Internet Protocols The Internet Is More Than Essay

Internet Protocols The internet is more than what it appears to many of its users. The World Wide Web is the standard and most popular method or protocol of acquiring information off the interconnectivity that the internet provides. The purpose of this essay is to define an internet protocols and give examples of several different types and the advantages and disadvantages they provide for myself and other users of this technology.

HTTP stands for Hyper Text Transfer Protocol and is most likely the most commonly used but least understood of all the internet protocols in use today. This protocol allows web servers to display their information and data to other remote computers. Addresses are used to route and direct communication.

FTP

File Transfer Protocol (FTP) is method of transferring files from computer to computer has its own unique rules and methods of use. This protocol allows a user to remotely log on to a computer, search and...

...

This protocol does have its restrictions. A user cannot actually look at the file itself before downloading it. This protocol is used in many applications where a web browser will ask the user if it desires to download this file? The file is presented with a title and extension, but previewing of this type of file is not allowed in this type of protocol.
Gopher

Gopher is another protocol that can assist users in browsing for information. This protocol is menu based and works like a map. Files in this protocol are organized in a hierarchical manner and are located by file names with some actual data available unlike FTP. Gopher is rarely seen in my browsing use, but on occasion old sites will have some of these ordered sets of information that are quick to retrieve and easy to navigate in my opinion.

Telnet

Telnet is a powerful…

Sources Used in Documents:

Works Cited


Cite this Document:

"Internet Protocols The Internet Is More Than" (2013, April 02) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/internet-protocols-the-internet-is-more-102004

"Internet Protocols The Internet Is More Than" 02 April 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/internet-protocols-the-internet-is-more-102004>

"Internet Protocols The Internet Is More Than", 02 April 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/internet-protocols-the-internet-is-more-102004

Related Documents

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

References www.questiaschool.com/PM.qst?a=o&d=113454035 Cole, C., Ray, K., & Zanetis, J. (2004). Videoconferencing for K-12 Classrooms: A Program Development Guide. Eugene, or: International Society for Technology in Education. Retrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=113454035 FAQs about Internet2. Retrieved November 26, 2008, at http://www.internet2.edu/about/faq.html www.questiaschool.com/PM.qst?a=o&d=106217067 Goodman, P.S. (Ed.). (2002). Technology Enhanced Learning: Opportunities for Change. Mahwah, NJ: Lawrence Erlbaum Associates. Retrieved November 26, 2008, from Questia database: http://www.questia.com/PM.qst?a=o&d=106217070 Hanss T. Internet2: Building and Deploying Advanced,

Internet Security
PAGES 4 WORDS 1386

Internet Security With the increasing awareness and use of the internet, organizations and individuals are facing newer security issues each day. Everyday people purchase goods on the internet and any hacking as a "joke" could cause the customer's credit card information to fall in the wrong hands. Misuse of such had been on a rise recently all over the world. Governments have now started to enforce strict internet laws to minimize

The market was not ready for wireless even five years ago, but that has definitely changed. When Levi's launched its latest 501s marketing campaign earlier this year, a wireless site was a central part of its digital strategy. Now there are nearly 30,000 public wireless "hot spots" in the United States. Advertisers believe that now that wireless has finally become a medium with which consumers are comfortable, the next

Internet and Its Impact on
PAGES 5 WORDS 1450

One of the best examples of a mash-up being made possible by the AJAX programming language is the work of Dr. Hans Rosling and his GapMinder program at Gapminder.org (Phelps, Cseh, 2009). Dr. Rosling has taken the data set from the United Nations and added in analytics to determine the correlation of income to health. He is a regular speaker at TED (Technology, Entertainment & Design) Conferences and is

With the widespread use of such technologies, we require greater understanding of the personal and social attributes that affect why people use computer-mediated communication (CMC) and the outcomes of CMC-related behavior." (Papacharissi & Rubin, 2000) Barriers and Issues The most fundamental concern in the refurbishment building's networking and VoIP proposal is also the industry's most basic barriers to accomplishing the goal of networking success. In other words, instituting a highly efficient