Networks and the Internet

Similar documents
Networks and the Internet

Security. Internet and Network Attacks. Computer Security Risks 1/23/2019

Fix network connection issues in Windows 10

APPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7

UofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning

um Wireless Revised 8/17/18

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

Lab - Observing DNS Resolution

Lab 9.8.1: Address Resolution Protocol (ARP)

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

Lesson 12 Lab Key Lab Exercises

SUMMARIES OF INTERACTIVE MULTIMEDIA

iprint to Print

Networking. INFO/CSE 100, Spring 2005 Fluency in Information Technology.

INFORMATION TECHNOLOGY 402

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Entry Level Assessment Blueprint Computer Networking Fundamentals

Data Communication & Networking

CHAPTER 1. Welcome to Grand IP Camera III

The process by which a user can associate specific permissions to each username.

1/29/2019. Storage Media. Storage Media

Windows Help document Part A

9/2/2016. Storage Media. Storage Media

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

um-guest Wireless Revised 8/8/18

HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Wireless b/g/n 150Mbps AP Router

Networking By: Vince

Introduction to the Internet. Part 1. What is the Internet?

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Chapter 16: Advanced Security

Elementary Computing CSC 100. M. Cheng, Computer Science

2 User Guide. Contents

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

ZyAIR B-500 Wireless Access Point Quick Installation Guide

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

Otasuke Pro-ServerEX! Introduction. What is Pro-Server EX? - Introduction-0 -

Chapter 1 Introduction to TCP/IP

Document: #HT Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000

MODUL 7 DATA LINK LAYER

Computer Networking Fundamentals

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses

An introduction to the Internet. Joining a connected world

Upgrading Your Home Network Security

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

The Features and Uses of Computer Networking. Unit 11 Task 1

Get Max Internet Security where to buy software for students ]

E-companion. Quiz for IT-knowledge

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

Networking. INFO/CSE 100, Spring 2006 Fluency in Information Technology.

A Review Paper on Network Security Attacks and Defences

Chapter 4: Networking and the Internet

Configuring your Home Wireless Network

Lab 6.7.1: Ping and Traceroute

Chapter 12. Information Security Management

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

Setting IPSec VPN connection between two SMC BR21VPN

Lab: Configure Wireless Security

- NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP

Resource:

HHH Instructional Computing Fall

ACN Premium Technical Support. 24/7/365 Remote Computer Support

INTERNET BASICS / FILE OPERATIONS Defining Information Technology

Prestige 660HW Series. Prestige 660H Series. Quick Start Guide

BOSSC55. User s Manual. Camera IP LAN - Wireless - USB. The information in this document is subject to change without notice.

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Data Communication & Networking

Logging In & Logging Out

Computer Networking Fundamentals

umdrive File Sharing, Permissions, & Tickets

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

IT & DATA SECURITY BREACH PREVENTION

Annexure E Technical Bid Format

Wireless Printing in Mac OS X with IPP At Concordia University of Edmonton

Introduction to the Portal

Contents Introduction to the Product Configuration CPE built-in Web Server Access CPE Setup on the web page Trouble Shooting Operating Information

Create a Dual Stack Virtual Private Cloud (VPC) in AWS

FACULTY OF ENGINEERING. Lab Experiment

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

PHP-security Software lifecycle General Security Webserver security PHP security. Security Summary. Server-Side Web Languages

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

Using the AETA Remote Access service

Course Outline (version 2)

Procedure Note: The research steps for this lab are not included in this procedure.

WEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS:

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

Parent/Student. Web Access. User. Manual

Transcription:

UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Networks and the Internet A network is a collection of computers and devices connected together, often wirelessly, via communications devices and transmission media The Internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals Page 8 2010: Discovering Computers Chapter 1 2 The Internet 1

Networks and the Internet Page 8 Figure 1-6 2010: Discovering Computers Chapter 1 4 The Internet Page 47 Figure 2-2 2010: Discovering Computers Chapter 2 5 Networks Network interface card (NIC) LAN WAN WLAN PAN WiMax 2

The Internet An IP address is a number that uniquely identifies each computer or device connected to the Internet A domain name is the text version of an IP address Top-level domain (TLD) Page 48 Figure 2-3 2010: Discovering Computers Chapter 2 7 The Internet Page 48 Figure 2-4 2010: Discovering Computers Chapter 2 8 The World Wide Web Page 50 Figure 2-5 2010: Discovering Computers Chapter 2 9 3

Uniform Resource Locator Each web page has a unique address called a URL URL s can be comprised of: Example: Protocol://Host/Path/File.name http://tech-uofm.info/fall_2016/tech1010/index.html 10 The World Wide Web Page 51 Figure 2-6 2010: Discovering Computers Chapter 2 11 Uniform Resource Locator Path is the directory/subdirectories where the web page is located on the host Web page stored in a file with an extension (aka suffix) of HTML or HTM File names consist of prefix.suffix (suffix also called extension) Protocol http hypertext transfer protocol ftp file transfer protocol https secure http 12 4

The World Wide Web Information presented on the Web must be evaluated for accuracy No one oversees the content of Web pages Page 58 Figure 2-12 2010: Discovering Computers Chapter 2 13 Things You Should Know How to get your IP address How to tell if you are connecting to the network How to register a computer on the UofM Network Know your IP Address? To find your computer s IP address Start In Search programs and files box type cmd At the DOS prompt Ipconfig On campus, IP addresses start with 141. for a wired connection and 10. for wireless connections (172. for the UofM Guest Network). 15 5

Are you Connected? To see if you are connected to the internet you can use the DOS prompt window (as in the last slide) but type: ping google.com And you should see (something like): Pinging google.com [74.125.67.100] with 32 bytes of data: Reply from 74.125.67.100: bytes=32 time=60ms TTL=239 Reply from 74.125.67.100: bytes=32 time=42ms TTL=239 Reply from 74.125.67.100: bytes=32 time=61ms TTL=239 Reply from 74.125.67.100: bytes=32 time=63ms TTL=239 Ping statistics for 74.125.67.100: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 42ms, Maximum = 63ms, Average = 56ms 16 Security Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer Malware Viruses Spyware Adware Firewall Phishing Pharming Antivirus software Internet and Network Attacks Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Pages 185 187 Figure 10-4 2010: Discovering Computers Chapter 5 18 6

Computer Security Risks Pages 182-183 Figure 10-1 2010: Discovering Computers Chapter 5 19 University of Memphis Network Network Login If you Bring your own device on campus, you will need to log into the network the network: 7

Network Login On Windows and Mac machines you will need to follow instructions to install Safe Connect iprint To facilitate students wishing to print from their own computers, ITD has given access to print via iprint to many of the printers in labs and other locations around campus. Instructions Tiger Text An emergency alert system on campus Informs you, via a text message to your phone, of: University closings and delays Emergencies on campus Sign up at: https://umwa.memphis.edu/tigertext/index. php 8

UMWare UM Ware allows students to use SELECTED software from off campus http://umware.memphis.edu Blogs Students have access to create WordPress Blogs on their University Account https://blogs.memphis.edu Using MyMemphis 27 9

Go to mymemphis 28 Type name and password 29 A good place to start is UofMOnline 30 10

UMdrive (file space accessible from anywhere with internet access) 31 For UMdrive Help http://www.memphis.edu/umtech/teaching/ umservices/umdrive.php You can give access to files placed on UMDrive to individuals and groups Many faculty use UMDrive to give students access to files 32 Library Search 33 11

Identity Management 34 Campus Email 36 12

Email Etiquette Always include a subject line and include your name if you think the person might not know who you are from your Email account name. Remember, without facial expressions and body language, written comments may be taken the wrong way. Be careful in wording your emails. Use standard fonts. Don t use all capital letters when typing; all caps is understood to be the equivalent of shouting. Do not send large attachments without permission. Special formatting such as centering, audio messages, tables, html, etc. should be avoided unless necessary to complete an assignment or other communication. Avoid using text messaging choppiness and use capital letters to start sentences. Other Email Notes Do not open email attachments (especially from people you do not know) VIRUSES! Use appropriate email account names (sending a resume via an account ilovegames@aol.com is a bad idea) When attaching a file, make sure the person you are sending has the program to open it (when in doubt PDF!) One Last Note Once you put something on the internet (via facebook, email, etc) it is there forever do you really want an employer to see that picture of you at that party? 13

Bibliography New Perspectives on Microsoft Office 2007, First Course, Windows XP Edition http://oc.course.com/np/office2007/firstcoursexp.cfm Class Notes for CGS1100, Prof. Robert W Janson, Florida Community College http://web.fccj.org/~rjanson/cgs1100/2007.2.internet.ppt University of Memphis - MyMemphis webpages https://my.memphis.edu/cp/home/displaylogin 14