58
Computer Concepts 2012 Chapter 6 The Internet

Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents Section A: Internet Technology Section B: Fixed Internet

Embed Size (px)

Citation preview

Page 1: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

Computer Concepts 2012

Chapter 6The Internet

Page 2: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 2

Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet

Access Section D: Internet Services Section E: Internet Security

Page 3: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 True Questions

TCP, Transmission Control Protocol, IP, internet protocol

– UDP, HTTP, and FTP are examples of protocols used on the Internet.

– 204.127.129.100 is an example of an IP address. – .edu and .ca are examples of top-level domains. – Internet-based servers can handle multiple tasks using

different ports.

Chapter 6: The Internet 3

Page 4: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 TCP/IP Model

Chapter 6: The Internet 4

Data

UDP header Data

IP header IP data

Frame Header

Page 5: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 True Questions

Utilities such as Ping and Traceroute help you gauge the speed of your Internet connection.

10 Mbps is a broadband Internet connection. Dial-up, ISDN, and DSL [digital subscriber line] provide

Internet access using telephone cabling. Cable Internet service is fast because it has little

latency. WiMAX uses low-earth orbiting satellites to

transport data to the Internet.

Chapter 6: The Internet 5

Page 6: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 6

Page 7: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6True Questions

Portable Internet access includes portable WiMAX and Wi-Fi. UTMS, Universal Mobile Telecommunications System

– EDGE, and – HSUPA are examples of ????.

VoIP uses packet-switched technology to send digital data digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network.

Chapter 6: The Internet 7

Page 8: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6SECTION A

Chapter 6: The Internet 8

Internet Technology Background Internet Infrastructure Internet Protocols, Addresses, and Domains Connection Speed

Page 9: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Question One reason the Internet works is because TCP/IP offers a

global addressing standard. Which one of the following is accurate in the context of

Internet addresses?

– C. A domain name, such as amazon.com corresponds to a unique IP address.

Chapter 6: The Internet 9

Page 10: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 10

Background The ARPANET, created in 1969,

connected computers at UCLA, Stanford Research Institute, Univ of Utah, and Univ of Calif at Santa Barbara

Today, the Internet connects computers all over the globe and supplies information to people of all ages and interests

With an estimated 500 million nodes and more than 2 billion users, the Internet is huge

Page 11: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 11

Internet Infrastructure The Internet is not owned or operated by any single

corporation or government

Internet backbone: a network of high-capacity communication links providing the main routes for data traffic across the Internet

Backbone links and routers are maintained by NSPs– network service providers (NSPs)

NSP equipment and links are tied together by NAPs– network access points (NAPs)

Internet service provider (ISP): a company provides Internet access to individuals, businesses, and smaller ISPs

Page 12: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Internet Infrastructure

Chapter 6: The Internet 12

Page 13: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 ISP Equipment

Chapter 6: The Internet 13

Page 14: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 14

Internet Infrastructure To communicate with an ISP, your computer uses some type of

communications device, such as a modem

Page 15: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Internet Protocols, Addresses, and Domains

A computer can have a permanently assigned static IP address or a temporarily assigned dynamic IP address

Chapter 6: The Internet 15

Page 16: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 16

Internet Protocols, Addresses, & Domains

Page 17: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 17

Internet Protocols, Addresses, & Domains

Page 18: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 18

Connection Speed Data travels over the Internet at an incredible speed

The elapsed time for data to make a round trip from point A to point B and back to point A is measured in “ms”, miliseconds, .001 second

3 milliseconds — a housefly's wing flap 5 milliseconds — a honey bee's wing flap

Page 19: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 19

This time is referred to as latency– Ping– Traceroute

Upstream vs. downstream speed

Page 20: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 20

Connection Speed asymmetric Internet connection:

– upstream speeds differ from downstream speeds

symmetric Internet connection: – upstream and downstream speeds are the same

Internet connection options– Fixed Internet access– Portable Internet access– Mobile Internet access

Page 21: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6SECTION B

Chapter 6: The Internet 21

Fixed Internet Access Dial-up Connections DSL, ISDN, and Dedicated Lines Cable Internet Service Satellite Internet Service Fixed Wireless Service Fixed Internet Connection Roundup

Page 22: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Question Although ISPs offer Internet access though dial-up,

satellites, WiMAX, ISDN, and DSL, cable Internet is currently the preferred access method. Why?

– B. It is the fastest and most widely available technology.

Chapter 6: The Internet 22

Page 23: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 23

Dial-up Connections Dial-up connection is a fixed Internet connection

– It uses a voiceband modem and – telephone lines to transport data – between your computer and your ISP

Page 24: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 24

Dial-up Connections Voiceband modem converts signals from your computer into

audible analog signals that travel over telephone lines Modem speed is measured in bits per second

Page 25: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 25

Dedicated Lines,DSL, and ISDN

T1, T3, and T4 lines are leased from the telephone company and offer fast, high-capacity data transmission

DSL is a high-speed, digital, always-on Internet access technology that runs over standard phone lines

• DSL modem

Page 26: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 26

Cable Internet Service Cable Internet service distributes always-on, broadband

Internet access over the same infrastructure that offers cable television service

Page 27: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 27

Cable Internet Service Cable modems convert your computer’s signal into one that

can travel over the CATV network Always-on connection DOCSIS-compliant cable

modems

Page 28: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 28

Satellite Internet Service Satellite Internet service distributes always-on, high-speed

asymmetric Internet access by broadcasting signals to and from a personal satellite dish

A satellite modem is a device that modulates data signals from a computer into a frequency band that can be carried to the satellite dish where it is converted to another frequency, amplified, and transmitted

Page 29: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Symmetric vs Asymmetric

Asymmetric is greater toward the customer premises (known as downstream) than the reverse (known as upstream).

Chapter 6: The Internet 29

Page 30: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Satellite Internet Service

Chapter 6: The Internet 30

Page 31: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 31

Fixed Wireless Service Fixed wireless Internet service broadcasts signals in order to

offer Internet access to large areas– WiMAX– A WiMAX system transmits data

to and from WiMAX antennas mounted on towers

– Under ideal conditions, WiMAX can transmit data at 70 Mbps

Page 32: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Fixed Internet Connection Roundup

Chapter 6: The Internet 32

Page 33: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6SECTION C

Chapter 6: The Internet 33

Portable and Mobile Internet Access

Internet to Go Wi-Fi Hotspots Portable and Mobile WiMAX Portable Satellite Service Cellular Data Service

Page 34: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Question 062300 What is the difference between portable

Internet access and mobile Internet access?– A. With portable access you cannot work online

while moving very far.

.

Chapter 6: The Internet 34

Page 35: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 35

Internet To Go Portable Internet access can be defined as the ability to

easily move your Internet service from one location to another

Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus, car, train, or plane

Page 36: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 36

Wi-Fi Hotspots A Wi-Fi hotspot is an area

in which the public can access a Wi-Fi network that offers Internet service

Page 37: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 37

Portable and Mobile WiMAX WiMAX can be both portable and mobile. Mobile WiMAX

Page 38: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6SECTION D

Chapter 6: The Internet 38

Internet Services Real-Time Messaging Voice over IP Cloud Computing Grid Computing FTP File Sharing Networks

Page 39: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6SECTION D

Do Not TEXT and DRIVE !

Chapter 6: The Internet 39

Page 40: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 40

Real-Time Messaging A networked-based, real-time messaging system allows

people to exchange short messages while they are online– Instant messaging (IM)– Chat

Page 41: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 41

Voice over IP VoIP (Voice over Internet

Protocol) or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system

Page 42: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Wikis, Blogs, and Tweets

A wiki allows participants to modify material A blog (short for Web log) is similar to an online

diary; it is maintained by one person and contains a series of entries on one or more topics

A tweet is a short message of 140 characters or less, posted to the Twitter Web site

Chapter 6: The Internet 42

Page 43: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Wikis, Blogs, and Tweets

Chapter 6: The Internet 43

Page 44: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Cloud Computing The concept of cloud computing depends on a

grid of servers and storage devices that offer Internet-accessible computing services ranging from hardware to office productivity applications and complex corporate data processing– Google Apps– Amazon’s Elastic Compute Cloud

Chapter 6: The Internet 44

Page 45: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Cloud Computing

Chapter 6: The Internet 45

Page 46: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 46

Grid Computing A grid computing system is a

network of computers harnessed together to perform processing tasks– SETI@home project

Page 47: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 FTP

Chapter 6: The Internet 47

Page 48: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 File Sharing P2P file sharing uses peer-

to-peer (P2P) protocols that allow users to obtain files from other users located anywhere on the Internet

BitTorrent is a file sharing protocol that distributes the role of file server across a collection of dispersed computers

Chapter 6: The Internet 48

Page 49: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6SECTION E

Chapter 6: The Internet 49

Internet Security Intrusion Attempts Securing Ports Routers and NAT Virtual Private Networks

Page 50: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 50

Intrusion Attempts An intrusion is any access to data or programs by hackers,

criminals, or other unauthorized persons Looking for open ports is one of the most common ways of

gaining unauthorized access to a network-based computer A port probe (or port scan) uses automated software to

locate computers that have open ports and are vulnerable to unauthorized access

Page 51: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 51

Intrusion Attempts

Page 52: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6 Securing Ports One of the easiest steps to

enhance your computer’s security is to turn it off when you aren’t using it

A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer

Chapter 6: The Internet 52

Page 53: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 53

Routers and NAT Routers are intended to work on LANs to monitor and direct

packets being transported from one device to another A routable IP address is one that can be accessed by

packets on the Internet A private IP address is a non-routable IP address that can be

used within a LAN, but not for Internet data transport

Page 54: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 54

Routers and NAT

Page 55: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 55

Routers and NAT Network address

translation (NAT) is the process your router uses to keep track of packets and their corresponding private or public IP addresses

Page 56: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 56

Virtual Private Networks It is possible to secure remote connections by setting up

virtual private network (VPN) access to a remote access server in the corporate office

Access to a VPN is usually by invitation only. Employees who need to access a VPN are given the necessary instructions, addresses, and passwords to make connections

Page 57: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

6

Chapter 6: The Internet 57

Virtual Private Networks

Page 58: Computer Concepts 2012 Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet

Computer Concepts 2012

Chapter 6 Complete