What is the Internet? CIT 100 Norm Downey. Interoperability. The Internet & The World Wide Web. Internet and the Client/Server Model
|
|
- Maximilian Dawson
- 5 years ago
- Views:
Transcription
1 The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion computers are directly connected to the Internet. 2 By the way, Internet is a proper name, and as such, it is always capitalized Interoperability Internet and the Client/Server Model Interoperability enables computers that are of different brands and models, and using different operating systems exchange data and even control each other s operation Example: 3 Joe sends an from his Microsoft Windows PC that is processed by a Unix server and read by Jane on her Apple ipad and Jenny on her Android smart phone Client requests some type of service (such as a file or database access) from the server Server fulfills the request and transmits the results to the client over a network 4 1
2 Client/Server Example You, sitting at your PC in class, type in the web address for the college website into your computers browser. In this case you are the Client. The request you make is processed by a college server (a fast, high capacity computer) sends the page to your PC. 5 The college computer storing/sending the webpage is the Server Protocols Protocols are a set of rules for communication between devices Protocols determine the following: How the data is formatted, How the data is transmitted (data compression method, if any), How the sending device will indicate that it has finished sending a message How the receiving device will indicate that it has received a message 6 TCP/IP Transmission Control Protocol (TCP) Divides transmitted data into small packets for transmission, and reassembles data packets upon delivery into a complete message Internet Protocol (IP) Address 7 Numeric address that uniquely identifies each device on a computer network Four sets of numbers (0-255) each separated by a dot Example: Connecting to the Internet 8 2
3 Internet Service Providers (ISP) A company that provides access to the Internet For a fee, the Internet Service Provider provides you with a username & password that allows you to connect to the ISP s network 9 ISP Responsibilities Providing and maintaining connection to the Internet Supporting hardware and software need for connection Protecting network from viruses, hackers and other illegal activities Providing customer service Providing technical support 10 DNS Domain Name System 11 Internet directory service that converts domain names (words), that humans like, to IP addresses (numbers), which computers like Example DNS servers convert google.com into an IP address Baseband versus Broadband Baseband Type of data transmission that allows only one signal at a time. Example your telephone land line Broadband A transmission medium that transports high volumes of data at high speeds Data transmission in which a single wire can carry several channels (pathways) of data at one time. Example Cable TV & DSL 12 3
4 Baseband versus Broadband 13 Baseband Broadband Bandwidth versus Throughput Bandwidth is the maximum data transfer rate of a communication channel in a specific time period this is a theoretical speed Throughput is the actual amount of data that is transmitted in a specified time period 14 Throughput speed is almost always lower and can never exceed than bandwidth speed Bandwidth Bandwidth versus Throughput An Analogy with Cars and Traffic 15 in theory you could drive from Monroeville to downtown in 12 minutes, if there was no traffic, you had a fast car and you were allowed to drive over 100 mph Throughput the reality is it takes an hour to go from Monroeville to downtown because of rush hour traffic, the tunnels, speed limits, the limits of your car and driving skill, potholes, etc. Bandwidth is a theoretical maximum speed, throughput is the actual speed Bandwidth Usually expressed in bits per second (bps) The greater the bandwidth, the faster the connection and generally, the more expensive the connection Broadband connections provide greater bandwidth than baseband connections What s a bit? Stay tuned we ll get to that next time 16 4
5 The Last Mile Problem Types of Internet Connections The last mile problem refers to the slowest part of a connection, which is generally local cable or phone lines and often the cabling or equipment in your home Maximum bandwidth is limited by the slowest section of the connectivity chain 17 Dial-up Cable DSL Fiber Optics Phone 18 Dial-Up Connections Cable (as in Cable TV) Slowest, cheapest Internet connection that uses regular phone lines. Dial-up is a Baseband connection 19 High speed, always on Internet connection Uses coaxial cable and a cable modem for a broadband Internet connection Copper coaxial cable provides much greater bandwidth than telephone line Cable s last mile problem is that you share your bandwidth with your neighbors 20 5
6 Cable (as in Cable TV) 21 Cable TV Connections 22 How a cable Internet connection looks in your house How a cable Internet connection looks in your neighborhood Cable TV Connections Lowest-capacity coaxial cable has far greater capacity than ordinary telephone lines Coaxial cable bandwidth is divided among 3 activities: TV shows downstream to client Upstream data requests Downstream data (web pages, , etc.) Fast Downstream 1 to 50 Mbps rates 23 Digital Subscriber Line (DSL) High-speed, always-on, Internet access 24 Compresses data to improve transmission speed over regular copper telephone lines DSL s last mile problem is that it still uses ordinary phone lines which can be plagued with noise (interference) Supports throughputs of 1 to 6 Mbps Not available everywhere 6
7 DSL Connection What about Fiber Optics? 25 Central Telephone Switching Station Internet Fiber Optic cable consists of thin strands of glass or plastic that carry data on pulses of light Capable of enormous throughput Fiber optic cable, run directly to your home, virtually eliminates the last mile problem 26 Other Transmission Media 27 Cell Phone Basics 28 Infrared Wireless using light Limited to line of sight of about 100 feet Bluetooth Named for 10 th century Viking king Limited to 30 feet and 8 devices Uses radio signals not limited to line of sight 7
8 Cellular Network A radio network in which a geographic area is divided into cells, with a transmission tower and station at the center of each cell, to support mobile communications There is a short answer question on the quiz that will ask you to explain the difference between the Internet and the World Wide Web The World Wide Web What is the World Wide Web? Billions of specially formatted documents stored on Internet servers and accessed through web browsers These documents are formatted using HTML (Hyper Text Markup Language) HTML supports links to other documents, as well as graphics, audio, and video files Not all Internet servers are part of the World Wide Web 31 Internet versus World Wide Web Internet 32 Network infrastructure (cables, computers, routers, software, etc.) Used to access computers and exchange data in a variety of formats Uses TCP/IP protocols World Wide Web Billions of specially formatted documents Uses the Internet as its transport mechanism Uses HTTP or HTTPS protocols They are NOT the same thing! 8
9 Websites Websites and Web pages 33 Location in cyberspace that makes web pages available A collection of related web pages Web pages Specially formatted, linked documents on a website that includes text, graphics, sound, animation or video What s cyberspace? Virtual territory that is accessible only with a computer Web Browsers 34 Software that displays web documents and provides access to linked documents Runs on the client side of the Client/Server Model Includes: Internet Explorer (Microsoft) Edge (Microsoft comes with Windows 10) Firefox (Mozilla Foundation formerly Netscape) Chrome (Google) Safari (by and for Apple Macs) Opera (Opera Software) Web Servers Computers running special server software that Accepts requests for information, Processes requests and Sends requested documents The server side of the Client/Server Model 35 Hyperlinks 36 Clickable links in webpages that open other web documents Examples: or 9
10 HTML Web documents are created using HTML (Hypertext Markup Language) 37 HTML is a Markup Language used to define the appearance of Web pages CCAC teaches an HTML class CIT 125 How do you know if a website is secure? Look for the lock symbol in Internet Explorer (above). Clicking on the company name in Internet Explorer or Firefox (right) shows security information. 38 Rules for Evaluating Web Pages Who is the author? Are they an expert? Are the sources cited? Are the authors sources respected? Who pays for the web site? Is the presentation one sided? 39 Examples Is the language objective or argumentative? What is the purpose of the page? Is the page accurate? Is the page up to date? If unsure, look for About Us or something similar Search Engines A program that searches documents for specified keywords and returns a list of the web documents where the keywords were found Search engines then use those results to display meaningful results Search Engines include: Google Bing Yahoo Dogpile 40 10
11 URL Uniform Resource Locator Other Terms to Know 41 Web address Character string that precisely identifies an Internet resources type and location Parts of URL Protocol web.acd.ccac Domain indicates CCAC academic webpages edu Top Level Domain Name /~ndowney folder or directory on server 42 CIT140 specific page, resources or file within specified directory Examples of Top Level Domains 43 Cookies 44 Common US Top Level Domain Names.com Commercial.edu Educational.net Network Resource.mil US Military.gov US Government.org Non-profit organization Top Level International Domain Names.ca Canada.au Australia.cn China.jp Japan.mx Mexico.ng Nigeria.ru - Russia Small text files written to your computer s hard drive, generally without users knowledge or consent Used to keep track of user preferences or for compiling information about user s web browsing behavior 11
12 Cookies Uploading versus Downloading Cookies allow websites such as Amazon.com to keep track of recent searches and to present lists of related items to hopefully increase their sales Also used to build web Shopping Carts 45 Uploading Transferring files from your computer to another computer on Internet From client to server Downloading Transferring files from another computer to your computer From server to client 46 Wiki Wikis and Blogs From Hawaiian word wiki-wiki meaning fast Web page on which a visitor can post text or images, read and exchange posted information and track changes Blogs Short for web log Allow user to post thoughts and opinions 47 short for electronic mail Allows sending and receiving messages via a computer network including over the Internet address consist of User name (ndowney) At Host (acd.ccac CCAC s Academic server) Domain (.edu top level domain name) Spam unsolicited advertisements 48 12
13 Social Networking Web sites provide Web-based tools for users to share information about themselves with others on the Web, and find, meet, and converse with other members Facebook Twitter LinkedIn 49 Media Sharing Media-sharing web sites provide methods for members to store and share digital media files on the Web YouTube Flickr PhotoBucket 50 Podcasting 51 An audio file that contains a recorded broadcast distributed over the Internet via the World Wide Web The Internet of Things Connection pf physical world to Internet 52 Physical objects are tagged and can be located, monitored, and controlled using small embedded electronics Network connectivity enables these objects to collect and exchange data 13
14 Phishing Online Safety A type of attack where a phisher (a crook) poses as a legitimate business in an or on a website in an attempt to obtain personal information for purposes of identity theft No bank will ever send you an asking for your PIN number Do not click hyperlinks in suspicious s Malware Short for MALicious software Malicious is defined as 55 being characterized by malice; intending to do harm Malware is a class of software designed to damage or infiltrate a computer or network s data without users consent or knowledge Malware CANNOT do physical harm to hardware Types of Malware Spyware Collects your personal information Monitors your web usage Reports information to others for purposes of identity theft 56 14
15 Types of Malware Viruses Hidden programming code that damages or destroys infected files Designed to self-replicate Run when file is opened or program is started Spread through sharing infected files often via 57 Types of Malware - Trojans A destructive program that pretends to be a useful application Initially appears to perform a desirable function for the user, but (perhaps in addition to the expected function) steals information or does other harm Derives it s name from the Trojan Horse of Greek Mythology 58 How to Steal Passwords Password guessing Your child or pet s names are not good passwords Shoulder surfing Watch out for lurkers Packet sniffing 59 This involves specialized software to capture unencrypted data moving through a network as data packets How to Steal Passwords Dumpster diving Buy a shredder and use it don t leave sensitive paper in the trash Social engineering Sweet talked into giving up your passwords Super user status 60 Giving password or other sensitive data to people you think you can trust like your teacher or the guy from the Helpdesk 15
16 Effective Passwords should be Strong & Long 61 Use words that are unrelated to your interests, mix upper and lowercase letters, numbers, and symbols The longer the password the harder to crack Gibson Research Password Haystack Unique Vary passwords don t use one password for everything Changed regularly Change your passwords at least twice a year Protecting Yourself Online 62 Protecting Yourself Online Virus protection Application that runs your computer and searches viruses and other malware Firewall Program designed to control flow between your computer and the Internet Stops malware from Entering your computer or, if it s already in Sending messages out from your computer 63 Protect Yourself Online Parental controls Controls what children can/cannot see & do on Internet and WWW Utilizes database of unacceptable websites Keep Up-to-date Turn on Windows Automatic Updating feature Keep Anti-Virus programs up-to-date Schedule virus scans 64 16
17 Protect Yourself Online Be careful what you download and install Be sure the source is reputable When downloading software watch out for Trojans Be careful were you web surf and what you do in public on public networks Avoid being scammed Never give out passwords Don t be so trusting 65 The Internet & The World Wide Web CIT 100 Norm Downey 17
Internet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationChapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts
E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationINFORMATION TECHNOLOGY 402
NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More informationTwelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1
Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012
More informationThe Internet and the World Wide Web
Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense
More informationTechnology in Action
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral
More informationBowie Senior Center Surfing the Web
Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationONLINE INFORMATION. Internet Basics
ONLINE INFORMATION Internet Basics What is the Internet? A global network connecting millions of computers that: exchanges news, information, and opinions Millions of personal computers connected to thousands
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.
Name: Class: Date: ACE Chapter 4 review True/False Indicate whether the statement is true or false. 1. Today s Internet joins together networks of over 300 million computers, or Internet hosts, to create
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans
More informationVISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks
Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationInternet and Mini.K.G Senior Scientist, FRAD, CMFRI
Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationLecture 12. Application Layer. Application Layer 1
Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers
More informationWEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS:
Browsing 101 WEBINAR TIPS: 1. Power off cell phones. 2. If accessing webinar through telephone, turn down volume of computer speakers (or mute them.) 3. Conference attendees will be muted during webinar
More informationMULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a
More informationCOMPUTER NETWORKING. Terminology of Network:
COMPUTER NETWORKING Network: A computer network is a collection of interconnected computers. Two computers are said to be interconnected if they are capable of sharing hardware, software and exchanging
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationPROTECTING YOUR BUSINESS ASSETS
PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina
More informationClass X Subject : IT (Vocational) Chapter -1 Ouestion / Answer
Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware
More informationChapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network
Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationProtecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013
Protecting your Security and Privacy on the Web Tony Brett Head of IT Support Staff Services IT Services 11 March 2013 Agenda Why bother? Common data leaks Email security Viruses & Trojans Phishing Why
More informationFrequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?
Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Answer 1: The Internet and the World Wide Web are
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback
ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times
More informationCONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites
USING THE INTERNET CONTENTS Internet Basics Internet Explorer Search Engines E-Mail Advantages and Disadvantages of the Internet Some good websites 2 WHAT IS INTERNET? A computer network Two or more connected
More informationChapter 2 The Internet and World Wide Web
Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Explain how to access and connect to the Internet Explain how to view pages and search for information on the Web Describe the types of Web
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationComputers Are Your Future Tenth Edition
Computers Are Your Future Tenth Edition Chapter 3: Wired & Wireless Communication Copyright 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this publication may
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationnetworks List various types of networks and their
Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationNetworking. Prof. Abdul Hameed
Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing
More informationCreating your own Website
Park Street Camera Club Creating your own Website What is a web site A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as
More informationHome Computer and Internet User Security
Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,
More informationFACTFILE: GCE DIGITAL TECHNOLOGY
FACTFILE: GCE DIGITAL TECHNOLOGY AS2: FUNDAMENTALS OF DIGITAL TECHNOLOGY WEB TECHNOLOGY AND MULTIMEDIA : KEY TERMS Web Applications 1 Learning Outcomes Students should be able explain the terms: WWW The
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationName: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.
Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationA global network of computers that share pages of information called webpages or websites. Internet Service Provider
INTERNET: A global network of computers that share pages of information called webpages or websites Computer Basics 3 Internet CONNECTING TO THE INTERNET Internet Service Provider INTERNET SERVICE PROVIDER
More informationChapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...
What You Will Learn... Computers Are Your Future Chapter 3 The definition of bandwidth The bandwidth needs of a typical user How modems change digital signals into analog Transmission media and methods
More informationE-companion. Quiz for IT-knowledge
E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationA+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling
A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn
More informationCMPT 165 Intro to Internet & WWW. Sept. 10 th 2015
CMPT 165 Intro to Internet & WWW Sept. 10 th 2015 Admin Survey on TA office hours Course website 2 My objectives I aim to teach you concepts that will stay with you for a long, long time.. (hopefully really
More informationAvailable Instructor Resources Resource File Name Found
Instructor s Manual Exploring Computing Concepts 2016, Chapter 1: Getting Started with Computer Concepts Student Data Files Solution Files Answer Keys Matching Multiple Choice Concepts Checks Scorecards
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationend systems, access networks, links circuit switching, packet switching, network structure
Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationINTERNET PROGRAMMING INTRODUCTION
INTERNET PROGRAMMING INTRODUCTION Software Engineering Branch / 4 th Class Computer Engineering Department University of Technology ORGANIZATION Lecture Mondays, 08:30-10:30 (Hall 4). Project 1. The project
More informationChapter 002 The Internet, the Web, and Electronic Commerce
Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationE-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition
E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall Chapter 3 E-commerce Infrastructure:
More informationÖzgür ZEYDAN (PhD.)
Özgür ZEYDAN (PhD.) http://cevre.beun.edu.tr/zeydan/ Computer Network A group of computer systems and other computing hardware devices that are linked together through communication channels. Purpose:
More informationFundamentals of Information Systems, Seventh Edition
Fundamentals of Information Systems, Seventh Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets Fundamentals of Information Systems, Seventh Edition 1 An Overview of Telecommunications
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More informationSt name:mariam darbi St number :1699
St name:mariam darbi St number :1699 what is the internet &how it work? The internet : is a network of networks and is a global comput er network, it is offspring of the ARPANET project. This idea of connecting
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationChapter 1: introduction
Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,
More informationDemystifying Internet Basics. Shelley Robinson, Executive Director André Dalle, System and Network Administrator
Demystifying Internet Basics www.ncf.ca Shelley Robinson, Executive Director André Dalle, System and Network Administrator NCF history Started in 1992, dial-up Also locally-hosted email, basic webhosting
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationChapter 6 The Internet
Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years
More informationAcknowledgment and Disclaimer:
What is the Internet Acknowledgment and Disclaimer: This presentation is supported in part by the National Science Foundation under Grant 1240841. Any opinions, findings, and conclusions or recommendations
More informationTechnology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University
Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better
More informationThe internet and the web
1 The internet and the web Internet lunched in 1969 National computer network called: Advanced Research Project Agency Network (ARPANET). The internet is : -Large network that connects together smaller
More informationE-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition
E-commerce 2014 business. technology. society. tenth edition Kenneth C. Laudon Carol Guercio Traver Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall e Commerce Course : Chapter 3 E-commerce
More informationNetwork Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture
Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationWeb Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery
Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers
More informationHow do you connect to the Internet (WWW)? Internet connection alternatives:
Peter C. Cronas How do you connect to the Internet (WWW)? Internet connection alternatives: Dial Up Modem 56Kb (a joke right?) Satellite (HughesNet) Modem 10-15 Mbps?? Cable (Cablevision) Cable Modem 1.5-20
More informationOnline Security and Safety Protect Your Computer - and Yourself!
Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your
More informationECDL / ICDL IT Security. Syllabus Version 2.0
ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationAn internet or interconnected network is formed when two or more networks are connected.
Computers I 3. The Internet An internet or interconnected network is formed when two or more networks are connected. The most notable internet is called the Internet and is composed of millions of these
More informationPrinciples of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems
+ Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition Dr.Amer Alzaidi Department of Information Systems Chapter 4 Telecommunications, the Internet, Intranets, and
More informationSECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi
SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question
More informationBasic Internet. Basic Internet
Basic Internet Basic Internet What is the Internet? The Internet is a global network connecting millions of computers which are linked together around the world, cooperating and communication with each
More informationIntroduction to the Internet and Web
Introduction to the Internet and Web Internet It is the largest network in the world that connects hundreds of thousands of individual networks all over the world. The popular term for the Internet is
More informationPRACTICING SAFE COMPUTING AT HOME
PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationHow many people are online? As of Sept. 2002: an educated guess suggests: World Total: million. Internet. Types of Computers on Internet
Internet Hazelwood East High School How many people are online? As of Sept. 2002: an educated guess suggests: World Total: 605.6 million Africa: 6.31 million Asia/ Pacific: 187.24 million Europe: 190.91
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More information