Malaysia
Dial Up
Telephone Moderm Telekom
Cable
Cable Moderm
Astro
Fiber Optic
Network Interface
Card (NIC)
TMNet,TM Unifi
Satellite
Satelitte Dish
-
Wireless
Wireless Moderm
Celcom,Maxis
IMPORTANCE OF THE INTERNET PROTOCOL (IP)

For hosts to communicate on the Internet, they must
be running Internet Protocol (IP) software. The IP
protocol is one of a group of protocols that are
collectively referred to as TCP/IP (Transmission Control
Protocol / Internet Protocol). The Internet Protocol (IP)
uses packets to carry data

Each IP packet must contain a valid source and
destination IP address. Without valid address
information, packets sent will not reach the destination
host. Return packets will not make it back to the
original source.
 An IP packet has a header at the beginning which contains the
source and destination IP addresses. It also contains control
information that describes the packet to network devices, such
as routers, it passes through and also helps to control its
behavior on the network. The IP packet is sometimes referred to
as a datagram.
 IP addresses must be unique on the Internet. There are
organizations responsible for controlling the distribution of IP
addresses so that there is no duplication. ISPs obtain blocks of IP
addresses from a local, national or regional Internet registry
(RIR). It is the responsibly of the ISPs to manage these addresses
and assign them to end users.
HOW ISPS HANDLE PACKETS

Before being sent on the Internet, messages are divided into packets. IP
packet size is between 64 to 1500 bytes for Ethernet networks, and contains
mostly user data. Downloading a single 1 MB song would require over 600
packets of 1500 bytes. Each individual packet must have a source and
destination IP address.

When a packet is sent across the Internet, the ISP determines whether the
packet is destined for a local service located on the ISP network, or a remote
service located on a different network.

Every ISP has a control facility for their network, known as the Network
Operations Center (NOC). The NOC usually controls traffic flow and houses
services such as email and web hosting
ISPS HANDLE PACKETS
THE PACKETS TRAVEL THROUGH THE INTERNET BY
USING PING AND TRACEROUTE
Ping and Traceroute

All data sent over the internet is sent in packets. Consider the following
analogy. The idea behind packets is very similar to the idea of the
capsules used to send checking and savings information from your
vehicle to tellers inside the bank via vacuum tubes. The emails you send
and the files you download are all broken down into raw data and
inserted into little packets. These packets are piped through your
Internet connection. When a packet arrives at a destination computer,
the data is extracted and reassembled into a file.

Ping and Traceroute are two programs that can be used to send
packets of information to remote computers for the purpose of
retrieving information. These programs are useful for testing your
internet connection.
To use Ping and Traceroute you will need a command prompt:
Windows
 Click the Start button and select Run.
 Enter command or cmd into the Open field.
 Click OK. A windows command prompt screen should look like the
example below:
Microsoft(R) Windows DOS
(C)Copyright Microsoft Corp 1990-2001.
C:\WINDOWS>
PING

Ping can test the speed of your connection, "distance" to
target, and whether or not your connection is even up and
running. It tells you how long a packet of data takes to travel
from your computer to a specified host, and back again(in this
case, the packet is 32 bytes in size).

To use Ping, type ping followed by a destination host (server
name such as www.expedient.net) or a host IP address (e.g.,
209.166.161.121).
Ping test:




Click the Start button and select Run.
Enter command or cmd into the Open field.
Click OK
Ping 127.0.0.1
Enter
INTERPRETING THE RESULTS

If all 4 packets sent are received, then the connection is
working fine. Any lost packets may indicate slow connection
problems. If no packets are received, you'll see like that say
something like "Destination Host unreachable" or "Request
Timed Out". This can indicate that your connection is not
routing properly.

Note: For security reasons, some servers do not allow you to
ping them - you will get "Request Timed Out" errors. You
should try multiple servers if you are testing your connection.
TRACEROUTE

Traceroute tracks the path that a packet takes from your
computer to a destination address. A traceroute also shows
how many times your packets are being rebroadcast by other
servers until it gets to the final destination. For windows users,
the command is tracert. For Macintosh OS X users,
its traceroute.

In this example we will trace the hops from a computer to
yahoo.com:
C:\WINDOWS>tracert yahoo.com
Tracing route to yahoo.com [66.218.71.198] over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms 208.170.243.1
2 44 ms 14 ms 18 ms sl-gw15-rly-6-0-1.sprintlink.net [144.232.246.165]
3 31 ms 25 ms 13 ms sl-bb22-rly-1-0.sprintlink.net [144.232.25.232]
4 21 ms 17 ms 17 ms sl-st20-ash-15-1.sprintlink.net [144.232.20.106]
5 15 ms 17 ms 19 ms so-0-0-0.edge1.Washington1.Level3.net [209.244.219.169]
6 16 ms 17 ms 15 ms so-5-0-0.gar1.Washington1.Level3.net [209.244.11.9]
7 82 ms 82 ms 82 ms so-3-0-0.mp2.SanJose1.Level3.net [64.159.1.130]
8 87 ms 87 ms 83 ms gige10-0.ipcolo3.SanJose1.Level3.net [64.159.2.41]
9 87 ms 84 ms 93 ms unknown.Level3.net [64.152.69.30]
10 90 ms 88 ms 92 ms w1.rc.vip.scd.yahoo.com [66.218.71.198]
Trace complete.
6
1
5
2
8
3
4
7
INTERPRETING THE RESULTS

Traceroutes allow you to see the path your packets take over the
Internet. Sometimes, they will also allow you to "see" how your
information traveled over the world: Many companies will name their
servers based on where the server is located. From the example above,
our information passed from our computer to servers in Washington
DC then through servers in San Jose before reaching its destination
(yahoo.com).

Traceroutes can show where there is a break in your connection. This
allows you to determine exactly where your packets are being dropped
or lost. Dropped or lost packets on a traceroute will usually show as
asterisks (*).

Note: Just like ping, some servers do not allow you to traceroute all the
way to them - you will get timeouts and sometimes errors. You should
try multiple servers if you are testing your connection.

Ping and Traceroute allow you to diagnose problems with your Internet
connection. These utilities allow you to determine if a problem is on
your computer, out on the network, or at the server you're trying to
reach.