The document discusses various topics relating to navigating the internet and communication protocols. It explains that TCP/IP is the set of protocols used to coordinate data transfer between networks and devices. It also describes HTTPS and SSL, noting that SSL encodes data with encryption keys to secure data transfer. The document provides an overview of how the web works, with personal computers connecting to web servers through browsers using protocols like HTTP and HTTPS. It emphasizes the importance of SSL for securing sensitive information like credit card transactions and medical records.
2. What is protocol?
Communication between networks or data
transfer between networks and computers
along internet
9/17/2012 8:33 AM 2
3. TCP/IP (Transmission Control Protocol/Internet Protocol)
TCP/IP is set of communication protocols used by Internet to coordinate
transfer of data that both the sending and receiving devices understand
Types of TCP/IP
HTTP (Hypertext Transfer Protocol)
When page has http:// then has HTTP protocol
HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)
Data will transfer securely (see green light)
Secure Sockets Layer (SSL) encodes data with encryption key so if data tampered will
know (data summation before and after same minus encryption key)
FTP (File Transfer Protocol)
9/17/2012 8:33 AM 3
4. What is SSL?
Secure Sockets Layer (SSL)
Has Public and Private Key
Public key used to encrypt data
Private Key used to decipher key
Handshake
Use Public key (encrypting data)
Data goes between client (personal computer) and web server
Use private key
Data goes back from web server to client
Encryption uses algorithm (complex math formula)
9/17/2012 8:33 AM 4
5. How does Web work?
Database
Web server (holds website) (Different Types
Of Databases:
Customer
Order, Sales,
Payment)
Security Problem Here if not SSL
Personal Computer (client)
9/17/2012 8:33 AM 5
6. Why is SSL important to us?
Secure information is important in the following areas:
Credit card transactions
Customer information
Medical records
9/17/2012 8:33 AM 6
7. Is it ok to do a commercial transaction on a
unsecure network?
NO
Possible Problems
Identity theft
Credit card problems
9/17/2012 8:33 AM 7
8. Browsers
Browsers use hyperlinks (colored links that lead
through page)
Types of Browsers
Internet Explorer
Mozilla Firefox
Google Chrome
Opera
Safari
9/17/2012 8:33 AM 8
9. Internet terms
Uniform Resource Locator—www.crowder.edu
Domain name—crowder.edu
Need to register Domain name so unique for business
Domain name can be important for marketing purposes
Internet Protocol (IP)—digits of domain name (198.209.44.251=crowder.edu)
Top-level domain—end part of domain name
.com
.net
.org
.edu
.gov
.mil
.info (unrestricted (for any purpose))
.tv (video or animation)
9/17/2012 8:33 AM 9
10. How to look up IP address
Can look up IP address by:
Whois database (http://www.whois.net/)
nslookup crowder.edu at command prompt
Whois database will tell:
Tell at whois if name is being used
Ping through whois website tells IP address
Can ping and tell IP address through going to Start Run at
bottom of screen/type CMD to bring DOS window then type
ping wikihow.com as example
9/17/2012 8:33 AM 10
11. Internet terms
Spyware type of software that is downloaded with game or legitimate
program that tracks browser habits or records keystrokes for userid and
password
Cookies—small text files that remember your shopping preferences or
login information (e.g. Hello, Mary Jones)
9/17/2012 8:33 AM 11
12. Generations of the Web?
Web 1.0 (“read-only” format)
Web 2.0 (Websites are interactive like
Facebook, YouTube)
Web 3.0 (2015 happened maybe) (Browsers will be
able to preview sites and give more accurate searching
based on a learning curve of your preferences so
searches direct you to more accurately to what you
like)
9/17/2012 8:33 AM 12
13. Internet Communication Words
Kbps (kilobytes per second)
Mbps (megabits/megabytes per second)—how fast
information travels; usually determine by ping test
Broadband—refers to speed and used in cable,
satellite, and wireless; can handle both voice and data
over channel
Bandwidth is rate of speed a signal travels over
through medium like cable or DSL
9/17/2012 8:33 AM 13
14. Types of Internet Connection
Dial-up (56 kbs)
Satellite (500Kbps)
Suffers from “rain fade” and latency (time it takes to bounce data off satellite and returned)
Wireless (cell phone) or Wi-Fi
Wireless Broadband
Tier Carrier (T-1, T-2, T-3, T-4, T-5) (each channel can carry both voice and data)
T-1 has 26 individual channels each carrying 64Kbps
T-3 has 672 individual channels at 64 Kbps therefore 43Mbps
T-5 is capable of 400 Mbps
DSL (128 Kbps to 8Mbps) two copper wires (1 talk 1 internet)
Cable
Optical Cable (Fiber Optic) (1Gbps)
Internet2 (100Gbps) for research and education
*** http://www.computertooslow.com/internet-connections.asp
9/17/2012 8:33 AM 14
15. Terms of Web
Upload (e.g. taking file up to SkyDrive)
Download (take file from website to downloads
directory on your own computer)
9/17/2012 8:33 AM 15
16. Download Safety
Downloads can be source of many viruses or spyware
Make sure have Windows Firewall on O/S on
Keep up on updates
Use anti-virus software that has spyware in it or separate
spyware
Spam filter on unwanted email
9/17/2012 8:33 AM 16
17. Selecting ISP (Internet Service Provider)
Good service and support (reliable service)
Contract Terms
Promotional rate and what after promotion
Price after contract
Service calls and cost if equipment fails
Security
Spam filter and antivirus protection
Email (need multiple emails for different family members)
Download and Upload Speeds
Any restrictions due to time of day of data uploads/downloads or
receive slowing down after downloading so much (e.g. AT&T)
9/17/2012 8:33 AM 17
18. Internet Search (Subject Directory or Search
Engine)
Subject Directory has links that are organized by subject and is
used in academic research
Infomine—manage subjects chosen by academic librarians from
University of California
Yahoo—commercial subject directory portal
Search Engine used for more narrow or obscure topics
Each search has a different top 10 usually because each company indexes
information of web pages differently
Partially secretive of how pages are index and how to get to coveted
Top 10 (important for marketing purposes)
You will get different search results on different search engines
9/17/2012 8:33 AM 18
19. Internet Search Engines
Types of Search Engine
Google
AltaVista
Ask
Bing
Dogpile
9/17/2012 8:33 AM 19
20. Key Search Words
Most companies use web crawlers, robots, spiders to
crawl through web pages looking for key search words
Key search words are indexed in table (complex
programs/systems doing this)
9/17/2012 8:33 AM 20
21. Tips for Internet Searching
Check spelling
Use more than one word but not more than eight words
Use quotation marks to force search to look for both words as opposed
to one or the other
e.g. “Monarch Butterfly” has to have both words together as opposed to
separately if monarch (Kings/Queens) butterfly (all types of butterflies)
Boolean Search or Advanced Search in Google
Use operators like AND, OR, and NOT to give specific searches like “Paris”
AND “Eiffel Tower” AND NOT “Louvre Museum” so searches only with
Paris and Eiffel Tower and no Louvre Museum
If need video or image then select from Google sidebar for video/image
or can type video: cpr or image: eiffel tower
9/17/2012 8:33 AM 21