Ũ Chapter Contents * Section A: Internet Technology * Section B: Fixed Internet Access * Section C: Portable and Mobile Internet Access * Section D: Internet Services * Section E: I
Trang 1NEW PERSPECTIVES COMPUTER CONCEPTS
Chapter 6
The Internet
Trang 2Ũ Chapter Contents
* Section A: Internet Technology
* Section B: Fixed Internet Access
* Section C: Portable and Mobile Internet
Access
* Section D: Internet Services
* Section E: Internet Security
Trang 4
Background
* The ARPANET, created in
1969, connected computers at UCLA, Stanford Research
Institute, University of Utah, and University of California at
santa Barbara
and supplies information to
people of all ages and interests
* With an estimated 200 million
nodes and 1 billion users, the Internet is huge
Trang 5
Internet Infrastructure
* The Internet is not owned or operated by any single
corporation or government
* The Internet backbone is a network of high-capacity
communications links that provides the main routes for data traffic across the Internet
* Backbone links and routers are maintained by
network service providers (NSPs}
* NSP equipment and links are tied together by
network access points (NAPs)
* An Internet service provider (ISP) is a company that
offers Internet access to individuals, businesses,
and smaller ISPs
Trang 6
Internet Infrastructure
" | Router to send and receive
Sy data over the Internet
Ỉ
Domain Web server
name forsubscriber +“ E-mail
Server Web pages k THIỆP
Trang 7
Internet Infrastructure
* To communicate with an ISP, your computer
uses some type of communications device,
such as a modem
Trang 8UDP User Datagram Protocol
HTTP Hypertext Transfer Protocol
FTP File Transfer Protocol
POP Post Office Protocol
SMTP Simple Mail Transfer Protocol
VoIP Voice over Internet Protocol
IRC Internet Relay Chat
BitTorrent BitTorrent
Function Creates connections and exchanges packets of data Provides devices with unique addresses
An altemative data transport to TCP used for DNS, Voice over IP, and file sharing
Exchanges information over the Web Transfers files between local and remote host computers
Transfers mail from an e-mail server to a client Inbox
Transfers e-mail messages from client computers to an e-mail server
Transmits voice conversations over the Intemet Transmits text messages in real time between online users Distributes files using scattered clients rather than a server
Trang 9
Internet Protocols,
Addresses, and Domains
* A domain name is a key component of Web
addresses, e-mail addresses, and addresses
on the Web called URLs
@ DNS Stuff: DNStools, DNSho vue ẾY | ONS DNS Stuff: DNS tools,
network end do uff.c m
sg
Hostname Tests (e.g www.example.cc
Your IP: 12.195.116.188 ASN: 7018 [ATT-INTERNET4}]
Trang 11
Internet Protocols,
Addresses, and Domains
44 Domain name registration packages available from Network Solutions - Microsoft Internet Explorer
@) hit: / ewe networksoiutons comsdomain-name- | 8Ø 2 = > ` 6- % ns
Ni, ° A/Z rkSal : ( > LEARNING > PRODUCTS & ACCOUNT CUSTOMER
INetWOI kSo utions CENTER SERVICES MANAGER SUPPORT
=
Domain Names
Step 1 Enterup to 10 domain names
LEARN ABOUT DOMAIN HAMES
rockymtnphotos cứ You jet all the informatior |
| need to choose the nght solution
for
Examples: my-own-company.com =
imsbikes 1 2
Step2 Choos p RESOURCES
a cu !1
#] CI | | | | LÌ
jee Ov Prem na O OD oO 1* ree
` LÌ =: L - L — LÍ | ca WHY NETW/ORK SOLUTIONS?
We are the leading prowder of
Internet Servces Learn about our
The first step in registering a
domain name its to find out
whether the name is currently
in use or reserved for future use If a domain name ts not available, consider using a
different top-level domain,
such as biz instead of com
After you’ve found an
available domain name, you
can continue the registration process by filling out a simple
online form
Trang 12Ũ Connection Speed
* Data travels over the Internet at an incredible
speed
*The elapsed time for data to make a round
trio from point A to point B and back to point
Trang 13
Connection Speed
* When upstream speeds differ from downstream
speeds, you have an asymmetric Internet
connection
* When upstream and downstream speeds are the
same, you have a symmetric Internet connection
* Internet connection options
— Fixed Internet access
— Portable Internet access
— Mobile Internet access
Trang 14* DSL, and Dedicated Lines
* Cable Internet Service
* Satellite Internet Service
* Fixed Wireless Service
* Fixed Internet Connection Roundup
Trang 15
Dial-up Connections
* A dial-up connection is a fixed Internet
connection that uses a voiceband modem
and telephone lines to transport data between your computer and your ISP
To the Internet
Your computer Telephone
and modem wall jack
Trang 16
Dial-up Connections
* A voiceband modem converts the signals
from your computer into signals that can
travel over telephone lines
* Modem speed is measured in bits per second
D Digital signal a"
Trang 17Ũ DSL, ISDN, and
Dedicated Lines
*T1, T3, and T4 lines are leased from the
telephone company, and offer fast, high-
capacity data transmission
Trang 18
DSL, and
Dedicated Lines
*DSL is a high-speed, digital, always-on
Internet access technology that runs over
— Most DSL installations require
A DSL filter entially a lin
° DSL modem extension For Sami e to ter
telephon “ape g the phon e, plu g
the filter i the wall jack, and Local Telephon Dat plug the Phòng cable into the fil-
Switching Statio to the ‘in ae et ter
=a ¢ yr
end | ines ADSL modem plugs into your
computer's USB or Ethernet port
Trang 19Ũ Cable Internet Service
* Cable Internet service distributes always-on
broadband Internet access over the same infrastructure that offers cable television
Trang 20Ũ Cable Internet Service
* Cable modems convert your computer’s
Signal into one that can travel over the CATV
network
* Always-on connection
Trang 21
Ũ Satellite Internet Service
* Satellite Internet service distributes always-
on, high-speed asymmetric Internet access
by broadcasting signals to and from a
personal satellite dish
* A satellite modem is a device that modulates
data signals from a computer into a
frequency band that can be carried to the
satellite dish where It is converted to another frequency, amplified, and transmitted
Trang 23Downstream
speed (actual) Latency Short video (72 MB) download
Requirements
Monthly fee
Installation cost
Always-on
56 Kbps
33 Kbps
44 Kbps 100-200
ms
4 hours
Telephone line, ISP, voiceband modem
128 Kbps
128 Kbps
10-30
ms
78 minutes
Telephone line, ISDN service, ISDN terminal adapter
ms
5 minutes
Computer
located within
3 miles of local telephone switch; DSL modem
3 Mbps 10-20
ms 3.2 minutes
400 Kbps 1—3 seconds
24 minutes
Clear view
of southern sky; satellite dish and modem
70 Mbps 1.5-3 Mbps 10-50
ms 6.4 minutes
Trang 24* Portable and Mobile WiMAX
* Portable Satellite Service
* Cellular Data Service
Chapter 6: The Internet
Trang 25
Wi-Fi Hotspots
A Wi-Fi hotspot is an area
In which the public can
access a Wi-Fi network that
offers Internet service
Wi-Fi does not typically
provide acceptable mobile Internet access because you can only remain
connected within range of
the network's hotspot
Trang 26
Cellular Data Services
* Using cellular phone technology to access
the Internet offers mobility that is not yet
possible with most of today’s wired or wireless computer network technologies
Service Speed
Analog voice service
ao ==- all No data service
Digital voice service
TDMA, and GSM netwo rks UTMS 2 Mbps
EDGE 384 Kbps Superior digital voice service 3G Broadband multimedia data
EV-DO 24M services HSUPA 5.76 Mbps
* Maximum theoretical speed; actual speeds are slower
Trang 27
Cellular Data Services
* The fastest cellular technologies
for Internet access are EDGE,
EV-DO, and HSUPA
* Most cellular service providers
offer a data service plan for
accessing the Internet
* You can use a cellular-ready
PDA, such as Palm Treo,
Blackberry, HP iPAQ, or Dell
Axim to directly access the
Trang 29
Real-Time Messaging
* A networked-based real-time messaging
system allows people to exchange short
messages while they are online
— Instant messaging (IM)
a® 7T U it Bese 2 FI} 584 - 1645)
- H-NNEMVEECLTrEE- in Brazil in 22 april, 15C0
2 to sail around the Cape
S$& 3 the world
Gamer Video
2 sailed around
Eevessions TsIk
List of 16th cantury inventions
e The Columbian Exchange introduces mary plants, animals and diseases to
the Old and New Worlds
« Modern square root symbol (y~
© The letter J is inroduced into the English alphabet
e Copemicus publishes his theory that the Earth and the other planets revolve around the Sun |1543
¢ Gregorian Calendar adopted by Catholic countries (1582)
& AOL Instant Messenger
pS [eu ARDY yak 3322's Buddy
Trang 30
Voice over IP
* VoIP (Voice over Internet
Protocol) or Voice over IP, cbie//
is a technology in which a
connection is used to place uJ
telephone calls instead of
the regular phone system
* To set up a standard VoIP
system, you can use an Ye | vitedireless
inexpensive ATA, IP phone, ~~ ư
wireless IP phone, or USB
Trang 31— Quality can vary
— Must have power to work
Trang 32
FileZilla - Connected to e-course.com (ftp.e-course.com)
File Edit Transfer View Queue Server Help
&- bjt Qi) FSogeR F
Address: User Password Port Quickconnect | v
Command: RETR map2.gif ^
Hesponse 227 Entering Passive Mode (707.57.8.86.117.67)
Command: RETR map.htm Response 150 Opening BINARY mode data connection for map2.af (36467 bytes) Response 150 Opening ASC! mode data connection for map htm (1900 bytes)
Response 226 Transfer complete
Status Download successful v Local Ste: | SAMETiabtelevialersters ~ | Remote Site: | /mgh/ v
J downloads “ | Filename Filesize Filetype Da %
CÔ FolderTest 4# \index.htmi : 04/
9 instructors art Two files are selected | 94,
"n.» 3) map2 cif | for downloading 06/ @
(CÔ mícans32 =
Re < >
Š › Selected 2 files with 38367 bytes
Local Filename Size Direction Remote Filename Hast C:\Temp\downloads \map2 gif 3647 << - Ímgh/mao2.gif ftp.e-course.com
FTP clients such as FileZilla make it easy to upload and download files from an FTP server
Trang 33
p-psexch wy > Foders [ital
2) fo /iastudert password 123@ fip ub edu/pub/unx/examplesfest
Folder tasks
=) Renane this i
Bm Move this them
5 Copy this item
ae Deete ths iten
Other Pleces
2) €xarrptes , My Documents
Dowrioad to: €:\Temp Junk\s.out
Transfer rate: 102 KB/Sec
| Close thie dislog box when download compieies
aasssnssssasssssasssnssssssassssả W/hen the download is complete,
the safest procedure is to close the window and check the file with antivirus software before you run it
Trang 34File Sharing
* P2P file sharing uses peer-
to-peer (P2P) protocols that
allow users to obtain files
from other users located
anywhere on the Internet
* BitTorrent is a file sharing
protocol that distributes the role of file server across a collection of dispersed
Destination
Trang 35* Routers and NAT
* Virtual Private Networks
Chapter 6: The Internet
Trang 36
Intrusion Attempts
* An intrusion is any access to data or programs
by hackers, criminals, or other unauthorized
persons
* Looking for open ports is one of the most
common ways of gaining unauthorized access to
a network-based computer
* A port probe (or port scan) uses automated
software to locate computers that have open
ports and are vulnerable to unauthorized access
Trang 37em has achieved a perfect ‘TruStealth" rating Nota
standpoint of the passing probes of any hacker, this machine d
Some questionable personal security
probe the prober", thus revealing themselves But your system
way Very nice
Port Service Status Security
SMTP Stealth
stems expose their users by attempting to
@ Internet | Protected !,
single packet — solicited or
security probing tests Your
cho Requests) From the oes not exist on the Internet
“counter-
wisely remained silent in every
Implications
g cnil> Stealth thers a Paneer VHATSOEVER that a port [or even any computer)
21 FTP Stealth port (or even any computer)
22 SSH | Stealth port {or even any computer)
23 Telnet Stealth ere a ee
Trang 38Securing Ports
* One of the easiest
steps to enhance your
packets attempting to enter or leave a
Trang 39| oadcom 440x 10/100 Integrated Controller
Searc" \ Folders (iit)
ee Fie and Printer Sharing for Microsoft Networks
IB QoS Packet Schedule
%” Hemet Prctocal {TCPAP)
| | oes nw) | | List nf |
When this box is not
checked, file and printer sharing is deactivated
rcarcute
_ ] S+cw icon in netfication are2 when connected
Trang 40Ũ Routers
* Routers are intended to work on LANs to
monitor and direct packets being transported
from one device to another
* A routable IP address is one which can be
accessed by packets on the Internet
* A private IP address is a non-routable IP
address that can be used within a LAN, but
not for Internet data transport
Trang 41Virtua Private Networks
* It is possible to secure remote connections
by setting up virtual private network (VPN)
access to a remote access server in the
corporate office
* Access to a VPN is usually by invitation only
Employees who need to access a VPN are
given the necessary instructions, addresses,
and passwords to make connections
Trang 42
Virtual Private Networks
Virtual Private Network
Trang 43NEW PERSPECTIVES COMPUTER CONCEPTS
Chapter 6 Complete
The Internet