1. Trang chủ
  2. » Công Nghệ Thông Tin

Chapter 6: The Internet pptx

43 534 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề The Internet
Trường học Unknown University / Institution
Chuyên ngành Computer Science / Information Technology
Thể loại Lecture Notes
Định dạng
Số trang 43
Dung lượng 10,17 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Ũ Chapter Contents * Section A: Internet Technology * Section B: Fixed Internet Access * Section C: Portable and Mobile Internet Access * Section D: Internet Services * Section E: I

Trang 1

NEW PERSPECTIVES COMPUTER CONCEPTS

Chapter 6

The Internet

Trang 2

Ũ Chapter Contents

* Section A: Internet Technology

* Section B: Fixed Internet Access

* Section C: Portable and Mobile Internet

Access

* Section D: Internet Services

* Section E: Internet Security

Trang 4

Background

* The ARPANET, created in

1969, connected computers at UCLA, Stanford Research

Institute, University of Utah, and University of California at

santa Barbara

and supplies information to

people of all ages and interests

* With an estimated 200 million

nodes and 1 billion users, the Internet is huge

Trang 5

Internet Infrastructure

* The Internet is not owned or operated by any single

corporation or government

* The Internet backbone is a network of high-capacity

communications links that provides the main routes for data traffic across the Internet

* Backbone links and routers are maintained by

network service providers (NSPs}

* NSP equipment and links are tied together by

network access points (NAPs)

* An Internet service provider (ISP) is a company that

offers Internet access to individuals, businesses,

and smaller ISPs

Trang 6

Internet Infrastructure

" | Router to send and receive

Sy data over the Internet

Domain Web server

name forsubscriber +“ E-mail

Server Web pages k THIỆP

Trang 7

Internet Infrastructure

* To communicate with an ISP, your computer

uses some type of communications device,

such as a modem

Trang 8

UDP User Datagram Protocol

HTTP Hypertext Transfer Protocol

FTP File Transfer Protocol

POP Post Office Protocol

SMTP Simple Mail Transfer Protocol

VoIP Voice over Internet Protocol

IRC Internet Relay Chat

BitTorrent BitTorrent

Function Creates connections and exchanges packets of data Provides devices with unique addresses

An altemative data transport to TCP used for DNS, Voice over IP, and file sharing

Exchanges information over the Web Transfers files between local and remote host computers

Transfers mail from an e-mail server to a client Inbox

Transfers e-mail messages from client computers to an e-mail server

Transmits voice conversations over the Intemet Transmits text messages in real time between online users Distributes files using scattered clients rather than a server

Trang 9

Internet Protocols,

Addresses, and Domains

* A domain name is a key component of Web

addresses, e-mail addresses, and addresses

on the Web called URLs

@ DNS Stuff: DNStools, DNSho vue ẾY | ONS DNS Stuff: DNS tools,

network end do uff.c m

sg

Hostname Tests (e.g www.example.cc

Your IP: 12.195.116.188 ASN: 7018 [ATT-INTERNET4}]

Trang 11

Internet Protocols,

Addresses, and Domains

44 Domain name registration packages available from Network Solutions - Microsoft Internet Explorer

@) hit: / ewe networksoiutons comsdomain-name- | 8Ø 2 = > ` 6- % ns

Ni, ° A/Z rkSal : ( > LEARNING > PRODUCTS & ACCOUNT CUSTOMER

INetWOI kSo utions CENTER SERVICES MANAGER SUPPORT

=

Domain Names

Step 1 Enterup to 10 domain names

LEARN ABOUT DOMAIN HAMES

rockymtnphotos cứ You jet all the informatior |

| need to choose the nght solution

for

Examples: my-own-company.com =

imsbikes 1 2

Step2 Choos p RESOURCES

a cu !1

#] CI | | | | LÌ

jee Ov Prem na O OD oO 1* ree

` LÌ =: L - L — LÍ | ca WHY NETW/ORK SOLUTIONS?

We are the leading prowder of

Internet Servces Learn about our

The first step in registering a

domain name its to find out

whether the name is currently

in use or reserved for future use If a domain name ts not available, consider using a

different top-level domain,

such as biz instead of com

After you’ve found an

available domain name, you

can continue the registration process by filling out a simple

online form

Trang 12

Ũ Connection Speed

* Data travels over the Internet at an incredible

speed

*The elapsed time for data to make a round

trio from point A to point B and back to point

Trang 13

Connection Speed

* When upstream speeds differ from downstream

speeds, you have an asymmetric Internet

connection

* When upstream and downstream speeds are the

same, you have a symmetric Internet connection

* Internet connection options

— Fixed Internet access

— Portable Internet access

— Mobile Internet access

Trang 14

* DSL, and Dedicated Lines

* Cable Internet Service

* Satellite Internet Service

* Fixed Wireless Service

* Fixed Internet Connection Roundup

Trang 15

Dial-up Connections

* A dial-up connection is a fixed Internet

connection that uses a voiceband modem

and telephone lines to transport data between your computer and your ISP

To the Internet

Your computer Telephone

and modem wall jack

Trang 16

Dial-up Connections

* A voiceband modem converts the signals

from your computer into signals that can

travel over telephone lines

* Modem speed is measured in bits per second

D Digital signal a"

Trang 17

Ũ DSL, ISDN, and

Dedicated Lines

*T1, T3, and T4 lines are leased from the

telephone company, and offer fast, high-

capacity data transmission

Trang 18

DSL, and

Dedicated Lines

*DSL is a high-speed, digital, always-on

Internet access technology that runs over

— Most DSL installations require

A DSL filter entially a lin

° DSL modem extension For Sami e to ter

telephon “ape g the phon e, plu g

the filter i the wall jack, and Local Telephon Dat plug the Phòng cable into the fil-

Switching Statio to the ‘in ae et ter

=a ¢ yr

end | ines ADSL modem plugs into your

computer's USB or Ethernet port

Trang 19

Ũ Cable Internet Service

* Cable Internet service distributes always-on

broadband Internet access over the same infrastructure that offers cable television

Trang 20

Ũ Cable Internet Service

* Cable modems convert your computer’s

Signal into one that can travel over the CATV

network

* Always-on connection

Trang 21

Ũ Satellite Internet Service

* Satellite Internet service distributes always-

on, high-speed asymmetric Internet access

by broadcasting signals to and from a

personal satellite dish

* A satellite modem is a device that modulates

data signals from a computer into a

frequency band that can be carried to the

satellite dish where It is converted to another frequency, amplified, and transmitted

Trang 23

Downstream

speed (actual) Latency Short video (72 MB) download

Requirements

Monthly fee

Installation cost

Always-on

56 Kbps

33 Kbps

44 Kbps 100-200

ms

4 hours

Telephone line, ISP, voiceband modem

128 Kbps

128 Kbps

10-30

ms

78 minutes

Telephone line, ISDN service, ISDN terminal adapter

ms

5 minutes

Computer

located within

3 miles of local telephone switch; DSL modem

3 Mbps 10-20

ms 3.2 minutes

400 Kbps 1—3 seconds

24 minutes

Clear view

of southern sky; satellite dish and modem

70 Mbps 1.5-3 Mbps 10-50

ms 6.4 minutes

Trang 24

* Portable and Mobile WiMAX

* Portable Satellite Service

* Cellular Data Service

Chapter 6: The Internet

Trang 25

Wi-Fi Hotspots

A Wi-Fi hotspot is an area

In which the public can

access a Wi-Fi network that

offers Internet service

Wi-Fi does not typically

provide acceptable mobile Internet access because you can only remain

connected within range of

the network's hotspot

Trang 26

Cellular Data Services

* Using cellular phone technology to access

the Internet offers mobility that is not yet

possible with most of today’s wired or wireless computer network technologies

Service Speed

Analog voice service

ao ==- all No data service

Digital voice service

TDMA, and GSM netwo rks UTMS 2 Mbps

EDGE 384 Kbps Superior digital voice service 3G Broadband multimedia data

EV-DO 24M services HSUPA 5.76 Mbps

* Maximum theoretical speed; actual speeds are slower

Trang 27

Cellular Data Services

* The fastest cellular technologies

for Internet access are EDGE,

EV-DO, and HSUPA

* Most cellular service providers

offer a data service plan for

accessing the Internet

* You can use a cellular-ready

PDA, such as Palm Treo,

Blackberry, HP iPAQ, or Dell

Axim to directly access the

Trang 29

Real-Time Messaging

* A networked-based real-time messaging

system allows people to exchange short

messages while they are online

— Instant messaging (IM)

a® 7T U it Bese 2 FI} 584 - 1645)

- H-NNEMVEECLTrEE- in Brazil in 22 april, 15C0

2 to sail around the Cape

S$& 3 the world

Gamer Video

2 sailed around

Eevessions TsIk

List of 16th cantury inventions

e The Columbian Exchange introduces mary plants, animals and diseases to

the Old and New Worlds

« Modern square root symbol (y~

© The letter J is inroduced into the English alphabet

e Copemicus publishes his theory that the Earth and the other planets revolve around the Sun |1543

¢ Gregorian Calendar adopted by Catholic countries (1582)

& AOL Instant Messenger

pS [eu ARDY yak 3322's Buddy

Trang 30

Voice over IP

* VoIP (Voice over Internet

Protocol) or Voice over IP, cbie//

is a technology in which a

connection is used to place uJ

telephone calls instead of

the regular phone system

* To set up a standard VoIP

system, you can use an Ye | vitedireless

inexpensive ATA, IP phone, ~~ ư

wireless IP phone, or USB

Trang 31

— Quality can vary

— Must have power to work

Trang 32

FileZilla - Connected to e-course.com (ftp.e-course.com)

File Edit Transfer View Queue Server Help

&- bjt Qi) FSogeR F

Address: User Password Port Quickconnect | v

Command: RETR map2.gif ^

Hesponse 227 Entering Passive Mode (707.57.8.86.117.67)

Command: RETR map.htm Response 150 Opening BINARY mode data connection for map2.af (36467 bytes) Response 150 Opening ASC! mode data connection for map htm (1900 bytes)

Response 226 Transfer complete

Status Download successful v Local Ste: | SAMETiabtelevialersters ~ | Remote Site: | /mgh/ v

J downloads “ | Filename Filesize Filetype Da %

CÔ FolderTest 4# \index.htmi : 04/

9 instructors art Two files are selected | 94,

"n.» 3) map2 cif | for downloading 06/ @

(CÔ mícans32 =

Re < >

Š › Selected 2 files with 38367 bytes

Local Filename Size Direction Remote Filename Hast C:\Temp\downloads \map2 gif 3647 << - Ímgh/mao2.gif ftp.e-course.com

FTP clients such as FileZilla make it easy to upload and download files from an FTP server

Trang 33

p-psexch wy > Foders [ital

2) fo /iastudert password 123@ fip ub edu/pub/unx/examplesfest

Folder tasks

=) Renane this i

Bm Move this them

5 Copy this item

ae Deete ths iten

Other Pleces

2) €xarrptes , My Documents

Dowrioad to: €:\Temp Junk\s.out

Transfer rate: 102 KB/Sec

| Close thie dislog box when download compieies

aasssnssssasssssasssnssssssassssả W/hen the download is complete,

the safest procedure is to close the window and check the file with antivirus software before you run it

Trang 34

File Sharing

* P2P file sharing uses peer-

to-peer (P2P) protocols that

allow users to obtain files

from other users located

anywhere on the Internet

* BitTorrent is a file sharing

protocol that distributes the role of file server across a collection of dispersed

Destination

Trang 35

* Routers and NAT

* Virtual Private Networks

Chapter 6: The Internet

Trang 36

Intrusion Attempts

* An intrusion is any access to data or programs

by hackers, criminals, or other unauthorized

persons

* Looking for open ports is one of the most

common ways of gaining unauthorized access to

a network-based computer

* A port probe (or port scan) uses automated

software to locate computers that have open

ports and are vulnerable to unauthorized access

Trang 37

em has achieved a perfect ‘TruStealth" rating Nota

standpoint of the passing probes of any hacker, this machine d

Some questionable personal security

probe the prober", thus revealing themselves But your system

way Very nice

Port Service Status Security

SMTP Stealth

stems expose their users by attempting to

@ Internet | Protected !,

single packet — solicited or

security probing tests Your

cho Requests) From the oes not exist on the Internet

“counter-

wisely remained silent in every

Implications

g cnil> Stealth thers a Paneer VHATSOEVER that a port [or even any computer)

21 FTP Stealth port (or even any computer)

22 SSH | Stealth port {or even any computer)

23 Telnet Stealth ere a ee

Trang 38

Securing Ports

* One of the easiest

steps to enhance your

packets attempting to enter or leave a

Trang 39

| oadcom 440x 10/100 Integrated Controller

Searc" \ Folders (iit)

ee Fie and Printer Sharing for Microsoft Networks

IB QoS Packet Schedule

%” Hemet Prctocal {TCPAP)

| | oes nw) | | List nf |

When this box is not

checked, file and printer sharing is deactivated

rcarcute

_ ] S+cw icon in netfication are2 when connected

Trang 40

Ũ Routers

* Routers are intended to work on LANs to

monitor and direct packets being transported

from one device to another

* A routable IP address is one which can be

accessed by packets on the Internet

* A private IP address is a non-routable IP

address that can be used within a LAN, but

not for Internet data transport

Trang 41

Virtua Private Networks

* It is possible to secure remote connections

by setting up virtual private network (VPN)

access to a remote access server in the

corporate office

* Access to a VPN is usually by invitation only

Employees who need to access a VPN are

given the necessary instructions, addresses,

and passwords to make connections

Trang 42

Virtual Private Networks

Virtual Private Network

Trang 43

NEW PERSPECTIVES COMPUTER CONCEPTS

Chapter 6 Complete

The Internet

Ngày đăng: 06/03/2014, 09:21

TỪ KHÓA LIÊN QUAN