Outside the Box: Networks and The Internet

Similar documents
Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

WEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS:

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

Chapter 2 The Internet and World Wide Web

Chapter 6 The Internet

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Mobile Devices. Objectives. Types of Devices 4/25/2012

Computer networks 2013

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

Bowie Senior Center Surfing the Web

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

Typical Network Uses

The Internet and World Wide Web. Chapter4

Defining the Internet

Chapter 2A. The Internet s History

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Chapter 3. The Basics of Networking

Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web

Computers Are Your Future

Computers: Information Technology in Perspective, 11e

Networks and the Internet A Primer for Prosecutors and Investigators

Internet Crimes Against Children:

Discovering Computers Your Interactive Guide to the Digital World

Introduction to the Internet. Part 1. What is the Internet?

Discovering Computers Chapter 9 Communications and Networks

Chapter 1 Living in a Network Centric World

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Definitions Know What I Mean?

Networks and the Internet A Primer for Prosecutors and Investigators

Skill Area 209: Use Internet Technology. Software Application (SWA)

Unit A: Computer and Internet Basics

and the Forensic Science CC Spring 2007 Prof. Nehru

09-Jan-17. Objectives Overview. The Internet. Objectives Overview. Evolution of the Internet. Evolution of the Internet. Discovering Computers 2012

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Computer Networks and the internet. Daniel Graham Ph.D

The Basics of Networking

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

Communications and Networks

Using the Internet and the World Wide Web

INTERNET PROGRAMMING INTRODUCTION

Management Information Systems

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Fundamentals of Information Systems, Seventh Edition

Acknowledgment and Disclaimer:

CSEN 503 Introduction to Communication Networks

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

Full file at Chapter 2: Communications, Networks, the Internet, and the World Wide Web

Internet. Class-In charge: S.Sasirekha

CSC Introduction to Computers and Their Applications. Background

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

The Internet and the World Wide Web

The internet and the web

Network Applications and Protocols

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

The Internet and World Wide Web Chapter4

Internet. Telephone Line

CHAPTER2. 1. The Internet was launched in 1969 and was originally called

Chapter 7. Video cases:

Introduction to Internet

Introduction to computer networking

There are two main types of computer networks:

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review

Network Connectivity and Mobility

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Practice Examination 3

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

INTRODUCTION TO ICT.

Chapter 2: Communications, Networks, the Internet, and the World Wide Web

The Internet, Intranets, and Extranets Chapter 7

Part I: Hardware and communication

INTERNET AND THE WEB

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

5/17/2009. Networked Computers Change Our Lives. People Are More Interconnected. Nowhere Is Remote. English Is Becoming a Universal Language

Discovering Computers Chapter 2 The Internet and World Wide Web

Computer Concepts - Illustrated Introductory, Ninth Edition

M4.3-R4: INTRODUCTION TO ICT RESOURCES

Web Engineering (CC 552)

Component 4: Introduction to Information and Computer Science

ipad Beyond the Basics

LECTURE WK4 NETWORKING

INTRODUCTION TO INFORMATION & COMMUNICATION TECHNOLOGY (ICT) LECTURE 1 : WEEK 1 CSC-111-T

Chapter 8 Networking and Digital Communication

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems

Chapter 3 The Basics of Networking

ITP 140 Mobile Applications Technologies. Networks

St name:mariam darbi St number :1699

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition

AT&T SD-WAN Network Based service quick start guide

It is the process of sharing data, programs, and information between two or more computers.

IBPS Practice Exam 1. 1.What is the ultimate purpose of Defragmentation? 1) Make the PC faster 2) Create More Free Space 3) Delete temporary files 4)

Computer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Networking. Prof. Abdul Hameed

Online Entertainment

Home and Wireless Networks 7

Transcription:

Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer owner actually has possession of Computer s hard drive and other memory Documents Pictures Outlook Emails Internet Cache CD s and floppy disks ipods Cell Phones External Hard Drives Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 1

Inside the Box What the computer owner actually has possession of Outside the Box What is not stored on the owner s computer Online Email Accounts (Gmail and Yahoo) Internet Shopping Accounts Social Networking Accounts Backups of text messages Cell Site Location Data Using Pen/Trap for Internet DRAS information Subscriber account records Contents of Websites Outside the Box What is not stored on the owner s computer Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 2

Networks Network Setup Networks may take two forms: Wired each computer connects to a router with a cable Speeds of 100 Mbps Wireless computers connect through a signal that is broadcasted by a router Home wireless networks allow sharing of a connection as far as 750 feet Unauthorized access is much easier Speeds up to 54 Mbps Basic Network Router Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 3

Basic Network Router Server What is the Internet? A network of computers? A network of networks? It is a network of millions of networks World Wide Web Plus lots more. WWW is the most obvious part of the Internet, but it isn t all of it Each computer on the Internet uses TCP/IP to communicate The Internet World Wide Web (the Web) E-mail Instant messaging (IM) Webcam / Internet Telephone (VoIP) Peer-to-peer (P2P) networks Legacy Systems Usenet Newsgroups Telnet and File transfer (FTP) sites Internet Relay Chat (IRC) Bulletin boards Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 4

What Kinds of Computers Can Be on the Internet? Mainframes Laptops Vehicles Cell Phones Personal computers Internet Connectivity Home PCs Internet Service Provider (ISP) Telephone dialin line Network Cable modem connection High-speed data link DSL line Network Network Internet Connections At one time, dial-up was the predominant way to connect to the Internet. Today, dialup has been replaced so the user is constantly connected and receives higher speeds Dial-up 56 Kbps DSL 245 Kbps to 20 Mbps T-3 44 Mbps 3G 200 Kbps Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 5

Internet Connections Many businesses utilize the same connection types as home users, but often subscribe to a higher connection speed Larger businesses use a T1 or T3 connection Requires direct fiber optic connection May cost more than $10,000 per month Even faster networks are available Cost can exceed $5 million per month IP Addressing Each device on the Internet has a unique IP address, such as this one: 317.23.90.134 Computers, servers, and even printers have an IP address Addresses are usually temporary In some cases, static addresses are assigned permanently IP Addressing If a network utilizes a router, there are two IP addresses involved Internal: each computer has an internal IP address that distinguishes the computers on the network External: the unique IP address assigned to the router by the ISP Data is received at the external IP address by the router, and then the router sends the information to the correct internally-addressed computer Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 6

IP Addressing Router Internal: 172.168.1.4 External: 190.56.892.002 Computer 1 Internal: 172.168.1.1 External: 190.56.892.002 Computer 3 Internal: 172.168.1.3 External: 190.56.892.002 Computer 2 Internal: 172.168.1.2 External: 190.56.892.002 Coffee Shop Internal: 172.168.1.102 External: 235.71.90.123 The Office Internal: 172.168.1.195 External: 190.56.892.002 Home External: 753.23.234.901 Why Addressing Matters The Internet is a packet-switched network The component parts of a communication (i.e., the packets) sent to another host may travel by different paths Each packet makes one or more hops along the network on the way to its destination Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 7

TCP Packet Switching A B Sending File from Computer A to Computer B TCP Packet Switching A B File is broken into smaller pieces called packets TCP Packet Switching A B The packets are labeled with addressing information Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 8

TCP Packet Switching A B The packets are not sent through the same path. There are billions of paths they may take. TCP Packet Switching A B When the packets arrive, they must be put back together. The Path 1 2 3 Home Computer Home Router 5 4 Internet Service Provider Website Host Internet Exchange Point Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 9

Domains & URLs Domain names are used to help a browser locate a website. For example: http :// www.ncjrl.org Protocol Subdomain Domain Host Top- Level Domains & URLs Domain names provide information about the corresponding computer.com,.gov,.edu,.net,.int,.mil are generic top-level domains for types of organizations other top-level domains are geographybased (e.g.,.de for Germany,.fr for France, etc.) Domains & URLs Domain names often serve as an alias for an IP address. For some websites, the IP address is interchangeable with the domain name. For example, you can visit Google by entering either: http://www.google.com http://74.125.159.99/ Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 10

Why It Matters How Computers, Networks, and the Internet Work Immense amount of digital data created, transmitted, stored Some created by humans A lot necessarily created by machines in the background Digital Evidence User-created Text (documents, e-mail, chats, IM s) Address books Bookmarks Databases Images (photos, drawings, diagrams) Video and sound files Web pages Service provider account subscriber records Digital Evidence Computer-created Dialing, routing, addressing, signaling info Email headers Metadata Logs, logs, logs Browser cache, history, cookies Backup and registry files Configuration files Printer spool files Swap files and other transient data Surveillance tapes, recordings Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 11

Web Browsers A browser is a computer application that retrieves and displays content from the web This content may include web pages, videos, pictures, and more Popular browsers include Firefox, Internet Explorer, Chrome, and Safari Browser Functions Web browsers also collect a variety of information about a user s online actions and save this information on the computer History Cache / Temporary Internet Files Cookies Browser Functions History Records each page visited within the browser Tags each visit with a time and date Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 12

Browser Functions Internet History Browser Functions Cache (Temporary Internet Files) Stores data so that future requests for the same website can be served faster Cache is most obvious when you click the back button. The webpage appears almost immediately because the content is retrieved from your computer, not the server Cache may remain on a computer for weeks at a time or longer Browser Functions Cache (continued) Usually consists only of images and text May allow viewing of an entire website even if the computer is not connected to the Internet Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 13

Browser Functions Temporary Internet Files Folder Browser Functions Cookies Text stored by the browser May store a user s site viewing preferences or contents of their shopping cart Some will contain personal information such as a login name or email address Cookies rarely, if ever, contain information like passwords or credit card numbers Browser Functions Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 14

The Internet: It s more than just email Web 2.0 Interactive Internet communities Social networks Blogs Wikis Video or photo sharing sites Online role-playing games Virtual worlds Virtual Worlds features: User chooses name, job, body type, lifestyle, personality Exchange of USD for Second Life currency Money is used to buy clothing, cars, and buildings, and to pay for services Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 15

Avatars in Second Life Ever wanted to fly? Virtual Worlds Online Lectures Virtual Worlds Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 16

Virtual Worlds Political Rallies Virtual Worlds Social Networking Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 17

Social Networking Social Networking Some Social Networking features: Posting Messages (public or private) Personal Profile Picture Sharing Interactive Games Instant Messaging Classified Advertising Social Networking Search Search Results One Result: Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 18

Social Networking Consider Cloud Computing ( Web 3.0?) Cloud Computing Basically, obtaining computing resources from someplace outside your own four walls Processing Storage Messaging Databases etc. Entrusting data to third-party providers Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 19

The Cloud Everything we currently do. Email Online Storage Social Networking Peer-Peer File Sharing Chat and IM Virtual worlds and online games Peer-to-Peer Networking Peer-to-Peer Networking is used to download files from the Internet including: Music Movies Books & Magazines Documents Pornography While not always illegal, it often is. Client-Server vs. Peer-to-Peer Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 20

Peer-to-Peer Networking Step 1: User downloads the software Peer-to-Peer Networking Step 2: User searches for the movie and downloads a torrent file Peer-to-Peer Networking Step 3: User begins to download the file Jim s Download Queue Different users that are sharing the file with Jim Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 21

Peer-to-Peer Networking Step 4: User is able to play the movie and his computer often continues to share it with other users on BitTorrent Peer-to-Peer Networking Considerations By default, BitTorrent, Limewire and other P2P programs share downloaded files Broadband use turned home computers into distributed super-networks for sharing files Design of networks fault tolerant and load balancing Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 22

Considerations Users on Internet voluntarily Users can decide, through settings in the software, how much or how little of their computers will be open to viewing by others on the Internet Considerations Every download is exact duplicate of the original image Internet Protocol (IP) Address of individual user can be ascertained (identifying unique computer) Successful tracking of IP address reveals computer that had the file available for distribution 68 Cellular Phones Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 23

Cellular Phones Modern cell phones have a variety of functions, including: SMS (short message service) MMS (multimedia message service) Phone Calls Cameras File Storage Internet Access Cellular Phones SMS (short message service) 160 characters or less Sent from cell phone to cell phone by way of towers and servers If recipient phone is off, a message will be saved until the phone is turned on Cellular Phones Sender types message and sends it The message travels through the nearest cell towers The phone company directs the message to the recipient through it s servers The message travels through the nearest cell towers to the recipient The recipient receives the message Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 24

Cellular Phones Sample Tower/Sector Questions? Don Mason Associate Director National Center for Justice and the Rule of Law 662-915-6898 drmason@olemiss.edu www.ncjrl.org Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Page 25