Networks and the Internet

Similar documents
Networks and the Internet

Security. Internet and Network Attacks. Computer Security Risks 1/23/2019

Lesson 12 Lab Key Lab Exercises

Fix network connection issues in Windows 10

APPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7

UofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning

um Wireless Revised 8/17/18

Networking. INFO/CSE 100, Spring 2005 Fluency in Information Technology.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Windows Help document Part A

Lab 9.8.1: Address Resolution Protocol (ARP)

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Lab - Observing DNS Resolution

Lab 6.7.1: Ping and Traceroute

Entry Level Assessment Blueprint Computer Networking Fundamentals

Networking By: Vince

um-guest Wireless Revised 8/8/18

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

Wireless b/g/n 150Mbps AP Router

SUMMARIES OF INTERACTIVE MULTIMEDIA

CHAPTER 1. Welcome to Grand IP Camera III

iprint to Print

Networking. INFO/CSE 100, Spring 2006 Fluency in Information Technology.

INFORMATION TECHNOLOGY 402

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Chapter 1 Introduction to TCP/IP

2 User Guide. Contents

Data Communication & Networking

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

The process by which a user can associate specific permissions to each username.

1/29/2019. Storage Media. Storage Media

9/2/2016. Storage Media. Storage Media

Computer Networking Fundamentals

HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP

LAB 1 HOW THE WEB WORKS

General Network Troubleshooting

Introduction to the Internet. Part 1. What is the Internet?

GET TO KNOW YOUR COMMAND PROMPT

Procedure Note: The research steps for this lab are not included in this procedure.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Chapter 16: Advanced Security

Elementary Computing CSC 100. M. Cheng, Computer Science

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

ZyAIR B-500 Wireless Access Point Quick Installation Guide

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Otasuke Pro-ServerEX! Introduction. What is Pro-Server EX? - Introduction-0 -

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

Document: #HT Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

MODUL 7 DATA LINK LAYER

Computer Networking Fundamentals

The Basics of Networking

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses

Upgrading Your Home Network Security

Talia: idirect infiniti series Troubleshooting Guide 2 of 12 Start the isite application. You should see information about your IDU in the left pane,

An introduction to the Internet. Joining a connected world

Username: Lab Section (Circle One): 9:30 12:30 2:00 3:30

Networking interview questions

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Welcome to KGI. SALS Technology Setup 2015 Keck Graduate Institute

Using the AETA Remote Access service

Lab Configuring HSRP and GLBP Topology

Get Max Internet Security where to buy software for students ]

The Features and Uses of Computer Networking. Unit 11 Task 1

E-companion. Quiz for IT-knowledge

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

Networking Jamie Tees

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

Networking 101 By: Stefan Jagroop

Installing and Configuring the Voice UPB Bridge updated 1-Jan-2019

Course Outline (version 2)

Configuring your Home Wireless Network

A Review Paper on Network Security Attacks and Defences

iconnect625w Copyright Disclaimer Enabling Basic Wireless Security

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

HP 5120 EI Switch Series

Meeting 39. Guest Speaker Dr. Williams CEH Networking

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Chapter 12. Information Security Management

Setting IPSec VPN connection between two SMC BR21VPN

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

Lab: Configure Wireless Security

HHH Instructional Computing Fall

- NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP

Resource:

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department

Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018

TCP/IP Diagnostic Utilities on Windows 2008 Server

FACULTY OF ENGINEERING. Lab Experiment

ACN Premium Technical Support. 24/7/365 Remote Computer Support

LAB 1 HOW THE WEB WORKS

Octopus Online Service Safety Guide

1. Web Technology... 6

Transcription:

UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department 2018 v2.1 ed. Networks and the Internet A network is a collection of computers and devices connected together, often wirelessly, via communications devices and transmission media The Internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals Page 8 2010: Discovering Computers Chapter 1 2 The Internet 1

Networks and the Internet Page 8 Figure 1-6 2010: Discovering Computers Chapter 1 4 The Internet Page 47 Figure 2-2 2010: Discovering Computers Chapter 2 5 Networks Network interface card (NIC) LAN WAN WLAN PAN WiMax 2

The Internet An IP address is a number that uniquely identifies each computer or device connected to the Internet A domain name is the text version of an IP address Top-level domain (TLD) Page 48 Figure 2-3 2010: Discovering Computers Chapter 2 7 The Internet Page 48 Figure 2-4 2010: Discovering Computers Chapter 2 8 The World Wide Web Page 50 Figure 2-5 2010: Discovering Computers Chapter 2 9 3

Uniform Resource Locator Each web page has a unique address called a URL URL s can be comprised of: Example: Protocol://Host/Path/File.name http://tech-uofm.info/fall_2016/tech1010/index.html 10 The World Wide Web Page 51 Figure 2-6 2010: Discovering Computers Chapter 2 11 Uniform Resource Locator Path is the directory/subdirectories where the web page is located on the host Web page stored in a file with an extension (aka suffix) of HTML or HTM File names consist of prefix.suffix (suffix also called extension) Protocol http hypertext transfer protocol ftp file transfer protocol https secure http 12 4

The World Wide Web Information presented on the Web must be evaluated for accuracy No one oversees the content of Web pages Page 58 Figure 2-12 2010: Discovering Computers Chapter 2 13 Things You Should Know How to get your IP address How to tell if you are connecting to the network (and what path is used to connect two systems) How to register a computer on the UofM Network Know your IP Address? To find your computer s IP address Start In Search programs and files box type cmd At the DOS prompt Ipconfig On campus, IP addresses start with 141. for a wired connection and 10. for wireless connections (172. for the UofM Guest Network). 15 5

Are you Connected? To see if you are connected to the internet you can use the DOS prompt window (as in the last slide) but type: ping google.com And you should see (something like): Pinging google.com [74.125.67.100] with 32 bytes of data: Reply from 74.125.67.100: bytes=32 time=60ms TTL=239 Reply from 74.125.67.100: bytes=32 time=42ms TTL=239 Reply from 74.125.67.100: bytes=32 time=61ms TTL=239 Reply from 74.125.67.100: bytes=32 time=63ms TTL=239 Ping statistics for 74.125.67.100: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 42ms, Maximum = 63ms, Average = 56ms 16 Path Between Computers To see the path (or ROUTE) used to connect two computers you can use the DOS prompt window (as in the last slide) but type: tracert google.com And you should see (something like): Tracing route to google.com [172.217.9.46] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms ea306-s1.memphis.edu [141.225.160.2] 2 <1 ms <1 ms <1 ms 10.0.160.5 3 <1 ms <1 ms <1 ms jo100-s1.memphis.edu [141.225.1.2] 4 1 ms <1 ms <1 ms 10.0.244.10 5 1 ms <1 ms <1 ms jo100-r4.memphis.edu [141.225.244.24] 6 86 ms 88 ms 101 ms xe-2-2-1.110.rtsw.chic.net.internet2.edu [64.57.21.97] 7 70 ms 75 ms 79 ms 74.125.49.147 8 397 ms 344 ms 585 ms 74.125.49.146 9 * * * Request timed out. 10 64 ms ms 57 ms 72.14.239.111 63 11 72 ms 73 ms 73 ms ord38s08-in-f14.1e100.net [172.217.9.46] Security Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer Malware Viruses Spyware Adware Firewall Phishing Pharming Antivirus software 6

Internet and Network Attacks Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Pages 185 187 Figure 10-4 2010: Discovering Computers Chapter 5 19 Computer Security Risks Pages 182-183 Figure 10-1 2010: Discovering Computers Chapter 5 20 University of Memphis Network 7

Network Login If you Bring your own device on campus, you will need to log into the network the network: Network Login On Windows and Mac machines you will need to follow instructions to install Safe Connect iprint To facilitate students wishing to print from their own computers, ITD has given access to print via iprint to many of the printers in labs and other locations around campus. Instructions 8

LiveSafe An emergency alert system on campus Informs you, via push message, of: University closings and delays Emergencies on campus Features Download Instructions Android Device ios UMWare UM Ware allows students to use SELECTED software from off campus http://umware.memphis.edu Blogs Students have access to create WordPress Blogs on their University Account https://blogs.memphis.edu 9

Using MyMemphis 28 Go to mymemphis 29 Type name and password 30 10

A good place to start is UofMOnline 31 UMdrive (file space accessible from anywhere with internet access) 32 For UMdrive Help http://www.memphis.edu/umtech/teaching/ umservices/umdrive.php You can give access to files placed on UMDrive to individuals and groups Many faculty use UMDrive to give students access to files 33 11

Library Search 34 Identity Management 35 12

Campus Email 37 Email Etiquette Always include a subject line and include your name if you think the person might not know who you are from your Email account name. Remember, without facial expressions and body language, written comments may be taken the wrong way. Be careful in wording your emails. Use standard fonts. Don t use all capital letters when typing; all caps is understood to be the equivalent of shouting. Do not send large attachments without permission. Special formatting such as centering, audio messages, tables, html, etc. should be avoided unless necessary to complete an assignment or other communication. Avoid using text messaging choppiness and use capital letters to start sentences. Other Email Notes Do not open email attachments (especially from people you do not know) VIRUSES! Use appropriate email account names (sending a resume via an account ilovegames@aol.com is a bad idea) When attaching a file, make sure the person you are sending has the program to open it (when in doubt PDF!) 13

One Last Note Once you put something on the internet (via facebook, email, etc) it is there forever do you really want an employer to see that picture of you at that party? Bibliography New Perspectives on Microsoft Office 2007, First Course, Windows XP Edition http://oc.course.com/np/office2007/firstcoursexp.cfm Class Notes for CGS1100, Prof. Robert W Janson, Florida Community College http://web.fccj.org/~rjanson/cgs1100/2007.2.internet.ppt University of Memphis - MyMemphis webpages https://my.memphis.edu/cp/home/displaylogin 14