SlideShare a Scribd company logo
Introduction to Information Technology 
Turban, Rainer and Potter 
John Wiley & Sons, Inc. 
Copyright 2005
Internet Basics
Chapter Outline 
What is the Internet 
Operation of the Internet 
Service Provided by the Internet 
The word wide web 
Internet challenges 
intranets 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 3
Learning Objectives 
Describe what the Internet is, how it works – 
(including the role of the TCP/IP protocol ), and how 
users connect to it 
Describe the capabilities that the internet, offers to 
users. 
Describe the word wide web and differentiate it from 
the Internet. 
Identify and briefly describe the management 
challenges caused by the Internet. 
Define the term intranet and discuss how intranets 
are used by businesses. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 4
TG5.1 What is the Internet (‘’The Net’’) 
 The massive network that connect s 
computer networks of businesses, 
organizations, government agencies, and 
schools around the world, quickly, 
seamlessly, and inexpensively. 
 Nodes. Computing devices that are 
connected to a network, including the 
Internet. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 5
The evolution of the Internet 
Started as an experimental project of advanced research project 
agency (ARPA) of the U.S. department of defence in 1969 to test 
the feasibility of a wide area computer network over which 
researches, educators, military personnel and government agencies 
could share exchange message and transfer files. 
From four nodes at its beginning, the Internet has grown to million of 
nodes today . The major growth occurred after commercial 
organizations were allowed to join ARPA net, which was renamed 
the Internet in 1993. There are over 500 million Internet users today. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 6
The future of the Internet 
Internet2. A new, faster telecommunications network 
with limited access devoted exclusively to research 
purposes 
Next-Generation Internet (NGI). A multiagency, U.S. 
federal government research and development 
program that is developing revolutionary 
applications that require advanced networking. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 7
vBNC (Very-High-Speed Back-bone 
Network Service) 
 A high speed network designed to support 
the academic Internet2 and the government-sponsored 
Next-Generation Internet (NGI) 
initiative. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 8
TG 5.2 The operation of the Internet 
Internet Protocol (IP). The set of rules used to 
send and receive packets from one machine to 
another over the Internet. 
Internet service providers (ISPs). Companies that 
provide Internet connection for a fee. 
Internet kiosks. terminals for public use 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 9
Various ways that you can connect the Internet 
Connecting via LAN Server. 
Connecting via serial line Internet 
Protocol /point-to-point protocol. 
Connecting via an online service. 
Connecting via the Television. 
Connecting via other means. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 10
Ad dresses on the Internet 
IP address. An assigned address that uniquely 
identifies a computer on the Internet. 
Domain name system (DNS). The system 
administered, by the Internet corporation for 
assigned names (ICANN), that assigns names to 
each site on the Internet. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 11
Domain name. The name assigned to an Internet 
site, consisting of multiple parts, separated by dots, 
which are translated from right to left. 
Top-level specification (zone). The rightmost part of 
an Internet name, indicating the type of organization 
that owns the site. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 12
Example: Consider the domain name 
software.ibm.com. The rightmost part of an Internet 
name is its top-level specification, or the zone. It 
designates the type of organization that owns the 
site . The letters ‘’com’’ in software.ibm.com. 
Indicate that this is a commercial site. There are 18 
other-top-level specifications, the last six of which 
are under consideration at this time . 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 13
The 19 top-level specification are as follows: 
com commercial site. 
edu educational site. 
Mil military site. 
Gov government site 
Net networking site 
Org organizations 
Firm business and firms 
Store business and offering goods for purchase 
Info information service providers 
Web entities related to world wide web activities. 
Arts cultural and entertainment activities, 
Rec recreational activities 
Nom individuals 
Areo air-transport industry 
Biz businesses 
Coop cooperatives 
Museum museums 
Name registration by individuals 
Pro accountants, lawyers, physicians. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 14
TG5.3 Services provided by the Internet 
The Internet provides a variety of services: 
Discovery services. Involve browsing and information 
retrieval, and provide customers the ability to find, view, 
download, and process information. 
Communication services. Range from messages posted 
on electronic bulletin boards to complex information 
exchange among many organizations. 
Collaboration services. Among individuals and groups as 
well as collaboration among organizations. 
Web services. Self-contained business/ consumer 
modular applications delivered over the Internet. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 15
TG5.4 The World Wide Web (WWW) 
The Internet and word wide web are not the same 
thing. The Internet functions as a transport 
mechanism, and the WWW is an application that 
uses those transport functions. 
The Web (World Wide Web). System with 
universally accepted standards for storing, 
retrieving, formatting, and displaying information 
via a client/ server architecture; uses the transport 
functions of the Internet 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 16
 Hypertext Markup Language (HTML). 
Programming language used on the web, 
which formats Documents and incorporates 
dynamic hypertext links to other documents 
stored on computers. 
 Standard Generalized Markup Language 
(SGML). Text-based programming language 
for describing the content and structure of 
digital documents; the language from which 
HTML was developed . 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 17
Home page. A text and graphical screen 
display that welcomes users and explains the 
organization that has established the page. 
Web site. Collectively, all of the web pages of 
a particular company or individual. 
Webmaster. The person in charge of an 
organization’s web site. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 18
Uniform resource locator (URL). Set of letters that 
identify the address of a specific resource on the 
web. 
Hypertext transport protocol (HTTP). The 
communications standard used to transfer pages 
across the WWW portion of the Internet; defines 
how messages are formatted and transmitted. 
Browsers. Software applications through which 
users primarily access the web. 
Surfing. The process of navigating around the Web 
by pointing and clicking a Web browser. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 19
TG5.5 Internet challenges 
Internet regulation 
Internet expansion 
Internet privacy 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 20
TG5.6 Intranets 
 A private network that uses Internet software 
and TCP/IP protocols. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 21
Security 
Public key security. Procedures used to 
protect intranets from outside intrusion. 
Encryption. The process of scrambling 
outgoing data to make them indecipherable to 
outsiders. 
Digital certificate. Electronic identification card 
that give validate access to an intranet. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 22
Security cont… 
Firewall. A device located between a firm’s 
internal network and external networks 
(specifically, the Internet), to regulate access 
into and out of a company ‘s network. 
Assured pipeline. A security device that 
examine an entire request for data and then 
determines whether the request is valid. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 23
All rights reserved. Reproduction or translation of this 
work beyond that permitted in section 117 of the United 
States Copyright Act without express permission of the 
copyright owner is unlawful. Request for information 
should be addressed to the permission department, John 
Wiley & Sons, Inc. The purchaser may make back-up 
copies for his/her own use only and not for distribution or 
resale. The publisher assumes no responsibility for error, 
omissions, or damages caused by the use of these 
programs or from the use of the information herein. 
“ Copyright 2005 John Wiley & Sons Inc.” TG 5 24

More Related Content

What's hot

ICANN & its role in controlling domain name
ICANN & its role in controlling domain nameICANN & its role in controlling domain name
ICANN & its role in controlling domain name
Abhimanyu Singh
 
Introduction to ISOC and ICANN
Introduction to ISOC and ICANNIntroduction to ISOC and ICANN
Introduction to ISOC and ICANN
Olivier MJ Crépin-Leblond
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
Louise Spiteri
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
Luis Taveras EMBA, MS
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
Louise Spiteri
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
UNIVERSITAS TEKNOKRAT INDONESIA
 
Class module 4- itm
Class module 4- itmClass module 4- itm
Class module 4- itm
sumarampurmath
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
Zarrar Siddiqui
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
Habib Noroozi
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
Prof. (Dr.) Tabrez Ahmad
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
GrittyCC
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nine
Shaheen Khan
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
Nicholas Davis
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
UNIVERSITAS TEKNOKRAT INDONESIA
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
Trevor Fox
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
Nicole Black
 

What's hot (20)

ICANN & its role in controlling domain name
ICANN & its role in controlling domain nameICANN & its role in controlling domain name
ICANN & its role in controlling domain name
 
Introduction to ISOC and ICANN
Introduction to ISOC and ICANNIntroduction to ISOC and ICANN
Introduction to ISOC and ICANN
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Class module 4- itm
Class module 4- itmClass module 4- itm
Class module 4- itm
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Copyright Protection
Copyright ProtectionCopyright Protection
Copyright Protection
 
Cibm workshop2 chapter nine
Cibm  workshop2 chapter nineCibm  workshop2 chapter nine
Cibm workshop2 chapter nine
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 

Viewers also liked

Susu Kedelai Bubuk Melilea
Susu Kedelai Bubuk MelileaSusu Kedelai Bubuk Melilea
Susu Kedelai Bubuk Melilea
Rickybram
 
The Nervous System
The Nervous SystemThe Nervous System
The Nervous System
kaleighbishop
 
что такое Sppl?
что такое Sppl?что такое Sppl?
что такое Sppl?
Суперлюди
 
Susu Kedelai Bubuk Melilea
Susu Kedelai Bubuk MelileaSusu Kedelai Bubuk Melilea
Susu Kedelai Bubuk Melilea
Rickybram
 
Tg01
Tg01Tg01
Tg01
Irwan9407
 
Curso formacion de tutores y moderacion de grupos
Curso formacion de tutores y moderacion de gruposCurso formacion de tutores y moderacion de grupos
Curso formacion de tutores y moderacion de grupos
marcela pizarro
 
soho majestic point serpong
soho majestic point serpongsoho majestic point serpong
soho majestic point serpong
Rickybram
 
Tg03
Tg03Tg03
Tg03
Irwan9407
 
Tg02
Tg02Tg02
Tg02
Irwan9407
 
Production of my mag
Production of my magProduction of my mag
Production of my mag
SFolayan
 
Tg06
Tg06Tg06
Tg06
Irwan9407
 
Indigenous technical knowledge and formulations of ugali and uji in Kenya
Indigenous technical knowledge and formulations of ugali and uji in KenyaIndigenous technical knowledge and formulations of ugali and uji in Kenya
Indigenous technical knowledge and formulations of ugali and uji in Kenya
George Wafula
 
100 coin gift
100 coin gift100 coin gift
100 coin gift
Суперлюди
 
Grand cianjur
Grand cianjurGrand cianjur
Grand cianjur
Rickybram
 
Filip Vest - Sharing is Caring
Filip Vest - Sharing is CaringFilip Vest - Sharing is Caring
Filip Vest - Sharing is Caring
Filip Vest
 
Special Senses: The Eye and Ear
Special Senses: The Eye and EarSpecial Senses: The Eye and Ear
Special Senses: The Eye and Ear
kaleighbishop
 
Tg04
Tg04Tg04
Tg04
Irwan9407
 
keberkesanan-kaedah-pengajaran-berbantukan-komputer
 keberkesanan-kaedah-pengajaran-berbantukan-komputer keberkesanan-kaedah-pengajaran-berbantukan-komputer
keberkesanan-kaedah-pengajaran-berbantukan-komputermihahsayang
 

Viewers also liked (18)

Susu Kedelai Bubuk Melilea
Susu Kedelai Bubuk MelileaSusu Kedelai Bubuk Melilea
Susu Kedelai Bubuk Melilea
 
The Nervous System
The Nervous SystemThe Nervous System
The Nervous System
 
что такое Sppl?
что такое Sppl?что такое Sppl?
что такое Sppl?
 
Susu Kedelai Bubuk Melilea
Susu Kedelai Bubuk MelileaSusu Kedelai Bubuk Melilea
Susu Kedelai Bubuk Melilea
 
Tg01
Tg01Tg01
Tg01
 
Curso formacion de tutores y moderacion de grupos
Curso formacion de tutores y moderacion de gruposCurso formacion de tutores y moderacion de grupos
Curso formacion de tutores y moderacion de grupos
 
soho majestic point serpong
soho majestic point serpongsoho majestic point serpong
soho majestic point serpong
 
Tg03
Tg03Tg03
Tg03
 
Tg02
Tg02Tg02
Tg02
 
Production of my mag
Production of my magProduction of my mag
Production of my mag
 
Tg06
Tg06Tg06
Tg06
 
Indigenous technical knowledge and formulations of ugali and uji in Kenya
Indigenous technical knowledge and formulations of ugali and uji in KenyaIndigenous technical knowledge and formulations of ugali and uji in Kenya
Indigenous technical knowledge and formulations of ugali and uji in Kenya
 
100 coin gift
100 coin gift100 coin gift
100 coin gift
 
Grand cianjur
Grand cianjurGrand cianjur
Grand cianjur
 
Filip Vest - Sharing is Caring
Filip Vest - Sharing is CaringFilip Vest - Sharing is Caring
Filip Vest - Sharing is Caring
 
Special Senses: The Eye and Ear
Special Senses: The Eye and EarSpecial Senses: The Eye and Ear
Special Senses: The Eye and Ear
 
Tg04
Tg04Tg04
Tg04
 
keberkesanan-kaedah-pengajaran-berbantukan-komputer
 keberkesanan-kaedah-pengajaran-berbantukan-komputer keberkesanan-kaedah-pengajaran-berbantukan-komputer
keberkesanan-kaedah-pengajaran-berbantukan-komputer
 

Similar to Tg05

Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
Zain Ul Abedeen
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
Zain Ul Abedeen
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
David Phillips
 
Internet and computer are your future
Internet and computer are your futureInternet and computer are your future
Internet and computer are your future
Tallat Satti
 
Internet Awareness
Internet AwarenessInternet Awareness
Internet Awareness
Ousman Faal
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
Usama ahmad
 
It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,
ssuserd93c47
 
Itc lec 6 introduction of internet
Itc lec 6 introduction of internetItc lec 6 introduction of internet
Itc lec 6 introduction of internet
AnzaDar3
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
HaroonButt18
 
Internet.
Internet.Internet.
Internet.
Rohit Kumar
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
SHRIBALAJIINFOTECH
 
IT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_IIT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_I
Palani Kumar
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
FellowBuddy.com
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
chris30931
 
IT8005_EC_Unit_I.ppt
IT8005_EC_Unit_I.pptIT8005_EC_Unit_I.ppt
IT8005_EC_Unit_I.ppt
HODITKNCET
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
Osama Yousaf
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
VNSGU
 
Old Article! Jan 2000 - Information Management
Old Article! Jan 2000 - Information ManagementOld Article! Jan 2000 - Information Management
Old Article! Jan 2000 - Information Management
Dave Lewand
 

Similar to Tg05 (20)

Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
 
Why learn about the internet 7
Why learn about the internet 7Why learn about the internet 7
Why learn about the internet 7
 
The Internet and the Law
The Internet and the LawThe Internet and the Law
The Internet and the Law
 
Internet and computer are your future
Internet and computer are your futureInternet and computer are your future
Internet and computer are your future
 
Internet Awareness
Internet AwarenessInternet Awareness
Internet Awareness
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,It for management on demand strategies for performance, growth,
It for management on demand strategies for performance, growth,
 
Itc lec 6 introduction of internet
Itc lec 6 introduction of internetItc lec 6 introduction of internet
Itc lec 6 introduction of internet
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
 
Internet.
Internet.Internet.
Internet.
 
W 11 internet & www
W 11 internet & wwwW 11 internet & www
W 11 internet & www
 
PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2PPT on MS-CIT Unit-2
PPT on MS-CIT Unit-2
 
IT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_IIT_8005_Electronic Commerce_Unit_I
IT_8005_Electronic Commerce_Unit_I
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
2 internet essentials
2 internet essentials2 internet essentials
2 internet essentials
 
IT8005_EC_Unit_I.ppt
IT8005_EC_Unit_I.pptIT8005_EC_Unit_I.ppt
IT8005_EC_Unit_I.ppt
 
Introduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPTIntroduction to Information Technology Lecture Slides PPT
Introduction to Information Technology Lecture Slides PPT
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Old Article! Jan 2000 - Information Management
Old Article! Jan 2000 - Information ManagementOld Article! Jan 2000 - Information Management
Old Article! Jan 2000 - Information Management
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Tg05

  • 1. Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
  • 3. Chapter Outline What is the Internet Operation of the Internet Service Provided by the Internet The word wide web Internet challenges intranets “ Copyright 2005 John Wiley & Sons Inc.” TG 5 3
  • 4. Learning Objectives Describe what the Internet is, how it works – (including the role of the TCP/IP protocol ), and how users connect to it Describe the capabilities that the internet, offers to users. Describe the word wide web and differentiate it from the Internet. Identify and briefly describe the management challenges caused by the Internet. Define the term intranet and discuss how intranets are used by businesses. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 4
  • 5. TG5.1 What is the Internet (‘’The Net’’)  The massive network that connect s computer networks of businesses, organizations, government agencies, and schools around the world, quickly, seamlessly, and inexpensively.  Nodes. Computing devices that are connected to a network, including the Internet. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 5
  • 6. The evolution of the Internet Started as an experimental project of advanced research project agency (ARPA) of the U.S. department of defence in 1969 to test the feasibility of a wide area computer network over which researches, educators, military personnel and government agencies could share exchange message and transfer files. From four nodes at its beginning, the Internet has grown to million of nodes today . The major growth occurred after commercial organizations were allowed to join ARPA net, which was renamed the Internet in 1993. There are over 500 million Internet users today. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 6
  • 7. The future of the Internet Internet2. A new, faster telecommunications network with limited access devoted exclusively to research purposes Next-Generation Internet (NGI). A multiagency, U.S. federal government research and development program that is developing revolutionary applications that require advanced networking. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 7
  • 8. vBNC (Very-High-Speed Back-bone Network Service)  A high speed network designed to support the academic Internet2 and the government-sponsored Next-Generation Internet (NGI) initiative. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 8
  • 9. TG 5.2 The operation of the Internet Internet Protocol (IP). The set of rules used to send and receive packets from one machine to another over the Internet. Internet service providers (ISPs). Companies that provide Internet connection for a fee. Internet kiosks. terminals for public use “ Copyright 2005 John Wiley & Sons Inc.” TG 5 9
  • 10. Various ways that you can connect the Internet Connecting via LAN Server. Connecting via serial line Internet Protocol /point-to-point protocol. Connecting via an online service. Connecting via the Television. Connecting via other means. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 10
  • 11. Ad dresses on the Internet IP address. An assigned address that uniquely identifies a computer on the Internet. Domain name system (DNS). The system administered, by the Internet corporation for assigned names (ICANN), that assigns names to each site on the Internet. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 11
  • 12. Domain name. The name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left. Top-level specification (zone). The rightmost part of an Internet name, indicating the type of organization that owns the site. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 12
  • 13. Example: Consider the domain name software.ibm.com. The rightmost part of an Internet name is its top-level specification, or the zone. It designates the type of organization that owns the site . The letters ‘’com’’ in software.ibm.com. Indicate that this is a commercial site. There are 18 other-top-level specifications, the last six of which are under consideration at this time . “ Copyright 2005 John Wiley & Sons Inc.” TG 5 13
  • 14. The 19 top-level specification are as follows: com commercial site. edu educational site. Mil military site. Gov government site Net networking site Org organizations Firm business and firms Store business and offering goods for purchase Info information service providers Web entities related to world wide web activities. Arts cultural and entertainment activities, Rec recreational activities Nom individuals Areo air-transport industry Biz businesses Coop cooperatives Museum museums Name registration by individuals Pro accountants, lawyers, physicians. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 14
  • 15. TG5.3 Services provided by the Internet The Internet provides a variety of services: Discovery services. Involve browsing and information retrieval, and provide customers the ability to find, view, download, and process information. Communication services. Range from messages posted on electronic bulletin boards to complex information exchange among many organizations. Collaboration services. Among individuals and groups as well as collaboration among organizations. Web services. Self-contained business/ consumer modular applications delivered over the Internet. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 15
  • 16. TG5.4 The World Wide Web (WWW) The Internet and word wide web are not the same thing. The Internet functions as a transport mechanism, and the WWW is an application that uses those transport functions. The Web (World Wide Web). System with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/ server architecture; uses the transport functions of the Internet “ Copyright 2005 John Wiley & Sons Inc.” TG 5 16
  • 17.  Hypertext Markup Language (HTML). Programming language used on the web, which formats Documents and incorporates dynamic hypertext links to other documents stored on computers.  Standard Generalized Markup Language (SGML). Text-based programming language for describing the content and structure of digital documents; the language from which HTML was developed . “ Copyright 2005 John Wiley & Sons Inc.” TG 5 17
  • 18. Home page. A text and graphical screen display that welcomes users and explains the organization that has established the page. Web site. Collectively, all of the web pages of a particular company or individual. Webmaster. The person in charge of an organization’s web site. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 18
  • 19. Uniform resource locator (URL). Set of letters that identify the address of a specific resource on the web. Hypertext transport protocol (HTTP). The communications standard used to transfer pages across the WWW portion of the Internet; defines how messages are formatted and transmitted. Browsers. Software applications through which users primarily access the web. Surfing. The process of navigating around the Web by pointing and clicking a Web browser. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 19
  • 20. TG5.5 Internet challenges Internet regulation Internet expansion Internet privacy “ Copyright 2005 John Wiley & Sons Inc.” TG 5 20
  • 21. TG5.6 Intranets  A private network that uses Internet software and TCP/IP protocols. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 21
  • 22. Security Public key security. Procedures used to protect intranets from outside intrusion. Encryption. The process of scrambling outgoing data to make them indecipherable to outsiders. Digital certificate. Electronic identification card that give validate access to an intranet. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 22
  • 23. Security cont… Firewall. A device located between a firm’s internal network and external networks (specifically, the Internet), to regulate access into and out of a company ‘s network. Assured pipeline. A security device that examine an entire request for data and then determines whether the request is valid. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 23
  • 24. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the United States Copyright Act without express permission of the copyright owner is unlawful. Request for information should be addressed to the permission department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The publisher assumes no responsibility for error, omissions, or damages caused by the use of these programs or from the use of the information herein. “ Copyright 2005 John Wiley & Sons Inc.” TG 5 24