SlideShare a Scribd company logo
1 of 48
INTERNET
www
HTTP
WEB
EMAIL
ISP
The Internet, Intranets, and
Extranets
The Internet
• The internet
– A network of networks
– The internet transmits data from one computer
(called a host) to another
• Internet networks
– Linked networks that work much the same way --
they pass data around in packets, each of which
carries the addresses of its sender and receiver
Schematic
Internet ‘Discussion’ (1)
A global network connecting millions of computers. As of 1999, the
Internet has more than 200 million users worldwide, and that number
is growing rapidly. More than 100 countries are linked into
exchanges of data, news and opinions.
Unlike online services, which are centrally controlled, the Internet is
decentralized by design. Each Internet computer, called a host, is
independent. Its operators can choose which Internet services to
use and which local services to make available to the global Internet
community. Remarkably, this anarchy by design works exceedingly
Internet ‘Discussion’ (2)
well.
There are a variety of ways to access the Internet. Most online
services, such as America Online, offer access to some Internet
services. It is also possible to gain access through a commercial
Internet Service Provider (ISP).
Note: Tanzania telle communication service CCS (Computer and
Communications Services) is an ISP.
How the Internet Works
• Transport control protocol (TCP)
• Backbone
• Uniform resource locator (URL)
Domain Affiliations
Domain Affiliations
arts cultural and entertainment activities
com business organizations
edu educational sites
firm businesses and firms
gov government sites
info information service providers
mil military sites
nom individuals
net networking organizations
org organizations
rec recreational activities
store businesses offering goods for purchase
web entities related to World Wide Web activities
net networking organizations
Access to the Internet
• LAN servers
• Local servers can provide access to the Internet through normal
connections (e.g., Ethernet)
• Serial line internet protocol (SLIP) and
Point-to-point protocol (PPP)
• Communications protocol software that transmits packets over
telephone lines, allowing dial-up access to the Internet
• Connection via an on-line service
• Examples are America Online and Microsoft Network. These
services usually require sign-up procedures
Three Ways to Access the
Internet
Schematic
Internet Service Providers
• Internet service provider (ISP)
– Any company that provides individuals or
companies with access to the Internet
– Thousands of providers including large
communications companies
– Need an account with the ISP and software that
links with TCP/IP
ISP Examples
Internet Service Provider Web Address
AT&T WorldNet Service www.att.com
Digex, Inc. www.digex.net
GTE Internetworking www.gte.net
IBM Internet Connection www.ibm.net
MCI Internet www.mci2000.com
NetCom On-Line Communication
Services
www.netcom.com
PSINet, Inc. www.psinet.com
Sprint Internet Services www.sprint.net
Uunet Technologies, Inc. www.us.uu.net
Internet Services
– E-mail
– Telnet
– FTP
– Usenet and newsgroups
– Chat rooms
– Internet phone
– Internet videoconferencing
– Content streaming
Selected Usenet Groups
alt.fan.addams.family alt.life.itself
alt.pets alt.fan.bevis-n-butthead
alt.autos.camaro alt.fan.leonardo-dicaprio
alt.cloning alt.history
alt.fan.u2 alt.music.blues
alt.sports.baseball.cinci-red alt.music.zz-top
alt.politics.socialism alt.sports.college.sec
alt.sports.soccer.european.uk
Internet Services
• Internet telephony
– Also called voice-over-IP (VOIP)
VOIP ‘Discussion’
Internet telephony is a category of hardware and software that
enables people to use the Internet as the transmission medium for
telephone calls. For users who have free, or fixed-price, Internet
access, Internet telephony software essentially provides free
telephone calls anywhere in the world. To date, however, Internet
telephony does not offer the same quality of telephone service as
direct telephone connections.
There are many Internet telephony applications available. Some,
like CoolTalk and NetMeeting, come bundled with popular Web
browsers. Others are stand-alone products. Internet telephony
products are sometimes called IP telephony, Voice over the
Internet (VOI) or Voice over IP (VOIP) products.
Content Streaming
• Content streaming
• A method for transferring multimedia files over the
Internet so that the data stream of voice and pictures
plays continuously, without a break, or very few of
them
• It also enables users to browse large files in real time
The World Wide Web
•World Wide Web (WWW)
WWW Terminology
• Home page
• The cover page for a Web site that has graphics, titles,
coloured text, etc.
• Hypermedia
• Tools that connect the data on Web pages, allowing
users to access topics in whatever order they wish
• Hypertext markup language (HTML)
• The standard page description language for Web pages
Some Interesting Web Sites
Library of Congress http://lcweb.loc.gov
PointCast http://www.pointcast.com
In-Box Direct http://www.netscape.com
Online Career Center http://occ.com
New York Times http://www.nytimes.com
Project Gutenberg http://www.gutenberg.org
Sportsline USA http://www.sportsline.com
White House http://www.whitehouse.gov
MIT Lab for Computer Science http://www.lcs.mit.edu
The Wall Street Journal http://www.wsj.com
WWW Terminology
• Web browser
• Software that creates a unique hypermedia-based
menu on your computer screen and provides a
graphical interface to the Web
• Web page
• A screen of information sent to a requesting user and
presented through a browser
• Applet
• A small program embedded in Web pages
HTML
• “The” language of WWW pages
– Need we say more!!!
Search Engines
• Search engines
– A search tool for the Web (like card catalogs in
libraries)
– E.g.,
Altavista http://www.altavista.digital.com
Excite http://www.excite.com
Galaxy http://www.einet.net
Hotbot http://www.hotbot.com
Infoseek http://www.infoseek.com
Lycos http://www.lycos.com
Webcrawler http://www.webcrawler.com
Yahoo! http://www.yahoo.com
Java
• Java
– An object-oriented programming language
– Developed by Sun Microsystems
– Based on C++
– Allows small programs -- applets -- to be
embedded within an HTML document
Applets
• Applets are small java programs that are
downloaded from the server to the local
machine
Push Technology
• Push technology
• Technology that enables users to automatically receive
information over the Internet rather than searching for
it using a browser
• Also called Webcasting
– E.g.,
• PointCast
• InterMind
Webcasting ‘Discussion’
Using the Internet, and the World Wide Web in particular, to
broadcast information. Unlike typical surfing, which relies on a pull
method of transferring Web pages, webcasting uses push
technologies.
Push ‘Discussion’ (1)
In client/server applications, to send data to a client without
the client requesting it. The World Wide Web is based on a pull
technology where the client browser must request a Web page
before it is sent. Broadcast media, on the other hand, are push
technologies because they send information out regardless of
whether anyone is tuned in.
Increasingly, companies are using the Internet to deliver information
push-style. One of the most successful examples of this is
PointCast, which delivers customized news to users' desktops.
Push ‘Discussion’ (2)
Probably the oldest and most widely used push technology is e-mail.
This is a push technology because you receive mail whether you ask
for it or not -- that is, the sender pushes the message to the
receiver.
Business Use of the Web
• Uses:
– Applications, E-mail, Product Display, Catalogs, Order
placement
• Products people are likely to buy on the Web
Software 77%
Books 67%
CDs 64%
Computer hardware 63%
Airline tickets 61%
Magazine subscriptions 53%
Concert/theater tickets 48%
Flowers 45%
Intranets and Extranets
• Intranet
• An internal corporate network built using Internet and
World Wide Web standards and products that allows
employees of an organization to gain access to
corporate information
• Extranet
• A network based on Web technologies that links
selected resources of the intranet of a company with its
customers, suppliers, or other business partners
Intranet ‘Discussion’
A network based on TCP/IP protocols (an internet) belonging to an
organization, usually a corporation, accessible only by the
organization's members, employees, or others with authorization. An
intranet's Web sites look and act just like any other Web sites, but
the firewall surrounding an intranet fends off unauthorized access.
Like the Internet itself, intranets are used to share information.
Secure intranets are now the fastest-growing segment of the
Internet because they are much less expensive to build and manage
than private networks based on proprietary protocols.
Extranet ‘Discussion’
A new buzzword that refers to an intranet that is partially
accessible to authorized outsiders. Whereas an intranet resides
behind a firewall and is accessible only to people who are members
of the same company or organization, an extranet provides various
levels of accessibility to outsiders. You can access an extranet only
if you have a valid username and password, and your identity
determines which parts of the extranet you can view.
Extranets are becoming a very popular means for business partners
to exchange information.
Firewall
• Firewall…
• A device that sits between your internal network and
the outside Internet and limits access into and out of
your network based on your organization’s access
policy
Virtual Private Network (VPN)
• Virtual Private Network (VPN)
• A secure connection between two points across the
Internet
• Tunneling
• The process by which VPNs transfer information by
encapsulating traffic in IP packets and sending the
packets over the Internet
Schematic
VPN ‘Discussion’
Short for virtual private network, a network that is constructed by
using public wires to connect nodes. For example, there are a
number of systems that enable you to create networks using the
Internet as the medium for transporting data. These systems use
encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data cannot
be intercepted.
Tunneling ‘Discussion’
A technology that enables one network to send its data via another
network's connections. Tunneling works by encapsulating a network
protocol within packets carried by the second network. For example,
Microsoft's PPTP technology enables organizations to use the
Internet to transmit data across a virtual private network (VPN). It
does this by embedding its own network protocol within the TCP/IP
packets carried by the Internet. (Note: PPTP = point-to-point tunneling
protocol)
Tunneling is also called encapsulation.
Internet Issues
• Management issues
– No centralized governing body for the Internet
• Service bottlenecks
– Phenomenal growth has left a service void
– Providers underestimating computing power
needed
– Reconciling router addresses needed to transverse
the network
Privacy & Security
• Cryptography
• The process of converting a message into a secret code and
changing the encoded message back to regular text
• Encryption
• The original conversion of a message into a secret code
• Digital Signature
• An encryption technique used for online financial transactions
Have a
nice day…
Have a
nice day…
Encryption
software
running on
sending
computer
Decryption
software
running on
Receiving
computer
E%$&:”}{|
…
Firewalls
• Firewalls
• A method of preventing unauthorized access between a
company’s computers and the Internet (looks at the
header of a packet)
• Assured pipeline
• An Internet security method that looks at the entire
request for data and then determines whether the
request is valid
Firewall ‘Discussion’ (1)
A system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and
software, or a combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet
the specified security criteria.
Firewall ‘Discussion’ (2)
There are several types of firewall techniques:
– Packet filter: Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult to configure. In addition,
it is susceptible to IP spoofing.
– Application gateway: Applies security mechanisms to specific applications,
such as FTP and Telnet servers. This is very effective, but can impose a
performance degradation.
– Circuit-level gateway: Applies security mechanisms when a TCP or UDP
connection is established. Once the connection has been made, packets can
flow between the hosts without further checking.
– Proxy server: Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
Firewall ‘Discussion’ (3)
In practice, many firewalls use two or more of these techniques in
concert.
A firewall is considered a first line of defense in protecting private
information. For greater security, data can be encrypted.
Asante
Thank you

More Related Content

What's hot

What's hot (17)

Intro to internet 1
Intro to internet 1Intro to internet 1
Intro to internet 1
 
Internet2007
Internet2007Internet2007
Internet2007
 
Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,Basics of internet, intranet, e mail,
Basics of internet, intranet, e mail,
 
Internet Technology Basics
Internet Technology BasicsInternet Technology Basics
Internet Technology Basics
 
Internet & www
Internet & wwwInternet & www
Internet & www
 
The Internet
The InternetThe Internet
The Internet
 
FYBSC IT Web Programming Unit I Introduction to Web Programming
FYBSC IT Web Programming Unit I  Introduction to Web ProgrammingFYBSC IT Web Programming Unit I  Introduction to Web Programming
FYBSC IT Web Programming Unit I Introduction to Web Programming
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Internet
InternetInternet
Internet
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Internet
InternetInternet
Internet
 
Internetnuovo1
Internetnuovo1Internetnuovo1
Internetnuovo1
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet features (2nd topic)
Internet features (2nd topic)Internet features (2nd topic)
Internet features (2nd topic)
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Introduction to Internet By Anamika
Introduction to Internet By AnamikaIntroduction to Internet By Anamika
Introduction to Internet By Anamika
 

Similar to Internet

Week two lecture
Week two lectureWeek two lecture
Week two lectureHarry Essel
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and ExtranetFellowBuddy.com
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)Amber Bhaumik
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptxreddragon32
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyDr. Jayarama Reddy
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetHimanshu Pathak
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfSeethaDinesh
 
Web Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesWeb Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesVigneshkumar Ponnusamy
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETArvin Dey
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnologygurchet
 
Introduction to computer lec (6)
Introduction to computer lec  (6)Introduction to computer lec  (6)
Introduction to computer lec (6)Samiullah Khan
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptxubaidullah75790
 

Similar to Internet (20)

Week two lecture
Week two lectureWeek two lecture
Week two lecture
 
Overview of Internet
Overview of InternetOverview of Internet
Overview of Internet
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
Unit 4
Unit 4Unit 4
Unit 4
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
NME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdfNME UNIT I & II MATERIAL.pdf
NME UNIT I & II MATERIAL.pdf
 
IS100 Week 5
IS100 Week 5IS100 Week 5
IS100 Week 5
 
Web Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesWeb Technologies Introduction to web technologies
Web Technologies Introduction to web technologies
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
INTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNETINTRODUCTION TO THE INTERNET
INTRODUCTION TO THE INTERNET
 
Web tehnology
Web tehnologyWeb tehnology
Web tehnology
 
Introduction to computer lec (6)
Introduction to computer lec  (6)Introduction to computer lec  (6)
Introduction to computer lec (6)
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Internet

  • 2. The Internet, Intranets, and Extranets
  • 3. The Internet • The internet – A network of networks – The internet transmits data from one computer (called a host) to another • Internet networks – Linked networks that work much the same way -- they pass data around in packets, each of which carries the addresses of its sender and receiver Schematic
  • 4.
  • 5. Internet ‘Discussion’ (1) A global network connecting millions of computers. As of 1999, the Internet has more than 200 million users worldwide, and that number is growing rapidly. More than 100 countries are linked into exchanges of data, news and opinions. Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly
  • 6. Internet ‘Discussion’ (2) well. There are a variety of ways to access the Internet. Most online services, such as America Online, offer access to some Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP). Note: Tanzania telle communication service CCS (Computer and Communications Services) is an ISP.
  • 7. How the Internet Works • Transport control protocol (TCP) • Backbone • Uniform resource locator (URL)
  • 8. Domain Affiliations Domain Affiliations arts cultural and entertainment activities com business organizations edu educational sites firm businesses and firms gov government sites info information service providers mil military sites nom individuals net networking organizations org organizations rec recreational activities store businesses offering goods for purchase web entities related to World Wide Web activities net networking organizations
  • 9. Access to the Internet • LAN servers • Local servers can provide access to the Internet through normal connections (e.g., Ethernet) • Serial line internet protocol (SLIP) and Point-to-point protocol (PPP) • Communications protocol software that transmits packets over telephone lines, allowing dial-up access to the Internet • Connection via an on-line service • Examples are America Online and Microsoft Network. These services usually require sign-up procedures
  • 10. Three Ways to Access the Internet Schematic
  • 11.
  • 12. Internet Service Providers • Internet service provider (ISP) – Any company that provides individuals or companies with access to the Internet – Thousands of providers including large communications companies – Need an account with the ISP and software that links with TCP/IP
  • 13. ISP Examples Internet Service Provider Web Address AT&T WorldNet Service www.att.com Digex, Inc. www.digex.net GTE Internetworking www.gte.net IBM Internet Connection www.ibm.net MCI Internet www.mci2000.com NetCom On-Line Communication Services www.netcom.com PSINet, Inc. www.psinet.com Sprint Internet Services www.sprint.net Uunet Technologies, Inc. www.us.uu.net
  • 14. Internet Services – E-mail – Telnet – FTP – Usenet and newsgroups – Chat rooms – Internet phone – Internet videoconferencing – Content streaming
  • 15. Selected Usenet Groups alt.fan.addams.family alt.life.itself alt.pets alt.fan.bevis-n-butthead alt.autos.camaro alt.fan.leonardo-dicaprio alt.cloning alt.history alt.fan.u2 alt.music.blues alt.sports.baseball.cinci-red alt.music.zz-top alt.politics.socialism alt.sports.college.sec alt.sports.soccer.european.uk
  • 16. Internet Services • Internet telephony – Also called voice-over-IP (VOIP)
  • 17.
  • 18. VOIP ‘Discussion’ Internet telephony is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls. For users who have free, or fixed-price, Internet access, Internet telephony software essentially provides free telephone calls anywhere in the world. To date, however, Internet telephony does not offer the same quality of telephone service as direct telephone connections. There are many Internet telephony applications available. Some, like CoolTalk and NetMeeting, come bundled with popular Web browsers. Others are stand-alone products. Internet telephony products are sometimes called IP telephony, Voice over the Internet (VOI) or Voice over IP (VOIP) products.
  • 19. Content Streaming • Content streaming • A method for transferring multimedia files over the Internet so that the data stream of voice and pictures plays continuously, without a break, or very few of them • It also enables users to browse large files in real time
  • 20. The World Wide Web •World Wide Web (WWW)
  • 21. WWW Terminology • Home page • The cover page for a Web site that has graphics, titles, coloured text, etc. • Hypermedia • Tools that connect the data on Web pages, allowing users to access topics in whatever order they wish • Hypertext markup language (HTML) • The standard page description language for Web pages
  • 22. Some Interesting Web Sites Library of Congress http://lcweb.loc.gov PointCast http://www.pointcast.com In-Box Direct http://www.netscape.com Online Career Center http://occ.com New York Times http://www.nytimes.com Project Gutenberg http://www.gutenberg.org Sportsline USA http://www.sportsline.com White House http://www.whitehouse.gov MIT Lab for Computer Science http://www.lcs.mit.edu The Wall Street Journal http://www.wsj.com
  • 23. WWW Terminology • Web browser • Software that creates a unique hypermedia-based menu on your computer screen and provides a graphical interface to the Web • Web page • A screen of information sent to a requesting user and presented through a browser • Applet • A small program embedded in Web pages
  • 24. HTML • “The” language of WWW pages – Need we say more!!!
  • 25. Search Engines • Search engines – A search tool for the Web (like card catalogs in libraries) – E.g., Altavista http://www.altavista.digital.com Excite http://www.excite.com Galaxy http://www.einet.net Hotbot http://www.hotbot.com Infoseek http://www.infoseek.com Lycos http://www.lycos.com Webcrawler http://www.webcrawler.com Yahoo! http://www.yahoo.com
  • 26. Java • Java – An object-oriented programming language – Developed by Sun Microsystems – Based on C++ – Allows small programs -- applets -- to be embedded within an HTML document
  • 27. Applets • Applets are small java programs that are downloaded from the server to the local machine
  • 28. Push Technology • Push technology • Technology that enables users to automatically receive information over the Internet rather than searching for it using a browser • Also called Webcasting – E.g., • PointCast • InterMind
  • 29. Webcasting ‘Discussion’ Using the Internet, and the World Wide Web in particular, to broadcast information. Unlike typical surfing, which relies on a pull method of transferring Web pages, webcasting uses push technologies.
  • 30. Push ‘Discussion’ (1) In client/server applications, to send data to a client without the client requesting it. The World Wide Web is based on a pull technology where the client browser must request a Web page before it is sent. Broadcast media, on the other hand, are push technologies because they send information out regardless of whether anyone is tuned in. Increasingly, companies are using the Internet to deliver information push-style. One of the most successful examples of this is PointCast, which delivers customized news to users' desktops.
  • 31. Push ‘Discussion’ (2) Probably the oldest and most widely used push technology is e-mail. This is a push technology because you receive mail whether you ask for it or not -- that is, the sender pushes the message to the receiver.
  • 32. Business Use of the Web • Uses: – Applications, E-mail, Product Display, Catalogs, Order placement • Products people are likely to buy on the Web Software 77% Books 67% CDs 64% Computer hardware 63% Airline tickets 61% Magazine subscriptions 53% Concert/theater tickets 48% Flowers 45%
  • 33. Intranets and Extranets • Intranet • An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information • Extranet • A network based on Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners
  • 34. Intranet ‘Discussion’ A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access. Like the Internet itself, intranets are used to share information. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols.
  • 35. Extranet ‘Discussion’ A new buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view. Extranets are becoming a very popular means for business partners to exchange information.
  • 36. Firewall • Firewall… • A device that sits between your internal network and the outside Internet and limits access into and out of your network based on your organization’s access policy
  • 37. Virtual Private Network (VPN) • Virtual Private Network (VPN) • A secure connection between two points across the Internet • Tunneling • The process by which VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet Schematic
  • 38.
  • 39. VPN ‘Discussion’ Short for virtual private network, a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
  • 40. Tunneling ‘Discussion’ A technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft's PPTP technology enables organizations to use the Internet to transmit data across a virtual private network (VPN). It does this by embedding its own network protocol within the TCP/IP packets carried by the Internet. (Note: PPTP = point-to-point tunneling protocol) Tunneling is also called encapsulation.
  • 41. Internet Issues • Management issues – No centralized governing body for the Internet • Service bottlenecks – Phenomenal growth has left a service void – Providers underestimating computing power needed – Reconciling router addresses needed to transverse the network
  • 42. Privacy & Security • Cryptography • The process of converting a message into a secret code and changing the encoded message back to regular text • Encryption • The original conversion of a message into a secret code • Digital Signature • An encryption technique used for online financial transactions
  • 43. Have a nice day… Have a nice day… Encryption software running on sending computer Decryption software running on Receiving computer E%$&:”}{| …
  • 44. Firewalls • Firewalls • A method of preventing unauthorized access between a company’s computers and the Internet (looks at the header of a packet) • Assured pipeline • An Internet security method that looks at the entire request for data and then determines whether the request is valid
  • 45. Firewall ‘Discussion’ (1) A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  • 46. Firewall ‘Discussion’ (2) There are several types of firewall techniques: – Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. – Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. – Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. – Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
  • 47. Firewall ‘Discussion’ (3) In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.

Editor's Notes

  1. Transport control protocol (TCP) A protocol that operates at the transport layer and is used in combination with IP by most Internet applications Backbone An Internet high-speed, long distance communications links (like a bus; wire that connects nodes) Uniform resource locator (URL) An assigned address on the Internet for each computer E.g., http://www.yorku.ca/
  2. Internet telephony Also called voice-over-IP (VOIP) Technology that enables network managers to route phone calls and fax transmissions over the same network they use for data
  3. World Wide Web A collection of tens of thousands of independently-owned computers that work together as one in an Internet service
  4. Home page The cover page for a Web site that has graphics, titles, coloured text, etc. Hypermedia Tools that connect the data on Web pages, allowing users to access topics in whatever order they wish Hypertext markup language (HTML) The standard page description language for Web pages
  5. Intranet An internal corporate network built using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information Extranet A network based on Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners