1. E-Research Paper
A Research Study presented to:
Mr. Jonathan Arriola
College of Arts and Sciences
Rizal Memorial Colleges
In Partial Fulfillment
Of the Requirements for the Subject
Internet & MS Power point
by: Ms. April M. Moneva
2. The internet
*How does the internet work?
The Internet is a worldwide collection of computer networks,
cooperating with each other to exchange data using a common
software standard. Through telephone wires and satellite links, Internet
users can share information in a variety of forms. The size, scope and
design of the Internet allows users to:
*connect easily through ordinary personal computers
and local phone numbers;
*exchange electronic mail (E-mail) with friends and
colleagues with accounts on the Internet;
*post information for others to access, and update it
frequently;
*access multimedia information that includes sound,
photographic images and even video; and
*access diverse perspectives from around the world.
An additional attribute of the Internet is that it lacks a central authority
—in other words, there is no "Internet, Inc." that controls the Internet.
Beyond the various governing boards that work to establish policies
and standards, the Internet is bound by few rules and answers to no
single organization.
In February 1996, President Clinton signed into law the Communications Decency
Act, which provides criminal penalties for those who post or transmit "indecent"
material via the Internet. This law, however, has been challenged in U.S. courts by
those who feel it would unfairly prohibit many legitimate uses of the Internet, and
was ruled unconstitutional in July 1996. The federal government, however, is
preparing an appeal.
3. *The history of the internet
Many people think that the Internet is a recent innovation, when in fact the
essence of it has been around for over a quarter century. The Internet began as
ARPAnet, a U.S. Department of Defense project to create a nationwide
computer network that would continue to function even if a large portion of it
were destroyed in a nuclear war or natural disaster.
During the next two decades, the network that evolved was used primarily by
academic institutions, scientists and the government for research and
communications. The appeal of the Internet to these bodies was obvious, as it
allowed disparate institutions to connect to each others' computing systems and
databases, as well as share data via E-mail.
The nature of the Internet changed abruptly in 1992, when the U.S. government
began pulling out of network management, and commercial entities offered
Internet access to the general public for the first time. This change in focus
marked the beginning of the Internet's astonishing expansion.
According to a survey conducted by Commerce Net and Nielsen Media
Research in early 1997, nearly one out of every four Americans over the age of
16 is an Internet user. And the number of users worldwide is believed to be well
into the tens of millions. Other statistics are equally startling:
•A CNN report stated that Internet traffic in 1996 was 25 times what it
was just two years earlier.
•The market research group IntelliQuest pegged the number of Internet
users in the U.S. in late 1996 at 47 million - a 34 percent increase over
the first quarter of that year.
•According to IBM, 146 countries currently have at least some level of
Internet access.
•The technology research firm IDG estimates that by century's end, one
billion people worldwide will have access to personal computers—more
than doubling the computer-savvy population of 1996.
The Internet explosion coincides with the advent of increasingly powerful yet
reasonably priced personal computers with easy-to-use graphical operating
systems. The result has been an attraction of recent computer "converts" to the
network, and new possibilities for exploiting a wealth of multimedia
capabilities.
4. *What kinds of information are available?
In addition to text documents, the Internet makes available graphics
files (digitized photographs and artwork), and even files that contain
digitized sound and video. Through the Internet, you can download
software, participate in interactive forums where users post and
respond to public messages, and even join "chats," in which you and
other users type (and, in some cases, speak) messages that are
received by the chat participants instantly.
*How do people use the internet?
Obviously, the Internet can bring you a whole host of capabilities. But
how can they be put to practical use?
Among the ways that users like yourself are taking advantage of the
Internet are:
*Sharing research and business data
among colleagues and like- minded
individuals.
*Communicating with others and
transmitting files via E-mail.
*Requesting and providing assistance
with problems and questions.
*Marketing and publicizing products and
services.
*Gathering valuable feedback and
suggestions from customers and business
partners.
The Internet's potential is limited only by users' vision and creativity.
And as the Internet grows, new and innovative uses will surely follow.
5. Operating System Standards
and Practices
• E-mail, for exchange of electronic mail messages.
• USENET newsgroups, for posting and responding to
public "bulletin board" messages.
• File Transfer Protocol (FTP), a system for storing and
retrieving data files on large computer systems.
•
• Gopher, a method of searching for various text-based
Internet resources (largely obsolete).
• TELNET, a way of connecting directly to computer
systems on the Internet.
• Internet Relay Chat (IRC), a system for sending public
and private messages to other users in "real time"—
that is, your message appears on the recipient's screen
as soon as you type it.
• CU-SeeMe, a videoconferencing system that allows
users to send and receive sound and pictures
simultaneously over the Internet.
• The World Wide Web
6. Data Management
A database management system (DBMS) is a software package with
computer programs that controls the creation, maintenance, and use of
a database. It allows organizations to conveniently develop databases
for various applications.
A database is an integrated collection of data records, files, and other
objects. A DBMS allows different user application programs to
concurrently access the same database. DBMSs may use a variety of
database models, such as the relational model or object model, to
conveniently describe and support applications. It typically supports
query languages, which are in fact high-level programming languages,
dedicated database languages that considerably simplify writing
database application programs.
Database languages also simplify the database organization as well as
retrieving and presenting information from it. A DBMS provides facilities
for controlling data access, enforcing data integrity, managing
concurrency control, and recovering the database after failures and
restoring it from backup files, as well as maintaining database security.
,
7. Network Management
Network management refers to the activities, methods, procedures, and tools that pertain to
the operation, administration, maintenance, and provisioning of networked systems.[1]
Operation deals with keeping the network (and the services that the network provides) up and
running smoothly. It includes monitoring the network to spot problems as soon as possible,
ideally before users are affected.
Administration deals with keeping track of resources in the network and how they are assigned. It
includes all the "housekeeping" that is necessary to keep the network under control.
Maintenance is concerned with performing repairs and upgrades—for example, when equipment
must be replaced, when a router needs a patch for an operating system image, when a new
switch is added to a network. Maintenance also involves corrective and preventive measures to
make the managed network run "better", such as adjusting device configuration parameters.
Provisioning is concerned with configuring resources in the network to support a given service.
For example, this might include setting up the network so that a new customer can receive voice
service.
A common way of characterizing network management functions is FCAPS—Fault,
Configuration, Accounting, Performance and Security.
8. A software development kit (SDK or "devkit") is typically a set of
software development tools that allows for the creation of applications for a
certainsoftware package, software framework, hardware platform,
computer system, video game console, operating system, or similar platform.
It may be something as simple as an application programming interface (API)
in the form of some files to interface to a particular programming language or
include sophisticated hardware to communicate with a certain
embedded system. Common tools include debugging aids and other utilities
often presented in an integrated development environment (IDE). SDKs also
frequently include sample code and supporting technical notes or other
supporting documentation to help clarify points from the primary reference
material.
SDKs may have attached licenses that make them unsuitable for building
software intended to be developed under an incompatible license. For
example, a proprietary SDK will probably be incompatible with
free software development, while a GPL-licensed SDK could be incompatible
with proprietary software development. LGPL SDKs are typically safe for
proprietary development.
A software engineer typically receives the SDK from the target system
developer. Often the SDK can be downloaded directly via the Internet. Many
SDKs are provided for free to encourage developers to use the system or
language. Sometimes this is used as a marketing tool.
An SDK for an operating system add-on (for instance, QuickTime for Mac OS
) may include the add-on software itself, to be used for development
purposes, if not necessarily for redistribution. An interesting situation arises
here between platforms where it is possible to develop applications that can
at least start up on a system configuration without the add-on installed, and
use a Gestalt-style run-time environment query to determine if the add-on is
present, and ones where the application will simply fail to start. In other
words, it is possible to build a single binary that will run on configurations with
and without the add-on present, albeit operating with reduced functionality in
the latter situation.
Providers of SDKs for specific systems or subsystems may sometimes
substitute a more specific term instead of software. For instance, both
Microsoft andApple provide driver development kits (DDK) for developing
device drivers.
9. What is a Local-Area Network (LAN)?
A local-area network (LAN) is a computer network that spans a
relatively small area. Most LANs are confined to a single building or group
of buildings, however, one LAN can be connected to other LANs over any
distance via telephone lines and radio waves. A system of LANs connected
in this way is called a wide-area network (WAN).
Most LANs connect workstations and personal computers.
Each node(individual computer ) in a LAN has its own CPU with which it
executesprograms, but it also is ableto access data and devices anywhere
on the LAN. This means that many users can share expensive devices,
such aslaser printers, as well as data. Users can also use the LAN to
communicate with each other, by sending e-mail or engaging in chat
sessions.
LANs are capable of transmitting data at very fast rates, much
faster than data can be transmitted over a telephone line; but the distances
are limited, and there is also a limit on the number of computers that can be
attached to a single LAN.
10. LAN Resources
The Big-LAN FAQ is for the Big-LAN mailing list, a mailing list for discussion of
issues in designing and operating Campus-Size Local Area Networks, especially
complex nets utilizing multiple technologies and supporting multiple protocols.
Topics include repeaters, bridges, routers and gateways; how to incorporate
smaller Personal-Computer type LANs into the campus-wide LAN; how to unify the
mail systems, etc..
The Interactive Network Design Manual is a set of essays aimed at helping network
professionals successful design and troubleshoot computer networks. A new
chapter is added each month. Topics covered include fault tolerance, Internet
connectivity, middleware, troubleshooting token ring, web based networking
resources, firewalls, ISDN, virtual LANs, NT networks, messaging systems, frame
relay, scalable remote access, video conferencing, and performance tuning.
Networking Tutorials, from UNH's InterOperability Lab, includes papers on ATM,
ethernet, FDDI, 100Base technology, fibre technology, TCP/IP, network
management, and token ring.
The Web66 Network Construction Set, by Stephen E. Collins, gives one an
overview of 10BaseT networks and how to analyze and understand modern
networks. It will also give you a firm foundation to begin learning how to plan your
own school network. Not enough that you could do it yourself without more training,
but enough so that you can watch over and understand the activities of your
network provider or consultant.
RFC 1983 is a pretty complete glossary of terms relating the LAN to the Internet.
Charles Spurgeon's Ethernet Page provides an extensive collection of information
about Ethernet (IEEE 802.3) local area network technology, including the original
10-Mbps system, the 100-Mbps Fast Ethernet system, and Gigabit Ethernet.
The Ethernet FAQ includes information about ethernet and standards, cabling
information, ethernet devices and components, errors and related terms, testing
and troubleshooting, and more.
The Ethernet Codes Master Page contain collected information on the various
codes used on IEEE 802.3 and Ethernet. Codes are sorted by type, vendor, and
multicast.
Dan Kegel's Fast Ethernet Page is a collection of pointers to information about
100BaseX, including adapters, white papers, hubs, switches, protocol and
hardware specifications, and vendors.
The Token Ring FAQ covers general token ring information, the token ring physical
layer, the token ring data link layer, errors and troubleshooting, and other sources
of token ring information.
The ANSI FDDI Home Page provides access to status information relating to
X3T12 efforts, working documents, and links to the FDDI FAQ, FDDI tutorial and
related FTP sites..
The InterOperability Lab Tutorials offers tutorials and testing information on ADSL,
ATM, DOCSIS, Ethernet, Fast Etherenet, FDDI, Fibre CHannel, GigE, IP, MPLS,
Network Management, Token Ring, VG-AnyLAN, VLAN, Wireless, and more.
The Telecommunications Technology Resources Page is an attempt to organize
the various resources available on the internet by topic. It starts out with the basics
of telecom, working it's way to LANS, the internet, Frame, ATM, SMDS, LMDS,
DSL, cable modems, sonet, wireless communication, spred spectrum, satellite,
PCS, and more.
11. A Wide Area Network (WAN)
is a network that covers a broad area (i.e.,
any telecommunications network that links across
metropolitan, regional, or national boundaries)
using private or public network transports. Business
and government entities utilize WANs to relay data
among employees, clients, buyers, and suppliers
from various geographical locations. In essence,
this mode of telecommunication allows a business
to effectively carry out its daily function regardless
of location. The Internet can be considered a WAN
as well, and is used by businesses, governments,
organizations, and individuals for almost any
purpose imaginable.[1]
Related terms for other types of networks
are personal area networks (PANs), local area
networks(LANs), campus area
networks (CANs), or metropolitan area
networks (MANs) which are usually limited to
a room, building, campus or specific
metropolitan area (e.g., a city) respectively.