1 Chapter 5 Introduction to the Internet 1 COMP101-COMPUTER SKILLS Chapter 5 Introduction to the Internet Chapter 5 Introduction to the Internet 2 Course Contents • Introduction to the Internet • Types of Internet Connections • Web Browsers • Internet Advantages and Disadvantages • Things on Internet • Internet Communication • Internet Ethics & Internet Threats • Internet security
25
Embed
Chapter 5 Introduction to the Internet › lmsdatapool... · Chapter 5 Introduction to the Internet 5 Introduction to the Internet WWW (World Wide Web) • The World Wide Web, or
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Chapter 5 Introduction to the Internet 1
COMP101-COMPUTER SKILLS Chapter 5
Introduction to the Internet
Chapter 5 Introduction to the Internet 2
Course Contents
• Introduction to the Internet
• Types of Internet Connections
• Web Browsers
• Internet Advantages and Disadvantages
• Things on Internet
• Internet Communication
• Internet Ethics & Internet Threats
• Internet security
2
Chapter 5 Introduction to the Internet 3
Introduction to the Internet
Introduction
• Internet refers to network of networks.
• In this network each computer is recognized by a globally unique address known as IP address.
• Internet is defined as an Information super Highway, to access information over the web.
Chapter 5 Introduction to the Internet 4
Introduction to the Internet
Development
• The concept of Internet was originated in 1969.
• The origin of Internet devised from the concept of Advanced Research Project Agency Network (ARPANET).
• ARPANET was developed by United States Department of Defense.
3
Chapter 5 Introduction to the Internet 5
Introduction to the Internet
WWW (World Wide Web)
• The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet.
• The Web uses the HTTP protocol to transmit data.
• Web documents contain graphics, sounds, text and video.
Chapter 5 Introduction to the Internet 6
Introduction to the Internet
Internet Service Providers (ISP) • Internet Service Provider (ISP) is a company
offering access to internet. Such as, Omantel and Ooredoo
• ISP can provide different methods for Internet connections with different characteristics and different costs.
4
Chapter 5 Introduction to the Internet 7
Internet Service Providers (ISP)
They offer various services:
• Internet Access
• Domain name registration
• Dial-up access
• Leased line access
Chapter 5 Introduction to the Internet 8
Introduction to the Internet
How to Connect to Internet
Figure 5.1 Connect to Internet
5
Chapter 5 Introduction to the Internet 9
Types of Internet Connections
Types of Internet Connections
• Dial-Up.
• DSL
• ADSL
• SDSL
• Wireless.
• Satellite.
Chapter 5 Introduction to the Internet 10
Dial-up
• Dial up connections are the oldest, most out of date connections still available today.
• They are incredibly slow, unreliable, take up your phone line, and they make the very loud and annoying dial up sound when connecting to the internet.
• The only real benefit of a dial up connection is that it is reasonably priced .
6
Chapter 5 Introduction to the Internet 11
DSL
• DSL stands for Digital Subscriber Line.
• In a DSL connection you are using a 2 way phone line to connect to the internet, without disturbing your phone.
• DSL is the most common form of home internet connection today, and is also very popular for small businesses.
• The two basic common types of DSL are ADSL and SDSL.
Chapter 5 Introduction to the Internet 12
Introduction to the Internet
Figure 5.4 Access Internet DSL connection
7
Chapter 5 Introduction to the Internet 13
ADSL and SDSL
• ADSL is abbreviation of Asymmetric Digital Subscribers Line.
• Its distinguishing characteristic is that the upload and download speeds are different. Usually the download speed is faster than the upload speed.
• SDSL stands for symmetric DSL, and its distinguishing characteristic is that the upload and download speeds are the same.
Chapter 5 Introduction to the Internet 14
Satellite Internet Connection
• Satellite Internet connection offers high speed connection to the internet.
• Satellite Internet connection can help you obtain high-speed Internet if you live in rural areas where cable, DSL, ADSL and fiber-optic Internet are not available.
Types of Internet Connections
8
Chapter 5 Introduction to the Internet 15
Types of Internet Connections
Figure 5.6 Access Internet satellite connection
Chapter 5 Introduction to the Internet 16
• Wireless internet is like satellite, however instead of using a satellite orbiting the earth you are using cell phone towers to connect to the internet.
• This is a little bit faster and cheaper than satellite (generally).
• It is slightly less convenient; coverage not available everywhere.
• It is still slower and more expensive than DSL.
Wireless
9
Chapter 5 Introduction to the Internet 17
• Is the application program used to open any website.
• Govern with TCP/IP set of protocols.
Examples
• Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera, Apple Safari.
Web Browser
Chapter 5 Introduction to the Internet 18
• Transmission Control Protocol/Internet Protocol.
• TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet.
• More specifically, TCP/IP dictates how information should be packaged (turned into bundles of information called packets), sent, and received, as well as how to get to its destination.
TCP/IP
10
Chapter 5 Introduction to the Internet 19
HTTP - Hyper Text Transfer Protocol
• HTTP is a communication protocol.
• It defines mechanism for communication between (clients) browser and the web server.
• The communication between browser and server takes place in request and response pairs.
HTTP
Chapter 5 Introduction to the Internet 20
Domain Names or Web Site addresses are composed of the following parts:
1. The Protocol: e.g. http followed by (:) and (//).
2. WWW: This means that this address is a World Wide Web address.
3. Domain Name: the name or the abbreviation of the registered Organization or, may be, the person who are registered to get a web address.
Web Address
11
Chapter 5 Introduction to the Internet 21
• Domain names are used to identify one or more IP addresses.
• Domain Name System helps to resolve the host name to an address.
For example : http://unizwa.edu.om/index.php?contentid=173
• the domain name is unizwa.edu.om
Domain Name
Chapter 5 Introduction to the Internet 22
Every domain name has a suffix that indicates which top
• Education search engine - Noodle Education, Google Scholar.
Web search engine
Chapter 5 Introduction to the Internet 40
Internet privacy
• Internet privacy is the privacy and security level of personal data published via the Internet.
• Is the ability to control what information you would accept to be revealed about yourself over the Internet, and control who can access that information.
Internet Ethics & Internet Threats
21
Chapter 5 Introduction to the Internet 41
Internet privacy
• Your personal email can be used by third parties without your knowledge.
• Without you knowledge, third parties can track the websites you have visited.
Internet Ethics & Internet Threats
Chapter 5 Introduction to the Internet 42
Internet Threats
Internet privacy risks
• The Internet represents an insecure channel for exchanging information, leading to a high risk of Intrusion or Phishing.
Threats
• A web threat is any threat that uses the World Wide Web to facilitate cybercrime.
• Web threats use multiple types of malware and fraud.
Internet Ethics & Internet Threats
22
Chapter 5 Introduction to the Internet 43
Internet Threats
Intrusion
• Breaking into computers and computer networks, either for profit or just a challenge.
Phishing
• An Internet hacking activity used to steal secure user data, including username, password, bank account number, security PIN or credit card number.
Internet Ethics & Internet Threats
Chapter 5 Introduction to the Internet 44
Internet Threats
Pharming
• An Internet hacking activity used to redirect a legitimate website visitor to a different IP address.
Spyware
• An offline application that obtains data without a user's consent.
• When the computer is online, previously acquired data is sent to the spyware source.
Internet Ethics & Internet Threats
23
Chapter 5 Introduction to the Internet 45
Internet Threats
Malware
• An application used to illegally damage online and offline computer users through Trojans, viruses and spyware.
Viruses
• Small pieces of software that attach themselves to a real program.
Worms
• Are self-replicating computer programs.
Internet Ethics & Internet Threats
Chapter 5 Introduction to the Internet 46
Internet Threats
Trojan horses
• Harmful piece of software that looks legitimate.
Adware
• Software package, which automatically plays, or displays advertisements to a computer.
Spam
• Spam may be defined as unwanted emails. Spam is usually considered to be electronic junk mail or junk newsgroup postings.
Internet Ethics & Internet Threats
24
Chapter 5 Introduction to the Internet 47
Internet security
Internet security relies on specific resources and standards for protecting data that gets sent through the Internet. It helps to safeguard data.
Internet privacy violation risks may be minimized, as follows:
• Always use preventative software applications, such as anti-virus, anti-malware, anti-spam and firewalls.
• Avoid shopping on unreliable websites.
• Avoid exposing personal data on websites with lower security levels.
• Clear the browser's cache and browsing history on a consistent basis.
• Always use very strong passwords consisting of letters, numerals and special characters.
Internet security
Chapter 5 Introduction to the Internet 48
Internet security : Methods to Protect the Transfer of Data
Encryption: Is the process of transforming original information into unreadable data before sending through the Internet.
• Usually encrypted web pages are identified by “https” instead of “http” for the protocol in their web address starter.
Firewall: It is hardware or software that controls the access between networks.
• It is usually used as a shield between private networks and the Internet.
• All the messages whether incoming or outgoing must pass
through the firewall, and only authorized traffic is allowed.
Internet security
25
Chapter 5 Introduction to the Internet 49
Antivirus Programs
• Antivirus Programs and Internet Security Programs are also useful in protecting computer.