csce 101 introduction to computer concepts the internet & the world wide web chapter2
TRANSCRIPT
CSCE 101 Introduction to Computer Concepts
The Internet & the World Wide Web
Chapte
r22
2
The Internet & the World Wide Web
Exploring Cyberspace Connecting to the Internet How Does the Internet work? The World Wide Web Email & Other Ways of Communicating over
the Net Telephony, Multimedia, Webcasting, Blogs,
E-Commerce Snooping, Spoofing, Phishing, Pharming,
Cookies, & Spyware
Chapte
r22
3
The Internet
Internet History Began with 1969’s ARPANET for US Dept. of Defense 62 computers in 1974 500 computers in 1983 28,000 computers in 1987 Early 1990s, multimedia became available on internet
To connect you need An access device (computer) A means of connection (phone line, cable hookup, or
wireless) An Internet Service Provider (ISP)
4
Connecting to the Internet
Bandwidth Is an expression of how much data – text, voice,
video and so on – can be sent through a communications channel in a given amount of time
Baseband Is a slow type of connection that allows only one
signal to be transmitted at a time. Broadband
Is a high speed connection that allows several signals to be transmitted at once.
5
Connecting to the InternetDigital Data Units
bit (b) Smallest unit of information used by computers, can be 0 or 1
Byte (B) A group of 8 bits, which represents one character, digit, or other value
Kilo (K) About 1,000 (210 = 1,024 exactly)
Mega (M) About 1,000,000 (220 = 1,048,576 exactly)
Giga (G) About 1,000,000,000 (230 = 1,073,741,824 exactly)
6
Connecting to the InternetData Transmission Speeds
Originally measured in bits per second (bps) 8 bits are needed to send one character, such as
A or a Currently measured in kilobits per second (Kbps) Kilo- stands for a … A 28.8 Kbps modem sends 28,800 bits per second How many characters per second would that be?
Mbps connections send 1 million bits per second Gbps connections send 1 billion bits per second
28,800 / 8 = 3600 characters per second
7
Connecting to the InternetModems
Modem (from modulate and demodulate) is a device that modulates and demodulates an analog carrier signal to encode/decode digital information.
Dialup Modems (28.8 Kbps - 56Kbps) Can be either internal or external to your PC Most ISPs offer local access numbers Need call waiting turned off; either manually or in
Windows
Audio coupledInternal modem
8
Connecting to the InternetModems Modems (Dialup) High-speed phone lines
ISDN line Integrated Services Digital Network Allows voice, video, & data transmission over
copper phone lines Can transmit 64 to 128 Kbps
DSL (Digital Subscriber Line) Uses regular phone lines, DSL modem Receives data at 1.5-9 Mbps; sends at 128Kbps –
1.5 Mbps Is always on
DSL modem
9
Connecting to the InternetModems
Modems (Dialup) High-speed phone lines (ISDN line, DSL line) Cable Modems
Cable Internet access, along with DSL technology, are the two primary types of broadband Internet access.
Bit rate of business: 2 Mbps to 50 Mbps or more. Bit rate of residential: 384 Kbps to 20 Mbps or
more. Few attempts to offer different service tiers
beyond the traditional 'home' and 'business' designations.
Cable modem
10
Connecting to the InternetModems
Modems (Dialup) High-speed phone lines (ISDN line, DSL line) Cable Modems Satellite
Always-on connection using satellite dish to satellite orbiting earth
Send data at 56 – 500 Kbps; receive at 1.5 Mbps
11
Connecting to the InternetModems Modems
28.8 Kbps takes 4 3/4 hours to download 6 minute video High-speed phone lines
ISDN line 1 hour to download 6 minute video
DSL line 11 minutes to download 6 minute video
Cable Modems Connects the PC to a cable-TV system
6 minutes to download a 6 minute video Satellite
18 minutes to download 6 minute video
12
Connecting to the InternetWireless technology
Wi-Fi is a name for a set of wireless standards set by IEEE (IEEE 802.11 standards).
A wireless network uses radio waves, just like cell phones, televisions and radios do.
13
Connecting to the InternetWireless technology
Several standards: 802.11b Was the first version to reach the marketplace.
Transmits in the 2.4 GHz. It can handle up to 11 Mbps. It uses complimentary code keying (CCK) coding.
802.11g It is faster because it uses orthogonal frequency-division multiplexing (OFDM), a more efficient coding technique. Transmits at 2.4 GHz It can handle up to 54 Mbps.
802.11a It also and uses OFDM coding. Transmits at 5GHz and It can move up to 54 Mbps.
Newer standards, like 802.11n, can be even faster than 802.11g. However, the 802.11n standard isn't yet final.
14
Connecting to the InternetWireless technology
3G is the third generation of mobile phone standards and technology.
It is based on the International Telecommunication Union (ITU) family of standards under the International Mobile Telecommunications program, "IMT-2000".
Services include: Wide-area wireless voice telephony and Broadband wireless data, all in a mobile environment.
15
Connecting to the InternetWireless technology
3G vs. IEEE 802.11 networks IEEE 802.11 networks are short range, high-
bandwidth networks primarily developed for data.
3G networks are wide area cellular telephone networks which evolved to incorporate high-speed internet access and video telephony.
16
Connecting to the InternetAccess Providers Internet Service Providers (ISP)
Local, regional, or national organization that provides internet access
Examples: AT&T Worldnet, EarthLink Commercial Online Service
A members-only company that provides specialized content and internet access
Examples: AOL, MSN
17
Connecting to the InternetWireless Internet Service Providers
Internet Access for laptops, notebooks, smartphones, PDA users
These devices contain wireless modems
Examples: AT&T Wireless, Verizon Wireless, Earthlink Net Zero
18
How Does the Internet Work?
The internet consists of thousands of smaller networks
These link educational, commercial, nonprofit, and military organizations
Most are Client/Server networks Client: a computer requesting
data or services Server or Host: a central
computer supplying data or services requested of it
19
How Does the Internet Work?
Point of Presence (POP) A local access point to
the internet A local gateway to the
ISP’s network
20
How Does the Internet Work?
Network Access Point (NAP) A routing computer at a point
on the internet where several connections come together
Owned by Network Service Providers (NSP)
Four major NAPs established in 1993 when the internet was privatized
Source of much internet congestion PNAPS
21
How Does the Internet Work?
Private/Peer NAPs (PNAP) Established in late 1990s Provide more backbone
access locations than the original 4 NAPs in Chicago, Washington D.C., New Jersey and San Francisco
>100 in U.S.A. at present Facilitate more efficient
routing since there are more backbone access locations
22
How Does the Internet Work?
Internet Backbone High-capacity,
high-speed data transmission lines
Use the newest technology
Providers include AT&T, Cable & Wireless, Sprint, Teleglobe, UUNET
23
How Does the Internet Work?Protocol
The set of rules a computer follows to electronically transmit data.
Transmission Control Protocol/Internet Protocol (TCP/IP) is the internet protocol Developed in 1978 Used for all internet transactions
24
How Does the Internet Work?Packets
Fixed-length blocks of data for transmission
Data transmissions are broken up into packets
25
How Does the Internet Work?IP Addresses Every device connected to the internet has an
address Each IP address uniquely identifies that device The address is four sets of 3-digit numbers
separated by periods Example: 95.160.10.240 Each number is between 0 and 255 Static IP addresses don’t change Dynamic IP addresses changes for each session Since addresses are limited, and most PCs are not
connected a lot of the time, dynamic addresses are common
26
Who rules the Internet?
The board of trustees of the Internet Society (ISOC) oversees the infrastructure standards
Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain names
American Registry for Internet Numbers (ARINN) administers the unique IP addresses for North & South America, Caribbean, and sub-Saharan Africa
Two other organizations administer the unique IP addresses for Europe and the Asia-Pacific region
27
Internet 2 or UCAID (University Corporation for Advanced Internet Development)
A non-profit consortium which develops and deploys advanced network applications and technologies, for education and high-speed data transfer purposes.
New standards for large-scale higher-speed data transmission
It is led by 212 universities and partners with 60 companies in areas from the networking (Cisco Systems, Nortel and others), publishing (Prous Science) and technology industries such as Comcast, Intel and Sun Microsystems.
"Internet2" is a registered trademark Requires state-of-the-art infrastructure
28
The World Wide Web
WWW was invented by Tim Berners-Lee 1989
Browsers 1990: First Web browser based on HTML
by Berners-Lee Early 1990s: Andreesen developed the
first graphical browser (Mosaic) Software for web-surfing Examples: Internet Explorer, Netscape
Navigator, Mozilla FireFox, Opera, Apple Macintosh browser
29
The World Wide Web
Website The location on a particular computer
that has a unique address Example: www.barnesandnoble.com,
www.mcgraw-hill.com The website could be anywhere – not
necessarily at company headquarters
30
The World Wide Web
Web Pages The documents and files on a company’s
website Can include text, pictures, sound, and
video Home page
The main entry point for the website Contains links to other pages on the
website
31
The World Wide WebUniform Resource Locator (URL)
A character string that points to a specific piece of information anywhere on the web
A website’s unique address It consists of
The web protocol, http The domain name of the web server The directory or folder on that server The file within the directory, including
optional extension http://www.nps.gov/yose/home.html
protocol domain name file name . extensiondirectory
32
The World Wide WebDomain names
Must be unique Identify the website, and the type of
site it is www.whitehouse.gov is NOT the same as
www.whitehouse.org .gov means government
.org means professional or nonprofit organization
Have you ever mistyped a URL and gone to a website you weren’t expecting? As we learn later in this chapter, some unscrupulous websites take advantage of this.
33
The World Wide Web HTTP (HyperText Transfer Protocol)
Is the internet protocol used to access the World Wide Web
HTTPS is the secure version of HTTP Hypertext Markup Language (HTML)
The language used in writing and publishing web pages
The set of tags used to specify document structure, formatting, and links to other documents on the web
Hypertext links connect one web document to another
34
Web Browsers
Your tool for using the internet
Comes preinstalled on most PCs
5 basic elements Menu bar Toolbar URL bar Workspace Status bar
35
Web Browsers
Home Page The page you see
when you open your web browser
You can change the Home Page on your browser
Back,Forward, Home & Search Use the menu bar
icons to move from one page to another
36
Web BrowsersNavigation History Lists
A list of websites you visited since you opened up your browser for this session
Allows you to easily return to a particular site Bookmarks
Allows you to store the URL from a site on your PC so you can find it again in another browser session
To save the URL for a site, click on “Bookmark” in Internet Explorer or Mozilla Firefox
Or just type in the URL of the page you want to visit
37
Web portals
A gateway website that offers a broad array of resources and services, online shopping malls, email support, community forums, stock quotes, travel info, and links to other categories.
Examples: Yahoo, AOL, Microsoft Network (MSN), Lycos, or Google
Most require you to log in, so you can Check the home page for general information Use the subject guide to find a topic you want Use a keyword to search for a topic
38
Search Services
Organizations that maintain databases accessible through websites to help you find information on the internet
Examples: portals like Yahoo Search and MSN, and Google, Ask Jeeves, and Gigablast
Databases are compiled using software programs called spiders Spiders crawl through the World Wide Web Follow links from one page to another Index the words on that site
If you publish an embarrassing web page and then take it down, is it REALLY gone?
39
4 web search tools
Keyword Indexes Type one or more search keywords, and you see
web pages “hits” that contain those words For phrases with two or more words, put phrase
in quotes Examples are Google, Gigablast, HotBot, MSN
Search, Teoma Subject Directories
Search by selecting lists of categories or topics Example sites are Beaucoup, Galaxy, LookSmart,
MSN Directory, Netscape, Open Directory Project, Yahoo
Metasearch Engines Specialized Search Engines
40
4 web search tools Keyword Indexes Subject Directories Metasearch Engines
Allows you to search several search engines simultaneously
Examples are Dogpile, Ixquick, Mamma, MetaCrawler, ProFusion, Search, Vivisimo
Specialized Search Engines Help locate specialized subject matter,
like info on movies, health, jobs
41
Multimedia Search Tools
Allow you to search for nontext resources
Search Tool Site
A9 (Amazon.com) http://a9.com
Blinkx www.blinkx.com
Google www.google.com/video
ShadowTV www.shadowtv.com
StreamSage www.streamsage.com
Virage www.virage.com
Yahoo! http://video.search.yahoo.com
42
Should you trust information you find online? There is no central authority that
verifies all internet sites Guidelines to evaluate Web Resources
Does the information appear on a professional site maintained by a professional organization?
Does the website authority appear to be legitimate?
Is the website objective, complete, and current?
43
Email & Other Ways of Communicating over the Net Email program (email reader)
Enables you to send email by running email software on your computer that interacts with an email server at your ISP
Incoming mail is stored on the server in an electronic mailbox
Upon access, mail is sent to your client’s inbox
Examples: Microsoft’s Outlook Express, Netscape’s Mail, Apple Computer’s Apple Mail, QualComm’s Eudora
If your email is stored at the server and servers are backed up, when you delete an email is it gone for good?
44
Email & Other Ways of Communicating over the Net Web-based Email
You send and receive messages by interacting via a browser with a website
Advantage: You can easily send and receive messages while traveling
Examples: Yahoo! Mail, Hotmail, Bluebottle, Sacmail
45
Email & Other Ways of Communicating over the Net Using email
1. Get an email address, following the format [email protected]
2. Type addresses carefully, including capitalization, underscores, and periods
3. Use the reply command to avoid addressing mistakes
4. Use the address-book feature to store email addresses
5. Sort your email into folders or use filters
User Name Domain name
46
Email & Other Ways of Communicating over the Net Email Attachments
A copy of a file or document that you send attached to an email to one or more people
Be careful about opening attachments Many viruses hide in them Know who is sending it to you before you open
it The recipient must have compatible
software to open the attachment. If they don’t have Excel, they probably can’t read the spreadsheet you sent them.
47
Email & Other Ways of Communicating over the Net
Instant Messaging Any user on a given email system can send a
message and have it pop up instantly on the screen of anyone logged into that system
Examples: AOL Instant Messenger, MSN Messenger, ICQ, AT&T IM Anywhere, Yahoo Messenger
Not all IM systems interoperate To get it, you:
download the software connect to the internet register with the service
48
Email & Other Ways of Communicating over the Net
FTP – File Transfer Protocol A software standard for transferring files
between computers with different Operating Systems Microsoft Windows Linux Unix Macintosh OS, and so forth
You can transfer files from an FTP site on the internet to your PC
Know your FTP site! If the FTP site is offering copyrighted material such
as music and movies for free, you are breaking US law if you download files!
You may also get a virus or spyware on your PC from them
49
Email & Other Ways of Communicating over the Net
Newsgroups A giant electronic discussion board There are thousands of free internet
newsgroups Usenet is the worldwide public network of
servers on the internet www.usenet.com To participate you need a newsreader
Listserv An email-based discussion group Uses an automatic mailing-list server that
sends email to subscribers on selected topics
50
Email & Other Ways of Communicating over the Net Real-Time Chat (RTC)
Participants have a typed discussion while online at the same time
This is not allowed in most college classrooms IM is one-on-one, but RTC has a list of
participants Netiquette – appropriate online behavior
Before you ask a question, consult the FAQ Avoid flaming Don’t SHOUT – use all capital letters Be careful with jokes Don’t send huge file attachments unless
requested
51
Internet Telephony
Uses the internet to make phone calls Long-distance calls are either very inexpensive
or free With no PC, dial a special phone number to
packetize your call With a PC that has a sound card, microphone,
Internet connection, and internet telephone software such as Netscape Conference or Microsoft NetMeeting
Currently inferior in quality to normal phone connections
Also allows videoconferencing
52
Multimedia on the Web
Allows you to get images, sound, video, and animation
May require a plug-in, player, or viewer A program that adds a specific feature to a browser
so it can view certain files Example: Adobe Acrobat Reader, RealPlayer,
QuickTime Multimedia Applets
Small programs that can be quickly downloaded and run by most browsers
Java is the most common Applet language Microsoft’s Visual Studio creates ActiveX and com
objects
53
Multimedia on the Web
Animation The rapid sequencing of still images to create the
appearance of motion Used in video games and web images that seem to
move Video
Streaming video is process of transferring data in a continuous flow so you can begin viewing a file before it is all completely sent
Audio may be transmitted either: Downloaded completely before the file can be
played, or Downloaded as streaming audio
54
Webcasting and Blogs
RSS newsreaders Programs that scour the web and pull together
“feeds” from several websites to one place Blog
Short for web log, a diary-style web page Have become popular, both privately and in
politics Podcasting
Recording internet radio or similar internet audio programs
Some radio stations webcast their audio programs over the internet
55
E-Commerce
Conducting business activities online B2B Commerce is business-to-business e-
commerce Online Finance now involves online banking, stock
trading online, and e-money such as PayPal Online auctions link buyers with sellers
eBay is the most well-known example of person-to-person auctions
OnSale is a vendor-based auction that buys merchandise and sells it at a discount
Priceline is an auction site for airline tickets and other items
56
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware
The internet was founded as a collaborative tool based on trust
Not everyone on the internet is honest Snooping
Email is not private Corporate management has the right to view
employees’ email Email that travels over the internet may be
captured and monitored and read by someone else
Not all ISPs protect their customers’ privacy
57
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware Spam: Electronic Junk Mail
Unsolicited email that takes up your time and may carry viruses or spyware
Delete it without opening the message Never reply to a spam message When you sign up for something, don’t give
your email address Use spam filters Fight back by reporting new spammers to
www.abuse.net or www.spamhaus.org or www.rahul.net/falk
58
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware
Spoofing Using fake email sender names so the message appears
to be from a different source, so you will trust it. If you don’t know the sender, don’t open it.
Phishing Using trusted institutional names to elicit confidential
information Some common schemes look like they are from your
bank or from eBay and ask you to “update” your account.
Don’t do it – the legitimate company already knows your account information!
If you want to update your information, CALL the number in the phone book, not the number in the email!
59
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware Pharming
Redirecting you to an imposter web page. Thieves implant malicious software on your PC Redirects you to an imposter web page even
when you type the correct URL! To foil it, type the URL with https first (for http
secure) https://www.microsoft.com Use this one with
https, not http://www.microsoft.com Since it has http, it
could be spoofed
60
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware Cookies
Little text files left on your hard disk by some websites you visit
Can include your log-in name, password, and browser preferences
Can be convenient But they can be used to gather
information about you and your browsing habits
61
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware Spyware
Applications that download without your knowledge
They hide on your PC and capture information about what is on the PC and what you are doing
That information is then transmitted to the spyware master’s website on the internet
Information may be used against you to steal your identity, get credit cards in your name, or for other crimes
62
Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware Spyware (continued)
To prevent spyware, you must install and use “Antispyware software” at all times
Examples: Ad Aware, AntiSpyware, Spybot Search & Destroy, Pest Patrol, SpyCatcher, Yahoo toolbar with Anti-Spy
Be careful about free and illegal downloads since they are a source of spyware
Don’t say “I agree” when you are downloading something – read the fine print
Beware of unsolicited downloads