7. Definition of Internet
By the turn of the century, information, including access to the
Internet, will be the basis for personal, economic, and political
advancement. The popular name for the Internet is the information
superhighway.
The Internet links are computer networks all over the world so that
users can share resources and communicate with each other. Some
computers have direct access to all the facilities on the Internet
such as the universities. And other computers, eg privately-owned
ones, have indirect links through a commercial service provider, who
offers some or all of the Internet facilities.
8. Who Pays for the Internet?
There is no clear answer to this
question because the Internet is not
one "thing", its many things. No one
central agency exists that charges
individual Internet users.
9. Electronic mail, or e-mail, is probably the
most popular and widely used Internet
function. E-mail, email, or just mail, is a fast
and efficient way to communicate with friends
or colleagues. You can communicate with one
person at a time or thousands
Electronic mail on
the internet:
10. Domains
EDU Educational sites
COM Commercial sites
GOV Government sites
NET Network administrative organizations
MIL Military sites
ORG Organizations
.xx where xx is the country code (e.g., .eg for Egypt).
11. Introduction to Gopher:
Gopher is a client/server system that
allows you to access many Internet
resources simply by making selections
from a sequence of menus. Each time
you make a selection, Gopher carries
out your request to the computer that
contains the information and "serves"
it up.
12. Where did Gopher come
from?
"Born" in April 1991, gopher began as a
project at the Microcomputer,
Workstation, and Networks Center at
the University of Minnesota to help
people on campus get answers to
computer-related questions. At the
time, the computer center staff had
accumulated answers to thousands of
questions regarding computers and
software.
13. Why is it called
Gopher?
The name "Gopher" is appropriate for three
reasons:
1.Just as a real gopher successfully navigates
beneath the prairie, the Internet Gopher tunnels
through the invisible paths of the Internet to
help you find the information you want.
2. The name refers to someone who fetches
things or provides service for other people.
3. The Golden Gopher is the mascot of the
University of Minnesota.
14. A look at search
engines:
The World Wide Web is "indexed" through the
use of search engines, which are also referred to
as "spiders," "robots," "crawlers," or "worms".
These search engines comb through the Web
documents, identifying text that is the basis for
keyword searching. Each search engine works in a
different way. Some engines scan for information
in the title or header of the document; others
look at the bold "headings" on the page for their
information. The fact that search engines gather
information differently means that each will
probably yield different results.
15. History Of Internet
Defense Advanced Research Projects
Agency (DARPA) in late 1962 to head the
work to develop it.
The Internet, then known as ARPANET,
was brought online in 1969 under a
contract let by the renamed Advanced
Research Projects Agency (ARPA) which
initially connected four major computers
at universities in the southwestern US
16. Who was the first to
use the Internet?
Charley Kline at UCLA sent the first
packets on ARPANet as he tried to
connect to Stanford Research
Institute on Oct 29, 1969.
17. Did Al Gore invent the
Internet?
According to a CNN transcript of an
interview with Wolf Blitzer, Al Gore
said,"During my service in the United
States Congress, I took the initiative in
creating the Internet." Al Gore was not
yet in Congress in 1969 when ARPANET
started or in 1974 when the term Internet
first came into use. Gore was elected to
Congress in 1976.
20. How does Internet work?
The unique thing about the Internet is that it
allows many different computers to connect and
talk to each other. This is possible because of a
set of standards, known as protocols, that govern
the transmission of data over the network:
TCP/IP (Transmission Control Protocol/Internet
Protocol). Most people who use the Internet
aren't so interested in details related to these
protocols. They do, however, want to know what
they can do on the Internet and how to do it
effectively.
21. Internet Addresses
Because the Internet is a global network
of computers each computer connected to
the Internet must have a unique address.
Internet addresses are in the form
nnn.nnn.nnn.nnn where nnn must be a
number from 0 - 255. This address is
known as an IP address.
22. Protocol Stacks and
Packets
Your computer is connected to the
Internet and has a unique address. How
does it 'talk' to other computers
connected to the Internet? An example
should serve here: Let's say your IP
address is 1.2.3.4 and you want to send a
message to the computer 5.6.7.8. The
message you want to send is "Hello
computer 5.6.7.8!".
23. Domain Names and
Address Resolution
The DNS is a distributed database
which keeps track of computer's names
and their corresponding IP addresses
on the Internet.
Many computers connected to the
Internet host part of the DNS database
and the software that allows others to
access it. These computers are known as
DNS servers.
24. Application Protocols: HTTP
and the World Wide Web
One of the most commonly used services on the
Internet is the World Wide Web (WWW). The
application protocol that makes the web work is
Hypertext Transfer Protocol or HTTP. Do not
confuse this with the Hypertext Markup
Language (HTML). HTML is the language used to
write web pages. HTTP is the protocol that web
browsers and web servers use to communicate
with each other over the Internet.
25. Uniform Resource
Locators, or URLs:
A Uniform Resource Locator or URL is the
address of a document you'll find on the
WWW. Your WWW browser interprets
the information in the URL in order to
connect to the proper Internet server and
to retrieve your desired document.
26. Transmission Control
Protocol
Under the application layer in the protocol stack
is the TCP layer. When applications open a
connection to another computer on the Internet,
the messages they send (using a specific
application layer protocol) get passed down the
stack to the TCP layer. TCP is responsible for
routing application protocols to the correct
application on the destination computer.
27. Internet Protocol
Unlike TCP, IP is an unreliable, connectionless
protocol. IP doesn't care whether a packet
gets to its destination or not. Nor does IP
know about connections and port numbers. IP's
job is too send and route packets to other
computers. IP packets are independent
entities and may arrive out of order or not at
all.
30. Internet security
Internet security is a branch of computer security
specifically related to the Internet. Its objective is
to establish rules and measures to use against attacks
over the Internet. The Internet represents an
insecure channel for exchanging information leading
to a high risk of intrusion or fraud, such as phishing.
Different methods have been used to protect the
transfer of data, including encryption.
31. Security problems
Most of the security problems encountered
on the Internet are due to human mistakes.
The first level of security "leaks" usually
occurs during the development of the
website. If a website developer doesn't
correctly plan or proof test his scripts, an
eventual hacker could extract confidential
information from the website itself. This is
usually done by exploiting particular errors
or by inserting some particular code
snippets into an input field or website URL.
32. Types of security
1. Network layer security
2. IP Protocol
Electronic mail security (E-mail)
1. Pretty Good Privacy (PGP)
2. Multipurpose Internet Mail
Extensions (MIME)
3. Secure/Multipurpose Internet Mail
Extensions (S/MIME)
4. Message Authentication Code
33. Firewalls
A firewall controls access between
networks. It generally consists of
gateways and filters which vary from
one firewall to another. Firewalls also
screen network traffic and are able to
block traffic that is dangerous.
Firewalls act as the intermediate server
between SMTP and HTTP connections.
34. Role of firewalls in Internet
security and web security
Firewalls impose restrictions on incoming
and outgoing packets to and from private
networks. All the traffic, whether
incoming or outgoing, must pass through
the firewall; only authorized traffic is
allowed to pass through it. Firewalls create
checkpoints between an internal private
network and the public Internet, also
known as choke points.
36. Antivirus
Antivirus programs and Internet security
programs are useful in protecting a computer or
programmable device from malware.
Such programs are used to detect and usually
eliminate viruses; however, it is now common to
see security suites, containing also firewalls, anti-
spyware, theft protection, and so on to more
thoroughly protect users.
39. Advantages
• E-mail:
• 24 hours a day - 7 days a week:
• Information:
• Online Chat:
• Services:
• Communities:
• Ecommerce:
• Software Downloads:
• Entertainment:
40. Disadvantages
• Theft of Personal information:
• Negative effects on family
communication:
• Internet addiction:
• Children using the Internet
• Virus threat:
• Spamming:
41. The Disadvantages of the
Internet at Home
• Isolation
• Addiction
• Inaccurate Information
• Hacking of Personal Information
• Viruses
• Inappropriate Websites
44. The Future of the internet
– Some of the major trends shaping the future of the
Internet are summarized below, along with extrapolated
predictions:
– Globalism
– Communities
– Virtual reality
– Bandwidth.
– Wireless.
– Grids
– Integration
45. Audio web surfing
Building the web
with standards
and accessibility
in mind brings
the Internet to as
wide an audience
as possible.
46. Web surf on any device
• It seems the tech
industry is eager to
integrate the Internet
into every device these
days. It’s the equivalent
to adding a digital clock
to a coffee maker. Why
not? Adding a touch-
screen to your fridge and
other appliances might
create new opportunities
and challenges for
interfacing
Dishwasher Safe
47. • Input revisited
• Mobile networking
• The end of .com domination
• IE6 stops being used