What is Internet The Internet is a worldwide











































- Slides: 43
What is Internet? The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW). www. Assignment. Point. com
What is intranet? An intranet is a private computer network that uses Internet protocols (IP) and network connectivity to securely share part of an organization's information within its members and users. n Intranet is basically "a private version of an Internet, " or a version of the Internet confined to an organization. n www. Assignment. Point. com
What is the difference between WWW and Internet? n The Internet and the World Wide Web are not synonymous. The Internet is a collection of interconnected computer networks. In contrast, the WWW is a collection of interconnected documents and other resources. The World Wide Web is one of the services accessible via the Internet, along with various others including e-mail, file sharing, online gaming and others. www. Assignment. Point. com
Who is the owner of the Internet? No one owns the internet n It is a public cooperative and independent network that is regulated by n n W 3 C (World Wide Web Consortium ) ( n W 3 C oversees research , sets standards & guidelines n I 2 (Internet 2) ( n I 2 conducts internet related research. It also conducts development projects. It develops and tests advanced Internet technologies www. Assignment. Point. com
How can one connect to the Internet? Slow-speed technology Dial-up access modem in your computer uses a standard telephone line to connect to the Internet Connection must be established each time you log on. High-speed connection Digital subscriber line (DSL), cable telephone Internet services (CATV), cable modem provide connections Connection is always on— whenever the computer is running www. Assignment. Point. com
What are the different options for connecting? n Existing telephone line n Cable television line n Personal satellite link n Wireless or cell phone service n High-speed telephone services n ISDN, DSL www. Assignment. Point. com
A brief history of Internet ARPANET Goal: To allow scientists at different locations to share information Networking project by Pentagon’s Advanced Research Projects Agency (ARPA) Goal: To function if part of network were disabled Became functional September 1969 www. Assignment. Point. com
What is an E-mail? n n E-mail, short for electronic mail and often abbreviated to e-mail, email or simply mail, is a store and forward method of composing, sending and storing messages over electronic communication systems. Every email consists of n n n Message header Body of the message Many online service providers provide free email account for users n Gmail (www. gmail. com), Yahoo Mail (www. mail. yahoo. com), Hotmail (www. hotmail. com) www. Assignment. Point. com
What about forwarding and attaching in email? n Forwarding n n You can forward an email you received. The original message is either copied directly in the body or as attachment and send to some other email address you specify. You can add your own note during forwarding Attachment n An email attachment is a computer file which is sent along with an e-mail message. The file may be sent as a separate message or as part of the message to which it is attached. www. Assignment. Point. com
Junk/Spam E-mail n n Spam is unwanted email. Do not open a spam email. Do not forward a spam email. Be very careful in opening a spam email. It is possible to figure out whether your email address is valid by sending spam. This can in turn be used to send more spam into your mailbox. Spam can be simply irritating as well as dangerous and harmful. Spam can carry virus. Spam emails can track your internet movements, steal your passwords, steal your bank accounts and money, and moreover cause real big problem for your life. Hence, the best line of defense is to delete spam as soon as you receive it. www. Assignment. Point. com
Netiquette n Netiquette is online jargon for “Internet etiquette”. Some of the professional etiquette includes: Do not send or forward spam Use uppercase and lowercase letters Check spelling Be careful what you send Be polite Be concise Be cautious with sarcasm and humor Use smileys cautiously : - ) Use the Bcc function for group mailings Don’t send replies to “all recipients” unless you want to so Don’t send huge attachments Explain all attachments in email body Stay alert for viruses Notify recipients of viruses www. Assignment. Point. com
IP and Domain Name n Each network device connected to the internet and intranet have a number given to it. This number is called IP (Internet Protocol). n The IP (Internet Protocol) is a protocol that uses datagrams to communicate over a packet-switched network. Text version of IP is called Domain Name n URL is unique address for a webpage. n www. Assignment. Point. com
Generic Top Level Domains aero - for the air transport industry. asia - for companies. organisations and individuals in the Asia-Pacific region. biz - for business use. cat - for Catalan language/culture. com - for commercial organizations, but unrestricted. coop - for cooperatives. edu - for post-secondary educational establishments. gov - for government entities within the United States at the federal, state, and local levels. info - for informational sites, but unrestricted. int - for international organizations established by treaty. jobs - for employment-related sites. mil - for the U. S. military. mobi - for sites catering to mobile devices. museum - for museums. name - for families and individuals. net - originally for network infrastructures, now unrestricted. org - originally for organizations now unrestricted. pro - for certain professions. tel - for services involving connections between the telephone network and the Internet www. Assignment. Point. com. travel - for travel agents, airlines, hoteliers, tourism bureaus, etc
Country Code top level domain n This list is extensive. You may view the complete list from http: //en. wikipedia. org/wiki/Country_code_ top-level_domain. bd - bangladesh n. au – australia n. ca – canada n. in - india n www. Assignment. Point. com
Webpage, Website, Homepage, Web is another nickname for WWW n Each electronic document in the web is called a webpage. n A website is a collection of related webpages. n The homepage (often written as home page) or main page is file that automatically loads when a web browser starts and when the browser's "home" button is pressed. n www. Assignment. Point. com
HTTP , Web Server, URL n n n HTTP (hypertext transfer protocol) is the protocol that allows web browsers to communicate with web servers. Web server is usually a computer program that is responsible for accepting HTTP requests and serving them HTTP responses along with optional data contents. Sometimes, a computer that runs such a computer program is called web server. URL (Uniform Resource Locator) is an internet address of a document on the web. www. Assignment. Point. com
Web Browser n Web Browser is the program that allows one to view Web Pages. n n Example: Microsoft Internet Explorer, Mozilla Firefox, etc A web browser basically Fetched and displays web pages n Can Send data to web server for processing and can receive information from web server. n www. Assignment. Point. com
Downloading n Downloading is the process of a computer receiving information. The speed of downloading can vary for various reasons : internet connection speed, system’s ability to handle download, firewall, etc. www. Assignment. Point. com
Search Engine n n Search Engine is a software that searches for information and returns sites which provide that information. One of the most popular search engine today is Google n n www. google. com/ Google is so popular that the word google is used now to refer to searching. “ Google the word online”. This means search the world online. www. Assignment. Point. com
Search Portals At the height of the dotcom boom, web surfers had a plethora of search engines to chose from: Atlavista, Excite, Infoseek, Lycos and many more. Today the major players of the past are mostly dead. n A few have soldiered on such as Ask. com but only after repeated redesign. n Google is so popular maybe because of its clean User Interface and high-quality search. n www. Assignment. Point. com
What are the basic types of websites? Portal n News n Informational n Business/marketing n Educational n Entertainment n Advocacy n Personal n www. Assignment. Point. com
Contd… Ø Ø Ø Ø A Web site that offers a variety of services from one convenient location is called a web portal. Example is www. yahoo. com News website is such a website that contains stories and articles relating to current or past events, life, money, sports, weather etc. Example is www. bdnews 24. com Informational website is such a website that contains factual information. Business/marketing website contains materials that promotes products. It may allow products to be purchased online through e-commerce. Example is www. ebay. com Entertainment website offers an interactive environment featuring music, video, sports, games, etc. Example is www. miniclip. com Advocacy website contain materials that state opinions, idea or content. Example is www. epinions. com Personal website is webpage maintained by individual. www. Assignment. Point. com
How are speed in a modem measured? n Speed is measured in terms of bits per second n V. 90 – theoretical maximum speed of 56 Kbps modem n Even with perfect connection, a 56 Kbps modem tops out at about 44 Kbps n Slightly faster speeds may be available with the new V. 92 and V. 44 modem standards n Downstream vs. upstream www. Assignment. Point. com
What is DSL? n DSL (Digital Subscriber Line) is a highspeed, always-on, Internet access technology that runs over standard phone lines n Several versions exist – ADSL, SDSL, HDSL n x. DSL – refers to entire group of DSL technologies www. Assignment. Point. com
What is an ISP? n ISP is a company that provides Internet access to businesses, organizations, and individuals n For example Bangladesh Online (BOL), Agni , Aftab IT, etc are some of the ISPs in Bangladesh www. Assignment. Point. com
How to select a password ? www. Assignment. Point. com
What is T 1 and T 3 line? n T 1 n high-speed 1. 544 Mbps digital network Popular for businesses and ISPs T 3 n Supports data rates of about 43 Mbps n Sometimes referred to as DS 3 (Digital Service -3) lines n Provide many of the links on the Internet backbone n Many US universities provide T 3 / T 1 line for free to its students, faculty and users n n www. Assignment. Point. com
What is a medium? n A medium is such that it can be used for presentation of information. n There are two ways to present some information n Unimedium n Multimedia presentation www. Assignment. Point. com
What is a multimedia computer system? n n A multimedia computer system is a computer system that has the capabilities to integrate two or more types of media for the purpose of generation, storage, representation, manipulation and access of multimedia information. Some of the components of multimedia include text, graphics, animation, audio, video, etc. Multimedia are used in presentation, video games, special effects, tv advertisements, natoks, cinema, etc www. Assignment. Point. com
Security Internet security is the techniques for ensuring that data stored in a computer can not be compromised by any unauthorized individuals. n Most security measures involve data encryption and passwords. n Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. n A password is a secret word or phrase that gives a user access to a particular program or www. Assignment. Point. com system. n
Contd. . n Information Systems Security deals with n Security of end systems n OS, files in a database, account information, logs, etc n Security of information in transit over a network n Ecommerce transaction, online banking, confidential email, file transfers, instant messaging etc www. Assignment. Point. com
What are the principles of computer security? n There are two principles. n Principle of easiest penetration: An intruder must be expected to use any available means of penetration. The penetration may not necessarily be by the most obvious means, nor is it necessarily the one against which the most solid defense has been installed. n Principle of adequate protection: Computer items must be protected only until they have absolutely lost their value. www. Assignment. Point. com
What are the types of Threats? n n n Interception n unauthorized party gaining access to an asset. Interruption n an asset of the system become lost, unavailable or unusable Modification n n not only unauthorized access, but also tampering with an asset Fabrication n addition of imaginary in information to a system www. Assignment. Point. com
MOM An attacker have n Method -- sufficient skill, tools and knowledge to initiate an attack n Opportunity -- Time and access to accomplish the attack n Motive -- Reasons to pursue the attack www. Assignment. Point. com
Security Goals n Confidentiality n n Integrity n n Resources can be accessed when needed by authorized means only Authenticity n n Assets can only be modified by authorized parties by authorized ways. Availability n n Resources stay hidden from unauthorized access It ensures that the sender of a message is correctly identified with an assurance that the identity is accurate Non-repudiation n It provides unforgivable evidence that a specific action has occurred. www. Assignment. Point. com
Vulnerabilities n Vulnerabilities exists in all three major categories of system Hardware Vulnerabilities n Software Vulnerabilities n Data Vulnerabilities n www. Assignment. Point. com
Unsecured Wireless Network n Hackers can easily decrypt wireless signals that contain much of the network's information, such as the network's SSID (Service Set Identifier). An unsecured wireless network can lead to fraudulent activities. This can be very damaging for you. www. Assignment. Point. com
My recommendations n Use a good quality firewall n n Windows XP and Vista comes preinstall with a built in firewall. However, these are not that good. I recommend using Norton Internet Security. Use a high quality antivirus n There are many antivirus in the market. I have been using Norton Antivirus for a long time. Norton Internet Security comes bundled with Norton Antivirus www. Assignment. Point. com
Contd. n Always clean your pc at least once a week to make sure cookies and clutters are gone n n CCleaner is a free software (freeware) available for download. It gets rid of all the unwanted junks from your computer Use a well known spyware remover n Lavasoft Adaware is really good for removing spywares. Use it occasionally. Best of all, it is free for private use www. Assignment. Point. com
Contd. . n Defragmenter n n Defragment your hard disk at least once a month. You can use the default windows defragmenter software to do this Be smart when you use your pc n n n Do not let any software to get installed unless you known the true identity of the software Try and avoid typing private details on public PCs, and always try and avoid visiting sites on public PCs that require you to enter your login details, e. g. An online banking account And before you enter you banking details, or any important passwords, delete your internet cookies and temporary internet files, as there maybe some that have the ability to track your personal information and what you type. www. Assignment. Point. com
Last Words: Internet Security – Just Wishful Thinking? n Thirty years into the personal computer era, and it seems like security is only getting worse. Computer viruses and worms have proven as resilient as common cold. The web, e-mail and instant messaging have given criminals unprecedented opportunities for fraud, scams, and electronic spying. Now that we have built a digital world on an insecure foundation, the solution for security are really hard. Our digital world is built on a pack of insecure cards. www. Assignment. Point. com
ECommerce E-commerce describes financial transactions that are conducted electronically over a computer network n Pretty much every demographics from all the countries of the world use ecommerce. It is getting popular exponentially day by day n www. Assignment. Point. com
Definitions n B 2 B (Business to Business) e-commerce n n B 2 C (Business to Consumer) e-commerce n n typical e-commerce activities that the typical Web surfer enjoys C 2 C (Consumer to Consumer) e-commerce n n involves one enterprise buying goods and services from another enterprise includes online auctions and rummage sales B 2 G (Business to Government) e-commerce n aims to help businesses sell to governments www. Assignment. Point. com