Internet, Intranet
& Extranet
Presented By:
Asmita Singh
Asst. Professor
(Swami Keshwanand Rajasthan
Agriculture University, Bikaner)
Internet
 Internet is defined as an Information super Highway, to access
information over the web. However, It can be defined in many
ways as follows:
 Internet is a world-wide global system of interconnected
computer networks.
 Internet uses the standard Internet Protocol (TCP/IP).
 Every computer in internet is identified by a unique IP
address.
 IP Address is a unique set of numbers (such as
110.22.33.114) which identifies a computer location.
 A special computer DNS (Domain Name Server) is used to
give name to the IP Address so that user can locate a
computer by a name.
 For example, a DNS server will resolve a
name http://www.tutorialspoint.com to a particular IP address to uniquely
identify the computer on which this website is hosted.
 Internet is accessible to every user all over the world.
Intranet
 The term Intranet is derived from two words: ‘Intra’ which
means within and ‘net’ which means group of interconnected
computers.
 Intranet is system in which multiple PCs are networked to
be connected to each other. PCs in intranet are not available
to the world outside of the intranet.
 Usually each company or organization has their own
Intranet network and members/employees of that company
can access the computers in their intranet.
 Each computer in Intranet is also identified by a IP
Address, which is unique among the computers in that
Intranet.
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
EXTRANET
 is an intranet for outside authorized users
using same internet technologies. The outside
users are trusted partners of the organization
who have access to information of their
interest & concern.
 extends the intranet concept to provide a
network that connects a company’s network to
the networks of its business partners, selected
customers, or suppliers.
Internet, Intranet & Extranet & IP and MAC
Domain Name Systems
 If you've ever used the Internet, it's a good bet that you've
used the Domain Name System, or DNS, even without
realizing it.
 DNS is a protocol within the set of standards for how
computers exchange data on the Internet and on many
private networks, known as the TCP/IP protocol suite.
 Its basic job is to turn a user-friendly domain
name like "howstuffworks.com" into
an Internet Protocol (IP) address like
70.42.251.42 that computers use to identify
each other on the network. It's like your
computer's GPS for the Internet.
Internet, Intranet & Extranet & IP and MAC
INTERNET PROTOCOL (IP)
 IP address is a numerical label assigned to each
device connected to a computer network that uses
the Internet Protocol for communication.
 An IP address serves two principal functions: host
or network interface identification and
location addressing.
 Your IP can change with the change in network.
 It is a 32 bit address ( binary address) often written in
4 groups of 3 decimals each i.e 192.168.1.2
 This is a logical address for your device through
which it communicates to the outside world.
MEDIA ACCESS CONTROL
(MAC ADDRESS)
 Mac address is your machine address . This address
will never change & is the unique machine address
given to your device .
 Your device will have communication with the
local area network or any network using this
address.
 Once you use the network your mac address is
stored in the network table so that network does not
have to search your mac address again and again.
 It is 48 bits (6 bytes) hexadecimal address.
 MAC address is assigned by the manufacturer
of NIC ( Network Interface Card).
 NIC is a chip installed in the computer that lets
you connect your device with any network.
 For example, consider a network adapter with
the MAC address "00-14-22-01-23-45."
Simple Mail Transfer Protocol
(SMTP)
 The Simple Mail Transfer Protocol (SMTP) is used to transfer
electronic mail from one user to another. This task is done by means
of email client software (User Agents) the user is using.
 User Agents help the user to type and format the email and store it
until internet is available.
 When an email is submitted to send, the sending process is handled by
Message Transfer Agent which normally comes inbuilt in email client
software.
 Message Transfer Agent uses SMTP to forward the email to another
Message Transfer Agent (Server side).
 Client software uses Internet Message Access Protocol (IMAP) or POP
protocols to receive emails.
POP/
IMAP
FTP
 The File Transfer Protocol (FTP) is the most
widely used protocol for file transfer over the
network. FTP uses TCP/IP for communication.
 The client requests the server for a file. When the
server receives a request for a file, it opens a TCP
connection for the client and transfers the file.
 After the transfer is complete, the server closes
the connection. For a second file, client requests
again and the server reopens a new TCP
connection.
Internet, Intranet & Extranet & IP and MAC

More Related Content

PPTX
Task bar and start menu in window 10 - Class IV
PPT
Basic structure of computers
PPTX
Presentation on Operating System & its Components
PPTX
Networking Fundamentals
PPTX
complete slides about parts of speech
PPTX
Sistemas operativos de red de microsoft
PDF
component of computer
PPTX
Files and Folders in Windows 7
Task bar and start menu in window 10 - Class IV
Basic structure of computers
Presentation on Operating System & its Components
Networking Fundamentals
complete slides about parts of speech
Sistemas operativos de red de microsoft
component of computer
Files and Folders in Windows 7

What's hot (20)

PPTX
Software components
PPTX
KEYBOARD
PPTX
Operating Systems & Applications
PPTX
Step for installing linux server
PPTX
Introduction to internet
PDF
Difference between system software and application software
PPTX
Common Errors in English
PPT
System software and Application software
PPTX
Conjuctions
PPTX
Windows 10 module 1 ppt presentation
PPTX
Operating systems unix
PPTX
Computer security aspects in
PDF
Windows Server 2012
PPTX
Prefixes and Suffixes
PDF
Computer Network & Types
PPTX
what is computer
PPT
use and create spreadsheet.ppt
PPTX
Application Software
PPT
Capitalization Rules
PPTX
Operating system and its function
Software components
KEYBOARD
Operating Systems & Applications
Step for installing linux server
Introduction to internet
Difference between system software and application software
Common Errors in English
System software and Application software
Conjuctions
Windows 10 module 1 ppt presentation
Operating systems unix
Computer security aspects in
Windows Server 2012
Prefixes and Suffixes
Computer Network & Types
what is computer
use and create spreadsheet.ppt
Application Software
Capitalization Rules
Operating system and its function
Ad

Similar to Internet, Intranet & Extranet & IP and MAC (20)

PPTX
Internet
PPT
network fundamentals
PPTX
Computer network coe351- part3-final
PPTX
Computer network
PPTX
INTERNET FUNDAMENTALS
PPTX
Networking
PPTX
Small office Home office , network setup in details
PPTX
A Deep Dive in the World of IT Networking (part 1)
PPTX
Telecommunications, Internet and Wireless Technology
PPT
SOHO Network Setup Tutorial
PPTX
PPT
Welcome to Computer Networks
PPS
Networking
PDF
Data Communication & Computer Network
PPT
basic concepts of networking.ppt
PPT
GSBA - IT Orientation Program by Prof. Amit Chandra
PPTX
PPT Unit II Network Infrastructure.pptx..
PDF
Networking Basic Refresh.pdf
PPT
Internet
Internet
network fundamentals
Computer network coe351- part3-final
Computer network
INTERNET FUNDAMENTALS
Networking
Small office Home office , network setup in details
A Deep Dive in the World of IT Networking (part 1)
Telecommunications, Internet and Wireless Technology
SOHO Network Setup Tutorial
Welcome to Computer Networks
Networking
Data Communication & Computer Network
basic concepts of networking.ppt
GSBA - IT Orientation Program by Prof. Amit Chandra
PPT Unit II Network Infrastructure.pptx..
Networking Basic Refresh.pdf
Internet
Ad

Recently uploaded (20)

PPTX
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PPTX
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
PPTX
Introduction to Windows Operating System
PPTX
Trending Python Topics for Data Visualization in 2025
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PPTX
Cybersecurity: Protecting the Digital World
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
Computer Software - Technology and Livelihood Education
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PDF
MCP Security Tutorial - Beginner to Advanced
PDF
Microsoft Office 365 Crack Download Free
PPTX
Tech Workshop Escape Room Tech Workshop
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
Plex Media Server 1.28.2.6151 With Crac5 2022 Free .
Introduction to Windows Operating System
Trending Python Topics for Data Visualization in 2025
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Full-Stack Developer Courses That Actually Land You Jobs
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Cybersecurity: Protecting the Digital World
CCleaner 6.39.11548 Crack 2025 License Key
Computer Software - Technology and Livelihood Education
Internet Download Manager IDM Crack powerful download accelerator New Version...
How Tridens DevSecOps Ensures Compliance, Security, and Agility
BoxLang Dynamic AWS Lambda - Japan Edition
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
MCP Security Tutorial - Beginner to Advanced
Microsoft Office 365 Crack Download Free
Tech Workshop Escape Room Tech Workshop

Internet, Intranet & Extranet & IP and MAC

  • 1. Internet, Intranet & Extranet Presented By: Asmita Singh Asst. Professor (Swami Keshwanand Rajasthan Agriculture University, Bikaner)
  • 2. Internet  Internet is defined as an Information super Highway, to access information over the web. However, It can be defined in many ways as follows:  Internet is a world-wide global system of interconnected computer networks.  Internet uses the standard Internet Protocol (TCP/IP).  Every computer in internet is identified by a unique IP address.  IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer location.  A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
  • 3.  For example, a DNS server will resolve a name http://www.tutorialspoint.com to a particular IP address to uniquely identify the computer on which this website is hosted.  Internet is accessible to every user all over the world.
  • 4. Intranet  The term Intranet is derived from two words: ‘Intra’ which means within and ‘net’ which means group of interconnected computers.  Intranet is system in which multiple PCs are networked to be connected to each other. PCs in intranet are not available to the world outside of the intranet.  Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet.  Each computer in Intranet is also identified by a IP Address, which is unique among the computers in that Intranet.
  • 7. EXTRANET  is an intranet for outside authorized users using same internet technologies. The outside users are trusted partners of the organization who have access to information of their interest & concern.  extends the intranet concept to provide a network that connects a company’s network to the networks of its business partners, selected customers, or suppliers.
  • 9. Domain Name Systems  If you've ever used the Internet, it's a good bet that you've used the Domain Name System, or DNS, even without realizing it.  DNS is a protocol within the set of standards for how computers exchange data on the Internet and on many private networks, known as the TCP/IP protocol suite.
  • 10.  Its basic job is to turn a user-friendly domain name like "howstuffworks.com" into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network. It's like your computer's GPS for the Internet.
  • 12. INTERNET PROTOCOL (IP)  IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.  An IP address serves two principal functions: host or network interface identification and location addressing.  Your IP can change with the change in network.
  • 13.  It is a 32 bit address ( binary address) often written in 4 groups of 3 decimals each i.e 192.168.1.2  This is a logical address for your device through which it communicates to the outside world.
  • 14. MEDIA ACCESS CONTROL (MAC ADDRESS)  Mac address is your machine address . This address will never change & is the unique machine address given to your device .  Your device will have communication with the local area network or any network using this address.  Once you use the network your mac address is stored in the network table so that network does not have to search your mac address again and again.
  • 15.  It is 48 bits (6 bytes) hexadecimal address.  MAC address is assigned by the manufacturer of NIC ( Network Interface Card).  NIC is a chip installed in the computer that lets you connect your device with any network.  For example, consider a network adapter with the MAC address "00-14-22-01-23-45."
  • 16. Simple Mail Transfer Protocol (SMTP)  The Simple Mail Transfer Protocol (SMTP) is used to transfer electronic mail from one user to another. This task is done by means of email client software (User Agents) the user is using.  User Agents help the user to type and format the email and store it until internet is available.  When an email is submitted to send, the sending process is handled by Message Transfer Agent which normally comes inbuilt in email client software.  Message Transfer Agent uses SMTP to forward the email to another Message Transfer Agent (Server side).  Client software uses Internet Message Access Protocol (IMAP) or POP protocols to receive emails.
  • 18. FTP  The File Transfer Protocol (FTP) is the most widely used protocol for file transfer over the network. FTP uses TCP/IP for communication.  The client requests the server for a file. When the server receives a request for a file, it opens a TCP connection for the client and transfers the file.  After the transfer is complete, the server closes the connection. For a second file, client requests again and the server reopens a new TCP connection.