Introduction to Internet


Published on

1.Connecting to Internet
2.Defining Internet
3.Emailing on Internet
4.Abuse of Internet

1 Comment
  • its very impressive presentation
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Introduction to Internet

  1. 1. Introduction to Internet Presented by Sameera Kishore
  2. 2. A Brief History of Internet <ul><li>Started by the Department of Defense, was called the ARPANET project in 1969. </li></ul><ul><li>The Internet is the largest computer network in the world, connecting millions of computers. A network is a group of two or more computer systems linked together. </li></ul>
  3. 3. Internet Growth Trends 1977: 111 hosts on Internet 1981: 213 hosts 1983: 562 hosts 1984: 1,000 hosts 1986: 5,000 hosts 1987: 10,000 hosts 1989: 100,000 hosts 1992: 1,000,000 hosts 2001: 150 – 175 million hosts 2002: over 200 million hosts By 2010, about 80% of the planet will be on the Internet
  5. 5. NARROW BAND BROAD BAND CONNECTING TO INTERNET <ul><li>An ISP may offer either narrow band or broad band connection (or both). </li></ul><ul><li>Band width refers to the amount of data that can be sent via modem or </li></ul><ul><li>network connections measured in bits–per-second. </li></ul>45% 55% Jan ‘05 32% 68% March ’06 Narrow band Users Broad band Users Year
  6. 6. Simple Mail Transfer Protocol ( SMTP ) : It is the protocol used to send email messages from one server to another. Post Office Protocol ( POP3 ): It stores the messages for the recipient. To retrieve the messages, the user must connect to it using email client or the online email service IMAP: It enables a user to check email from multiple computers at different locations.
  7. 7. You need broadband to: <ul><li>Watch videos on Net. </li></ul><ul><li>Faster Uploads. </li></ul><ul><li>Voice over IP. </li></ul><ul><li>Video conferencing. </li></ul><ul><li>Send and Receive large files. </li></ul><ul><li>Get Online Faster </li></ul>5 mins 62.4 mins Upgrade Software ( 25 MB ) 47 seconds 9.9 mins MP3 file ( 4MB ) 11 seconds 2.5 mins Video Clip ( 1 MB) 5 seconds 1.5 mins Digital image (.5 MB) Broadband Dial-up File Download
  8. 8. DEFINITIONS <ul><li>DOMAIN NAME </li></ul><ul><li>DOMAIN NAME SYSTEM ( DNS ) </li></ul><ul><li>FILE TRANSFER PROTOCOL (FTP) </li></ul><ul><li>HYPERTEXT TRANSFER PROTOCOL ( HTTP ) </li></ul><ul><li>HYPERTEXT MARKUP LANGUAGE ( HTML ) </li></ul><ul><li>UNIFORM RESOURCE LOCATOR ( URL ) </li></ul><ul><li>SIMPLE MAIL TRANSFER PROTOCOL ( SMTP ) </li></ul><ul><li>POST OFFICE PROTOCOL ( POP ) </li></ul>
  9. 9. WHAT HAPPENS WHEN WE – EMAIL ?!?! An email is a text message sent to a recipient using email clients such as Microsoft outlook, Juno client or online email services such as Yahoo & Gmail.
  10. 10. DOMAIN NAME SYSTEM (or Service or Server) <ul><li>It is the way that internet domain names are located and translated to IP addresses . </li></ul>
  11. 11. domain name <ul><li>Names used in URL's and corresponding to one or more IP addresses. </li></ul><ul><li>The basic purpose of domain name is to provide easily recognizable names to the numerically addressed internet resources </li></ul>What is a Fully Qualified Domain Name ? example: Top Level Domain User Specific Domain Sub Domain
  12. 12. File Transfer Protocol (FTP) <ul><li>A common protocol that facilitates transferring any type of electronic files over the Web. </li></ul>Hypertext Transfer Protocol (HTTP) <ul><li>The protocol computers use to transmit Web documents </li></ul><ul><li>between computers, identified by the prefix &quot;http://&quot; of the </li></ul><ul><li>URL. </li></ul>Internet Protocol (IP Address ) <ul><li>The numerical identifier for a computer connected to a TCP/IP </li></ul><ul><li>network, such as the Internet. </li></ul>Uniform Resource Locator ( URL ) <ul><li>It specifies the address of a web page. </li></ul><ul><li>e.g: </li></ul>
  14. 14. Is your computer spewing SPAM???? Spam or Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited messages. Email Spam is the practice of sending unwanted email messages frequently with commercial content, in large quantities to an indiscriminate set of recipients. EMAIL SPAM Unsolicited Bulk Email Unsolicited Commercial Email
  15. 15. Examples of SPAM <ul><li>Make money Fast Chain Letters Spam. </li></ul><ul><li>A-pound a- day diet Spam. </li></ul><ul><li>Just Read this ! Spam's containing long, winding messages. </li></ul><ul><li>Fake Anti Spam Sites. </li></ul>Fight against SPAM <ul><li>Coalition Against Unsolicited Commercial </li></ul><ul><li>E mail ( CAUCE ). </li></ul><ul><li>National Fraud Information Center (NFIC) </li></ul><ul><li> </li></ul>
  16. 16. SCAM Scams are emails cleverly disguised as coming from real companies when they are actually trying to know your private information such as passport number, bank account, social security number etc. Again, it is one of the most common problems faced by Internet users . Work-at-home scams Nigerian scams Lottery scams Phisher scams
  17. 17. VIRUS : A computer virus is a small piece of software that attaches itself to a program or a file enabling it to spread from one computer to another <ul><li>HOW DO I KNOW IF THE COMPUTER HAS VIRUS?!?! </li></ul><ul><li>The computer runs slower than usual. </li></ul><ul><li>The computer stops responding or locks up frequently </li></ul><ul><li>The computer restarts on its own. </li></ul><ul><li>Applications on the computer so not work correctly or are inaccessible. </li></ul><ul><li>It shows unusual error messages. </li></ul><ul><li>It shows distorted menus and dialog boxes </li></ul><ul><li>An antivirus program is disabled for no reason, and it cannot be restarted. </li></ul><ul><li>A program disappears from your computer. </li></ul><ul><li>Strange sounds play from the speaker unexpectedly </li></ul><ul><li>New icons appear on the desktop </li></ul>E.g. of Virus : Melissa. A, Anti EXE, Trj.Reboot, Word Concept .
  18. 18. WORM <ul><li>A worm is a self-replicating computer program or software applications designed to spread via networks. It uses a network to send out copies of itself. </li></ul><ul><li>Examples of Worm: </li></ul><ul><li>Nuwar OL Worm- Nuwar OL is delivered to a user's inbox with subjects like </li></ul><ul><li>&quot;You Are In My Dreams,&quot; &quot;I Love You So Much,&quot; &quot;Inside My Heart Is You,&quot; etc. </li></ul><ul><li>To disguises its activity, the worm redirects you to simple web page with the </li></ul><ul><li>theme of a romantic greeting card. Once the computer is infected, the infection </li></ul><ul><li>spreads by sending messages to names in the user's contact folder. </li></ul><ul><li>Valentin E Worm- It is also distributed via email. This worm also includes an </li></ul><ul><li>attached file called ‘friends4U’. When the user opens the attachment, a copy </li></ul><ul><li>of the worm gets downloaded onto their computer </li></ul>
  19. 19. Trojan Horse <ul><li>Trojan horse is a destructive program that disguises itself as a real application. </li></ul><ul><li>This is a type of virus that attempts to make the user think that it is a beneficial application. </li></ul>Well-known Trojan horses: Back Orifice Back Orifice 2000 Netbus Subseven Downloader- EV
  20. 20. THANK YOU! ?