introduction to internet - wordpress.com · introduction the internet is the transport vehicle for...
TRANSCRIPT
Lesson - 1
What is Internet? The Internet is made up of
millions of computers linked together around the world in such a way that information can be exchanged between any computer at any time.
The Internet is often described as 'a network of networks' because all the smaller networks of organizations are linked together into the one giant network called the Internet.
Introduction The Internet is the
transport vehicle for the information stored in files or documents on another computer.
The Internet itself does not contain information.
It is a slight wrong statement to say a "document was found on the Internet."
The most important properties of The Internet Network dedicated,
Based on the Internet suite of protocols (TCP/IP protocol),
A non-commercial,
Self-governing,
Used for mostly to communication and research,
No real center or central "Hub."
THE HISTORY OF THE INTERNET Internet was created by the
U.S. Department of Defense in 1969 under the name ARPANet (Advance Research Project Agency)
It was built to serve two purposes; To share research among
military, industry, and university sources.
To provide a system for sustaining communication among military units in the event of nuclear attack.
THE HISTORY OF THE INTERNET After invention of the Internet,
other organizations, such as colleges and universities, home and office users started connecting their computers to this growing network to share information.
Between the 1970s and 1983, the ARPANet was connected to further networks.
The large new network that resulted from these connections was called the Internet since it connected several networks with one another.
THE HISTORY OF THE INTERNET Also in this year, an
address system (URL) that allowed computers on the Internet to have names rather than the numbers by which they had previously been identified was established.
THE HISTORY OF THE INTERNET In 1988, more than 50,000
computers were connected to this network.
In 1989 Web pages were invented. Web page is a page on the World Wide Web.
In 1993, a graphical Web browser was invented that allowed users to navigate easily from one place to another on the Internet.
At the beginning of the year 2005, there were more than 300 million Internet users.
INTERNET SERVERS The Internet is made up of
client computers, servers, cables and network connection devices.
Servers are configured as high performance computers and running special software to perform their tasks.
They operate 24 hours a day for full time service to their clients.
Internet Server Types Some of main Internet
Servers are: Web Servers Mail Servers FTP (File Transfer Protocol)
Servers Database Servers Content Management
Servers Real-Time Communication
Servers Chat, and IRC servers Instant messaging servers,
DNS (Domain Name Server)
Internet Server Types Web Servers Mail Servers Web Servers are
foundation of the Internet.
The Web pages are stored in Web servers.
Whenever you open up your browser and type in a Web site address, it is the server that gets you the page you request.
Mail Serves are as crucial as Web servers.
They move and store mails over private networks and across the Internet.
Internet Server Types FTP (File Transfer Protocol) Servers
Database Servers
FTP servers store text files, graphic files, sound files, etc, and let the client download and upload them.
Database Servers are specifically configured to run database software.
Internet Server Types Real-Time Communication Servers
Chat, and IRC servers enable a large number of users to exchange information in an environment similar to an Internet newsgroup but with real-time discussion capabilities.
Instant messaging servers, like chat servers, facilitate communication in real time.
However, instant messaging generally involves one conversation between two people.
Internet Server Types DNS (Domain Name Server)
DNS matches up the URL of a Web site (eg www.google.com) with its proper numeric IP address.
It translates www.google.com into the unique numeric IP address 173.194.32.84
Home Works Find the information about inventors
of the e-mail ,WWW and @.
Lesson - 2
Review What is Internet? The most important
properties of The Internet
The history of the internet
Internet Servers
Internet Server Types Web Servers Mail Servers FTP (File Transfer
Protocol) Servers Database Servers Content Management
Servers Real-Time
Communication Servers Chat, and IRC servers Instant messaging servers,
DNS (Domain Name Server)
Advantages of Internet Downloading Free Software.
We can work at home with tele-working.
We can join a community to create a new social all over the world.
We can send and receive e-mails, files and big data.
We can Send SMS, E-postcards.
We can also place our digital photos in the internet.
Advantages of Internet We can play online gaming.
We can easy access to information which is renewed and up to date.
We can read the daily newspapers from all over the world.
We can order products online.
We can get the newest stock exchange courses because the stock exchange.
Advantages of Internet We can learn with the
internet
We can hold videoconferences
Doctors from all over the world can join an operation.
It offers other lot of services, sometimes for free.
Disadvantages of Internet We can download viruses
over internet when we download files.
We cannot be sure to be alone if you are alone.
We have to install a firewall, buy anti-virus-programmes and update them regularly.
Disadvantages of Internet When we chat with
someone you cannot be sure about the truth of his/her words.
When we get to a web site of a bank – is it a real bank or only a faked one?
How can I be sure if I want to buy something on the web and send my credit card-number that nobody will read it?
Disadvantages of Internet It alters the social
behaviour, habits and abilities of people.
We consider the internet as a suitable babysitter or friend for children.
It will never replace the real world and therefore it is important that it should not be a replacement for real friends, for a real life.
Conclusions So: “It is very difficult to differ between the good and
bad aspects of internet.
There are good and bad things about every service of the internet.”
Usages of Internet Some of usage fields
of internet ate:
Performing Research
Communication
Obtaining News
Learning
Shopping
Usages of Internet Some of usage fields
of internet ate:
Downloading Computer Software
Publishing
Entertainment
Travel Plans
Lesson - 3
What is Remote Desktop Connection? Remote Desktop
Connection is a technology that allows you to sit at a computer and connect to a remote computer in a different location.
Remote Desktop connects two computers over a network or the Internet.
Remote Desktop Connection Types There are two types of Remote Desktop connections:
Remote Desktop connections from inside your home network: both computers, the computer you are using and computer
you are going to be connected are connected to the same network.
Remote Desktop connections from outside your home network: both computer, the computer you are using and computer you
are going to be connected aren’t connected to the same network.
They are connected to each ather over internet.
Remote Desktop Connection To connect to a remote computer:
that computer must be turned on,
it must have a network connection,
Remote Desktop must be enabled,
you must have network access to the remote computer (this could be through the Internet),
you must have permission to connect.
Remote Desktop connections from inside your home network To start Remote Desktop on the
computer you want to work from: Open Remote Desktop Connection by
clicking the Start button .
In the search box, type Remote Desktop Connection, and then, in the list of results, click Remote Desktop Connection.
In the Computer box, type the name of the computer that you want to connect to, and then click Connect.
Start / All Programs / Accessories / Remote Desktop Connection
Allowing Remote Desktop connections To allow remote
connections on the computer you want to connect to:
Open System Properties by clicking the Start button , right-clicking Computer, and then clicking Properties.
Click Remote settings.
Remote Desktop connections from outside your home network There are six steps you'll need to follow to set this up.
Allow remote connections to the computer you want to access.
Make sure Remote Desktop is able to communicate through your firewall.
Find the IP address of the computer on your home network that you want to connect to.
Open your router's configuration screen and forward TCP port 3389 to the destination computer's IP address.
Find your router's public IP address so that Remote Desktop can find it on the Internet.
Open Remote Desktop Connection and connect.
Lesson - 4
What is a Protocol? A protocol is a system of
rules that define how something is to be done.
In computer terminology, a protocol is usually an agreed-upon or standardized method for transmitting data and/or establishing communications between different devices.
Internet Protocols Some of main internet
protocols are: Internet Protocol (IP) TCP/IP PROTOCOL Hypertext transfer protocol
(HTTP) The File Transfer Protocol
(FTP) The telnet Protocol The email Protocol Usenet IRC (Internet Relay Chat) Voice-over-IP (VoIP)
Protocolls
Internet Protocol (IP) The Internet Protocol (IP) is a
network-layer (Layer 3) protocol that contains addressing information and some control information that enables packets to be routed.
IP has two primary responsibilities: providing connectionless,
best-effort delivery of datagrams through an internetwork.
providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes.
TCP/IP PROTOCOL TCP/IP stands for the
'Transport Control Protocol / Internet Protocol' suite.
The advantage of TCP/IP is it's versatility.
It can successfully switch packets of all shapes and sizes, and work across a varieties of networks.
Components of TCP/IP
IP The Internet Protocol is a network layer protocol that moves
data between host computers.
TCP The Transport Control Protocol is a transport layer protocol
that moves multiple packet data between applications.
UDP The User Datagram Protocol is a transport layer protocol like
TCP but is less complex and reliable than TCP.
ICMP The Internet Control Message Protocol carries network error
messages and other network software requirements.
Hypertext transfer protocol (HTTP). "The Web" This Internet protocol is
the most popular way to provide and obtain information from the Internet.
The Web offers not only access to files to download, but offers a way to jump from site to site through a series of connecting hyperlinks.
Hypertext transfer protocol (HTTP). "The Web" The most distinguishing feature of the Web is the way that
text is formatted.
A series of "tags" is used to encode and format text, graphics, animation, sound, and other types of files.
These tags are called HTML (Hyper Text Markup Language).
These HTML files appear on your computer screen as determined by the tags used in its coding.
The communication between the client (your browser) and the server (a software located on a remote computer) involves requests sent by the client and responses from the server.
The File Transfer Protocol (FTP) The File Transfer Protocol is an
excellent method to transfer (download and send) files from one computer to the other on the Internet.
The objectives of FTP are to: promote file (programs or data)
sharing efficiently transfer data from one
computer to another encourage indirect or implicit use of
remote computers provide a common platform for file
storages among different hosts
The telnet Protocol The Telnet protocol allows you to connect to another
machine.
Once connected, your computer behaves like a terminal of the distant machine and you can utilize all the resources on the remote system if you have the required permissions.
The email Protocol Email is the most used application on the Internet.
Emails allow users to communicate with each other almost instantly.
Each email message consists of a header and a body.
The header contains the following information: Recipient email address
Senders email address
Email address of the people to whom a carbon copy (Cc) and blind carbon copy (Bcc) has been sent.
The subject line
The main text message resides in the email body.
Usenet Usenet is something like a
bulletin board or an email list without the subscription.
Anyone can post a message to or browse through a Usenet newsgroup.
Usenet messages are retained on the serving computer only for a predetermined length of time and then are automatically deleted
IRC (Internet Relay Chat) This protocol allows for
synchronous communication: users on different computers anywhere in the world can communicate in "real time" or simultaneously.
You can instantly see a response to a typed message by several people at the same time.
Voice-over-IP (VoIP) Protocolls Voice-over-IP (VoIP)
implementations enables users to carry voice traffic (for example, telephone calls and faxes) over an IP network.
There are 3 main causes for the evolution of the Voice over IP market: Low cost phone calls Add-on services and unified
messaging Merging of data/voice
infrastructures
Lesson - 6
48
What is Copyright? Copyright is a legal concept,
enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time.
It is a form of intellectual property applicable to any expressible form of an idea or information that is substantive and discrete.
49
Copyright Properties Generally, it is "the right to
copy", but also gives the copyright holder the right: to be credited for the work,
to determine who may adapt the work to other forms,
who may perform the work,
who may financially benefit from it, and
other related rights.
50
Copyright Place Copyrights are said to be
territorial, which means that they do not extend beyond the territory of a specific state unless that state is a party to an international agreement. (but almost all states are parties to at least one such agreement)
51
Copyright Time Typically, the duration of
copyright is the whole life of the creator plus fifty to a hundred years from the creator's death,
Or a finite period for anonymous or corporate creations.
52
What is Digital Copyright? Digital media and network connections, it is said, are
the most democratic of media, promoting free expression and access to information wherever a computer can be hooked up to a telephone line.
Copyright is now seen as a tool for copyright owners to use to extract all the potential commercial value from works of authorship.
53
What is Digital signature? A digital signature or
digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document.
A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit.
54
What is Digital signature? A Digital Signature
Certificate, like hand written signature, establishes the identity of the sender filing the documents through internet which sender can not revoke or deny.
Digital Signature Certificate is a digital equivalent of a hand written signature which has an extra data attached electronically to any message or a document.
55
What is Digital signature? A Digital Signature is a method of verifying the authenticity of an
electronic document. Digital signatures are going to play an important role in our lives
with the gradual electronization of records and documents. The Information Technology Act, 2000 provides the required
legal sanctity to the digital signatures based on asymmetric cryptosystems.
56
Why applying Digital signature? Some common reasons
for applying a digital signature to communications are:
Authentication
Integrity
Non-repudiation
57
Usage of Digital signature Digital signatures are
commonly used for:
software distribution,
financial transactions,
to implement electronic signatures,
and in other cases where it is important to detect forgery or tampering.
58
Digital signature types There are following types of
Digital Signatures:
Class 2 Digital Signature Certificates for Income Tax Return e-filing, ROC / MCA 21
DGFT Digital Signature Certificates for Importers-Exporters
59
Digital signature types There are following types of
Digital Signatures: Class 3 Digital Signature
Certificates for: e-Tendering
e-Procurement
e-Bidding
e-Ticketing
e-Auction
Individual ( Class 3 a Digital Signature Certificates)
Organization ( Class 3b Digital Signature certificates)
60
Examples
61
Examples
62
Lesson - 7
What is a Malware? Malware, short for
“malicious software”, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Malware Types According to their
properties, risk, the way how there are spreading, functionality, etc… malwares can be divided on: Viruses
Trojan Horse
Worms
Spyware
Blended Threat
Viruses A computer virus is a
program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Most dangerous viruses types are: ILOVEYOU $10 b illion
Cod e Red $ 2 b illion
Melissa
Worms A worm is a special type of
virus that can replicate itself and use memory, but cannot attach itself to other programs.
Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.
Most dangerous worm types are: Storm Worm Morto Worm
Trojan Horse The Trojan Horse, at first
glance will appear to be useful software but will actually do damage once installed or run on your computer.
Most dangerous Trojan Horse types are: Regin
CryptoLocker
Gameover ZeuS
Differences between a Virus, Worm and a Trojan Horse
a Virus a Worm a Trojan Horse
is always harmful is always harmful can be harmful
can attach itself to an
executable file
doesn’t need to attach
itself to an executable
file
can attach itself to an
executable file
can damage files can damage files sometimes damages files
replicates itself on the system can replicate itself on the
network
can replicate itself on the
system
causes the system working
slow
causes the system
working slow
can make the system to be
controlled by other users
you have to run the attached
executable file or the virus to
propagate
you don’t have to run
any file to propagate
you have to run the
attached executable file or
the virus to propagate
Blended Threats A blended threat is a
more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat.
Spyware Spyware is a type of
malware (malicious software) installed on computers that collects information about users without their knowledge.
Tips to Combat Viruses, Worms and Trojan Horses on Your Computer
Keep the Operating System Updated
Use a Firewall, Instant messaging servers, DNS (Domain Name Server)
Did You Know... CodeRed, a blended threat, launched DoS attacks,
defaced Web servers, and its variant, CodeRed II, left Trojan horses behind for later execution.
CodeRed was processed in memory — not on a hard disk — allowing it to slip past some anti-virus products.
Computer Economics has estimated the worldwide cost of CodeRed at $2.62 billion dollars.
What is a Network? A network consists of
two or more computers that are linked in order to:
share resources (such as printers and CDs),
exchange files, or
allow electronic communications.
Main Network Types Main network types are:
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Networks (MAN),
Wireless LAN (WLAN),
Wireless WAN (WWAN).
Local Area Network (LAN) A Local Area Network (LAN)
is a network that is confined to a relatively small area.
It is generally limited to a geographic area such as a writing lab,
school, or
building.
Transmit speed varies between 10 Mbs to 1Gbs
See also: RJ45, cat e5, cat e6, IPv4, IPv6
Wide Area Network (WAN) Wide Area Networks (WANs)
connect networks in larger geographic areas, such as Florida, the United States, or the world.
Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.
A WAN is complicated.
It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet.
What is a wireless network? A wireless local-area network
(WLAN) uses radio waves to connect devices such as laptops to the Internet and to your business network and its applications.
When you connect a laptop to a Wi-Fi hotspot at a cafe, hotel, airport lounge, or other public place, you're connecting to that business's wireless network.
Wireless Networks In the present days, wireless communication system has become
an essential part of various types of wireless communication devices, that permits user to communicate even from remote operated areas.
There are many devices used for wireless communication like: Mobiles
Cordless telephones,
GPS,
Wi-Fi,
satellite television
wireless computer parts
Current wireless phones include 3 and 4G networks, Bluetooth and Wi-Fi technologies.
Types of Wireless Communication The different types of
wireless communication mainly include: IR wireless
communication,
satellite communication,
broadcast radio,
Microwave radio,
Wi-Fi
Bluetooth,
Mobile Communication Systems
IR wireless communication Infrared wireless
communication communicates information in a device or systems through IR radiation .
IR is electromagnetic energy at a wavelength that is longer than that of red light.
For a successful infrared communication, a photo LED transmitter and a photo diode receptor are required.
It is used for security control, TV remote control and short range communications.
Satellite communications Satellite communication is one
type of self contained wireless communication technology, it is widely spread all over the world to allow users to stay connected almost anywhere on the earth.
Satellite communication contains two main components like: the space segment and the ground segment.
Usage Fields: Fixed Satellite Services, Broadcasting Satellite Services, Mobile Satellite Services.
Broadcast radio communications The first wireless communication
technology is the open radio communication to seek out widespread use, and it still serves a purpose nowadays.
Mostly an audio broadcasting service, radio broadcasts sound through the air as radio waves.
Radio uses a transmitter which is used to transmit the data in the form of radio waves to a receiving antenna.
When the DJ says you are listening to 92.7 BIG FM, what he really means is that signals are being broadcasted at a frequency of 92.7megahertz, that successively means the transmitter at the station is periodic at a frequency of 92.700,000 Cycles/second.
Microwave radio communications Microwave wireless
communication is an effective type of communication, mainly this transmission uses radio waves, and the wavelengths of radio waves are measured in centimeters.
In this communication, the data or information can be transfers using two methods: satellite method and
terrestrial method.
Microwave radio communications Satellite method, the data can be transmitted though a
satellite, that orbit 22,300 miles above the earth, with a frequency ranging from 11GHz-14GHz and with a transmission speed of 1Mbps to 10Mbps.
In terrestrial method, in which two microwave towers with a clear line of sight between them are used, ensuring no obstacles to disrupt the line of sight.
The frequency range of the terrestrial system is typically 4GHz-6GHz and with a transmission speed is usually 1Mbps to 10Mbps.
It is used often for the purpose of privacy.
Wi-Fi communications Wi-Fi is a low power wireless
communication, that is used by various electronic devices like smart phones, laptops, etc.
These networks allow users to connect only within close proximity to a transmitter.
WiFi is very common in networking applications which affords portability wirelessly.
These networks need to be protected with passwords for the purpose of security, otherwise it will access by others
Bluetooth communications The main function of the
Bluetooth technology is that permits you to connect a various electronic devices wirelessly to a system for the transferring of data.
Cell phones are connected to hands free earphones, mouse, wireless keyboard.
By using Bluetooth device the information is transmitted from one device to another one.
This technology has various functions and it is used commonly in the wireless communication market.
Mobile Communication Systems Many users communicate across
a single frequency band through mobile phones. Cellular and cordless phones are two examples of devices which make use of wireless signals.
Typically, cell phones have a larger range of networks to provide a coverage.
But, Cordless phones have a limited range.
Similar to GPS devices, some phones make use of signals from satellites to communicate.
Advantages of Wireless Communication Any data or information can be transmitted faster and
with a high speed.
Maintenance and installation is less cost for these networks.
The internet can be accessed from anywhere wirelessly.
It is very helpful for workers, doctors working in remote areas as they can be in touch with medical centers.
Disadvantages of Wireless Communication An unauthorized person can easily capture the
wireless signals which spread through the air.
It is very important to secure the wireless network so that the information cannot be misused by unauthorized users.
Wireless Communication Based Projects Wireless Communication Based Projects Android Based Smart Phone Used for Induction Motor
Control Smart Phone Controlled Traffic Signal Override with Density
Sensing System Arduino based Home Automation Phone Controlled Load Management System Robotic Vehicle Movement By Cell Phone Dialed Telephone Number LED Based Display System DTMF based Load Control System Dedicated Message Communication Wirelessly between Two
Computers Wireless Message Communication between Two Computers Android based Remotely Programmable Sequential Load
Operation Remotely Controlled Android based Electronic Notice Board Remote Operated Domestic Appliances Control by Android
Application Remote Password Operated Security Control by Android
Applications Home Automation by Android Application based Remote
Control