What is the Internet? CIT 100 Norm Downey. Interoperability. The Internet & The World Wide Web. Internet and the Client/Server Model

Similar documents
Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Computer networks 2013

INFORMATION TECHNOLOGY 402

Outside the Box: Networks and The Internet

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Introduction to the Internet. Part 1. What is the Internet?

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

The Internet and the World Wide Web

Technology in Action

Bowie Senior Center Surfing the Web

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

ONLINE INFORMATION. Internet Basics

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

Elementary Computing CSC 100. M. Cheng, Computer Science

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Chapter 3. The Basics of Networking

It is the process of sharing data, programs, and information between two or more computers.

Lecture 12. Application Layer. Application Layer 1

WEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS:

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

COMPUTER NETWORKING. Terminology of Network:

Chapter 7. Telecommunications, the Internet, and Wireless Technology

PROTECTING YOUR BUSINESS ASSETS

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

CONTENTS. Internet Basics. Internet Explorer. Search Engines. . Advantages and Disadvantages of the Internet. Some good websites

Chapter 2 The Internet and World Wide Web

end systems, access networks, links circuit switching, packet switching, network structure

Computers Are Your Future Tenth Edition

Typical Network Uses

networks List various types of networks and their

Course Outline (version 2)

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Networking. Prof. Abdul Hameed

Creating your own Website

Home Computer and Internet User Security

FACTFILE: GCE DIGITAL TECHNOLOGY

Web Cash Fraud Prevention Best Practices

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Chapter 4 The Internet

A global network of computers that share pages of information called webpages or websites. Internet Service Provider

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

E-companion. Quiz for IT-knowledge

1. Web Technology... 6

INTRODUCTION TO ICT.

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

CMPT 165 Intro to Internet & WWW. Sept. 10 th 2015

Available Instructor Resources Resource File Name Found

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Network Connectivity and Mobility

end systems, access networks, links circuit switching, packet switching, network structure

Introduction to computer networking

A Review Paper on Network Security Attacks and Defences

INTERNET PROGRAMMING INTRODUCTION

Chapter 002 The Internet, the Web, and Electronic Commerce

Review for Internet Introduction

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition

Özgür ZEYDAN (PhD.)

Fundamentals of Information Systems, Seventh Edition

The process by which a user can associate specific permissions to each username.

St name:mariam darbi St number :1699

The Internet and World Wide Web. Chapter4

Chapter 1: introduction

Demystifying Internet Basics. Shelley Robinson, Executive Director André Dalle, System and Network Administrator

INTERNET SAFETY IS IMPORTANT

Best Practices Guide to Electronic Banking

Chapter 6 The Internet

3.5 SECURITY. How can you reduce the risk of getting a virus?

Discovering Computers Chapter 2 The Internet and World Wide Web

Acknowledgment and Disclaimer:

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

The internet and the web

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Security Awareness. Presented by OSU Institute of Technology

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

How do you connect to the Internet (WWW)? Internet connection alternatives:

Online Security and Safety Protect Your Computer - and Yourself!

ECDL / ICDL IT Security. Syllabus Version 2.0

An internet or interconnected network is formed when two or more networks are connected.

Principles of Information Systems textbook: Principles of Information Systems, Sixth Edition. Dr.Amer Alzaidi Department of Information Systems

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Basic Internet. Basic Internet

Introduction to the Internet and Web

PRACTICING SAFE COMPUTING AT HOME

Broadband Internet Access Disclosure

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

How many people are online? As of Sept. 2002: an educated guess suggests: World Total: million. Internet. Types of Computers on Internet

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Transcription:

The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion computers are directly connected to the Internet. 2 By the way, Internet is a proper name, and as such, it is always capitalized Interoperability Internet and the Client/Server Model Interoperability enables computers that are of different brands and models, and using different operating systems exchange data and even control each other s operation Example: 3 Joe sends an e-mail from his Microsoft Windows PC that is processed by a Unix server and read by Jane on her Apple ipad and Jenny on her Android smart phone Client requests some type of service (such as a file or database access) from the server Server fulfills the request and transmits the results to the client over a network 4 1

Client/Server Example You, sitting at your PC in class, type in the web address for the college website into your computers browser. In this case you are the Client. The request you make is processed by a college server (a fast, high capacity computer) sends the page to your PC. 5 The college computer storing/sending the webpage is the Server Protocols Protocols are a set of rules for communication between devices Protocols determine the following: How the data is formatted, How the data is transmitted (data compression method, if any), How the sending device will indicate that it has finished sending a message How the receiving device will indicate that it has received a message 6 TCP/IP Transmission Control Protocol (TCP) Divides transmitted data into small packets for transmission, and reassembles data packets upon delivery into a complete message Internet Protocol (IP) Address 7 Numeric address that uniquely identifies each device on a computer network Four sets of numbers (0-255) each separated by a dot Example: 128.30.52.38 Connecting to the Internet 8 2

Internet Service Providers (ISP) A company that provides access to the Internet For a fee, the Internet Service Provider provides you with a username & password that allows you to connect to the ISP s network 9 ISP Responsibilities Providing and maintaining connection to the Internet Supporting hardware and software need for connection Protecting network from viruses, hackers and other illegal activities Providing customer service Providing technical support 10 DNS Domain Name System 11 Internet directory service that converts domain names (words), that humans like, to IP addresses (numbers), which computers like Example DNS servers convert google.com into an IP address 173.194.43.2 Baseband versus Broadband Baseband Type of data transmission that allows only one signal at a time. Example your telephone land line Broadband A transmission medium that transports high volumes of data at high speeds Data transmission in which a single wire can carry several channels (pathways) of data at one time. Example Cable TV & DSL 12 3

Baseband versus Broadband 13 Baseband Broadband Bandwidth versus Throughput Bandwidth is the maximum data transfer rate of a communication channel in a specific time period this is a theoretical speed Throughput is the actual amount of data that is transmitted in a specified time period 14 Throughput speed is almost always lower and can never exceed than bandwidth speed Bandwidth Bandwidth versus Throughput An Analogy with Cars and Traffic 15 in theory you could drive from Monroeville to downtown in 12 minutes, if there was no traffic, you had a fast car and you were allowed to drive over 100 mph Throughput the reality is it takes an hour to go from Monroeville to downtown because of rush hour traffic, the tunnels, speed limits, the limits of your car and driving skill, potholes, etc. Bandwidth is a theoretical maximum speed, throughput is the actual speed Bandwidth Usually expressed in bits per second (bps) The greater the bandwidth, the faster the connection and generally, the more expensive the connection Broadband connections provide greater bandwidth than baseband connections What s a bit? Stay tuned we ll get to that next time 16 4

The Last Mile Problem Types of Internet Connections The last mile problem refers to the slowest part of a connection, which is generally local cable or phone lines and often the cabling or equipment in your home Maximum bandwidth is limited by the slowest section of the connectivity chain 17 Dial-up Cable DSL Fiber Optics Phone 18 Dial-Up Connections Cable (as in Cable TV) Slowest, cheapest Internet connection that uses regular phone lines. Dial-up is a Baseband connection 19 High speed, always on Internet connection Uses coaxial cable and a cable modem for a broadband Internet connection Copper coaxial cable provides much greater bandwidth than telephone line Cable s last mile problem is that you share your bandwidth with your neighbors 20 5

Cable (as in Cable TV) 21 Cable TV Connections 22 How a cable Internet connection looks in your house How a cable Internet connection looks in your neighborhood Cable TV Connections Lowest-capacity coaxial cable has far greater capacity than ordinary telephone lines Coaxial cable bandwidth is divided among 3 activities: TV shows downstream to client Upstream data requests Downstream data (web pages, e-mail, etc.) Fast Downstream 1 to 50 Mbps rates 23 Digital Subscriber Line (DSL) High-speed, always-on, Internet access 24 Compresses data to improve transmission speed over regular copper telephone lines DSL s last mile problem is that it still uses ordinary phone lines which can be plagued with noise (interference) Supports throughputs of 1 to 6 Mbps Not available everywhere 6

DSL Connection What about Fiber Optics? 25 Central Telephone Switching Station Internet Fiber Optic cable consists of thin strands of glass or plastic that carry data on pulses of light Capable of enormous throughput Fiber optic cable, run directly to your home, virtually eliminates the last mile problem 26 Other Transmission Media 27 Cell Phone Basics 28 Infrared Wireless using light Limited to line of sight of about 100 feet Bluetooth Named for 10 th century Viking king Limited to 30 feet and 8 devices Uses radio signals not limited to line of sight 7

Cellular Network A radio network in which a geographic area is divided into cells, with a transmission tower and station at the center of each cell, to support mobile communications 29 30 There is a short answer question on the quiz that will ask you to explain the difference between the Internet and the World Wide Web The World Wide Web What is the World Wide Web? Billions of specially formatted documents stored on Internet servers and accessed through web browsers These documents are formatted using HTML (Hyper Text Markup Language) HTML supports links to other documents, as well as graphics, audio, and video files Not all Internet servers are part of the World Wide Web 31 Internet versus World Wide Web Internet 32 Network infrastructure (cables, computers, routers, software, etc.) Used to access computers and exchange data in a variety of formats Uses TCP/IP protocols World Wide Web Billions of specially formatted documents Uses the Internet as its transport mechanism Uses HTTP or HTTPS protocols They are NOT the same thing! 8

Websites Websites and Web pages 33 Location in cyberspace that makes web pages available A collection of related web pages Web pages Specially formatted, linked documents on a website that includes text, graphics, sound, animation or video What s cyberspace? Virtual territory that is accessible only with a computer Web Browsers 34 Software that displays web documents and provides access to linked documents Runs on the client side of the Client/Server Model Includes: Internet Explorer (Microsoft) Edge (Microsoft comes with Windows 10) Firefox (Mozilla Foundation formerly Netscape) Chrome (Google) Safari (by and for Apple Macs) Opera (Opera Software) Web Servers Computers running special server software that Accepts requests for information, Processes requests and Sends requested documents The server side of the Client/Server Model 35 Hyperlinks 36 Clickable links in webpages that open other web documents Examples: www.ccac.edu or 9

HTML Web documents are created using HTML (Hypertext Markup Language) 37 HTML is a Markup Language used to define the appearance of Web pages CCAC teaches an HTML class CIT 125 How do you know if a website is secure? Look for the lock symbol in Internet Explorer (above). Clicking on the company name in Internet Explorer or Firefox (right) shows security information. 38 Rules for Evaluating Web Pages Who is the author? Are they an expert? Are the sources cited? Are the authors sources respected? Who pays for the web site? Is the presentation one sided? http://www.truth-out.org/ 39 Examples Is the language objective or argumentative? What is the purpose of the page? Is the page accurate? Is the page up to date? http://townhall.com/ If unsure, look for About Us or something similar Search Engines A program that searches documents for specified keywords and returns a list of the web documents where the keywords were found Search engines then use those results to display meaningful results Search Engines include: Google Bing Yahoo Dogpile 40 10

URL Uniform Resource Locator Other Terms to Know 41 Web address Character string that precisely identifies an Internet resources type and location Parts of URL http://web.acd.ccac.edu/~ndowney/cit140/ http:// - Protocol web.acd.ccac Domain indicates CCAC academic webpages edu Top Level Domain Name /~ndowney folder or directory on server 42 CIT140 specific page, resources or file within specified directory Examples of Top Level Domains 43 Cookies 44 Common US Top Level Domain Names.com Commercial.edu Educational.net Network Resource.mil US Military.gov US Government.org Non-profit organization Top Level International Domain Names.ca Canada.au Australia.cn China.jp Japan.mx Mexico.ng Nigeria.ru - Russia Small text files written to your computer s hard drive, generally without users knowledge or consent Used to keep track of user preferences or for compiling information about user s web browsing behavior 11

Cookies Uploading versus Downloading Cookies allow websites such as Amazon.com to keep track of recent searches and to present lists of related items to hopefully increase their sales Also used to build web Shopping Carts 45 Uploading Transferring files from your computer to another computer on Internet From client to server Downloading Transferring files from another computer to your computer From server to client 46 Wiki Wikis and Blogs From Hawaiian word wiki-wiki meaning fast Web page on which a visitor can post text or images, read and exchange posted information and track changes Blogs Short for web log Allow user to post thoughts and opinions 47 E-mail E-mail short for electronic mail Allows sending and receiving messages via a computer network including over the Internet E-mail address consist of User name (ndowney) At symbol @ Host (acd.ccac CCAC s Academic e-mail server) Domain (.edu top level domain name) Spam unsolicited e-mail advertisements 48 12

Social Networking Web sites provide Web-based tools for users to share information about themselves with others on the Web, and find, meet, and converse with other members Facebook Twitter LinkedIn 49 Media Sharing Media-sharing web sites provide methods for members to store and share digital media files on the Web YouTube Flickr PhotoBucket 50 Podcasting 51 An audio file that contains a recorded broadcast distributed over the Internet via the World Wide Web The Internet of Things Connection pf physical world to Internet 52 Physical objects are tagged and can be located, monitored, and controlled using small embedded electronics Network connectivity enables these objects to collect and exchange data 13

Phishing Online Safety 53 54 A type of attack where a phisher (a crook) poses as a legitimate business in an e-mail or on a website in an attempt to obtain personal information for purposes of identity theft No bank will ever send you an e-mail asking for your PIN number Do not click hyperlinks in suspicious e-mails Malware Short for MALicious software Malicious is defined as 55 being characterized by malice; intending to do harm Malware is a class of software designed to damage or infiltrate a computer or network s data without users consent or knowledge Malware CANNOT do physical harm to hardware Types of Malware Spyware Collects your personal information Monitors your web usage Reports information to others for purposes of identity theft 56 14

Types of Malware Viruses Hidden programming code that damages or destroys infected files Designed to self-replicate Run when file is opened or program is started Spread through sharing infected files often via e-mail 57 Types of Malware - Trojans A destructive program that pretends to be a useful application Initially appears to perform a desirable function for the user, but (perhaps in addition to the expected function) steals information or does other harm Derives it s name from the Trojan Horse of Greek Mythology 58 How to Steal Passwords Password guessing Your child or pet s names are not good passwords Shoulder surfing Watch out for lurkers Packet sniffing 59 This involves specialized software to capture unencrypted data moving through a network as data packets How to Steal Passwords Dumpster diving Buy a shredder and use it don t leave sensitive paper in the trash Social engineering Sweet talked into giving up your passwords Super user status 60 Giving password or other sensitive data to people you think you can trust like your teacher or the guy from the Helpdesk 15

Effective Passwords should be Strong & Long 61 Use words that are unrelated to your interests, mix upper and lowercase letters, numbers, and symbols The longer the password the harder to crack Gibson Research Password Haystack https://www.grc.com/haystack.htm Unique Vary passwords don t use one password for everything Changed regularly Change your passwords at least twice a year Protecting Yourself Online 62 Protecting Yourself Online Virus protection Application that runs your computer and searches viruses and other malware Firewall Program designed to control flow between your computer and the Internet Stops malware from Entering your computer or, if it s already in Sending messages out from your computer 63 Protect Yourself Online Parental controls Controls what children can/cannot see & do on Internet and WWW Utilizes database of unacceptable websites Keep Up-to-date Turn on Windows Automatic Updating feature Keep Anti-Virus programs up-to-date Schedule virus scans 64 16

Protect Yourself Online Be careful what you download and install Be sure the source is reputable When downloading software watch out for Trojans Be careful were you web surf and what you do in public on public networks Avoid being scammed Never give out passwords Don t be so trusting 65 The Internet & The World Wide Web CIT 100 Norm Downey 17