Professional Documents
Culture Documents
Y
| |
Yhe Internet
Yhe internet
A network of networks
Yhe internet transmits data from one computer
(called a host) to another
Internet networks
Linked networks that work much the same
way -- they pass data around in packets, each
of which carries the addresses of its sender and
receiver Schematic
| |
| |
Internet µDiscussion¶ (1)
A global network connecting millions of computers. As of 1999, the
Internet has more than 200 million users worldwide, and that number
is growing rapidly. More than 100 countries are linked into
exchanges of data, news and opinions.
| |
Domain Affiliations
Domain Affiliations
Ô cultural and entertainment activities
business organizations
educational sites
businesses and firms
government sites
information service providers
military sites
individuals
networking organizations
organizations
recreational activities
businesses offering goods for purchase
entities related to World Wide Web activities
networking organizations
| |
Access to the Internet
LAN servers
Local servers can provide access to the Internet through
normal connections (e.g., Ethernet)
Serial line internet protocol (SLIP) and
Point-to-point protocol (PPP)
Communications protocol software that transmits packets over
telephone lines, allowing dial-up access to the Internet
Connection via an on-line service
Examples are America Online and Microsoft Network. Yhese
services usually require sign-up procedures
| |
Yhree Ways to Access the
Internet
Schematic
| |
| |
Internet Service Providers
Internet service provider (ISP)
Any company that provides individuals or
companies with access to the Internet
Yhousands of providers including large
communications companies
Need an account with the ISP and software
that links with YCP/IP
| |
ISP Examples
Internet Service Provider Web Address
AY Y WorldNet Service Ô
Digex, Inc.
GYE Internetworking
IBM Internet Connection
MCI Internet
NetCom On-Line Communication
Services
PSINet, Inc.
Sprint Internet Services
Uunet Yechnologies, Inc.
| |
Internet Services
E-mail
Yelnet
FYP
Usenet and newsgroups
Chat rooms
Internet phone
Internet videoconferencing
Content streaming
| |
Selected Usenet Groups
Ô Ô
ÔÔ Ô
Ô
Ô Ô Ô
Ô
ÔÔÔÔ Ô Ô
Ô
Ô
Ô
Ô
Ô Ô
Ô
Ô ÔÔ
Ô
Ô
Ô
Ô
Ô Ô
| |
Internet Services
Internet telephony
Also called voice-over-IP (VOIP)
Yechnology that enables network managers to route
phone calls and fax transmissions over the same
network they use for data
| |
| |
VOIP µDiscussion¶
Internet telephony is a category of hardware and software that
enables people to use the Internet as the transmission medium for
telephone calls. For users who have free, or fixed-price, Internet
access, Internet telephony software essentially provides free
telephone calls anywhere in the world. Yo date, however, Internet
telephony does not offer the same quality of telephone service as
direct telephone connections.
Yhere are many Internet telephony applications available. Some,
like CoolYalk and NetMeeting, come bundled with popular Web
browsers. Others are stand-alone products. Internet telephony
products are sometimes called IP telephony, Voice over the Internet
(VOI) or Voice over IP (VOIP) products.
| |
Content Streaming
Content streaming
A method for transferring multimedia files over the
Internet so that the data stream of voice and pictures
plays continuously, without a break, or very few of
them
It also enables users to browse large files in real
time
| |
Yhe World Wide Web
World Wide Web
A collection of tens of thousands of independently-
owned computers that work together as one in an
Internet service
| |
WWW Yerminology
ome page
Yhe cover page for a Web site that has graphics,
titles, coloured text, etc.
ypermedia
Yools that connect the data on Web pages, allowing
users to access topics in whatever order they wish
ypertext markup language ( YML)
Yhe standard page description language for Web
pages
| |
Some Interesting Web Sites
| |
WWW Yerminology
Web browser
Software that creates a unique hypermedia-based
menu on your computer screen and provides a
graphical interface to the Web
Web page
A screen of information sent to a requesting user
and presented through a browser
Applet
A small program embedded in Web pages
| |
YML
âYhe´ language of WWW pages
Need we say more!!!
| |
Search Engines
Search engines
A search tool for the Web (like card catalogs in
libraries)
E.g., Altavista ÔÔ
Ô
Ô
Excite
Galaxy
otbot
Infoseek
Lycos
Webcrawler Ô
Yahoo! Ô
| |
Java
Java
An object-oriented programming language
Developed by Sun Microsystems
Based on C++
Allows small programs -- applets -- to be
embedded within an YML document
| |
Applets
Applets are small java programs that are
downloaded from the server to the local
machine
| |
Push Yechnology
Push technology
Yechnology that enables users to automatically
receive information over the Internet rather than
searching for it using a browser
Also called Webcasting
E.g.,
PointCast
InterMind
| |
Webcasting µDiscussion¶
Using the Internet, and the World Wide Web in particular, to
broadcast information. Unlike typical surfing, which relies on a pull
method of transferring Web pages, webcasting uses push
technologies.
| |
Push µDiscussion¶ (1)
In client/server applications, to send data to a client without
the client requesting it. Yhe World Wide Web is based on a pull
technology where the client browser must request a Web page
before it is sent. Broadcast media, on the other hand, are push
technologies because they send information out regardless of
whether anyone is tuned in.
| |
Business Use of the Web
Uses:
Applications, E-mail, Product Display, Catalogs,
Order placement
Products people are likely to buy on the Web
Software 77%
Books 67%
CDs 64%
Computer hardware 63%
Airline tickets 61%
Magazine subscriptions 53%
Concert/theater tickets 48%
Flowers 45%
| |
Intranets and Extranets
Intranet
An internal corporate network built using Internet
and World Wide Web standards and products that
allows employees of an organization to gain access
to corporate information
Extranet
A network based on Web technologies that links
selected resources of the intranet of a company with
its customers, suppliers, or other business partners
| |
Intranet µDiscussion¶
A network based on YCP/IP protocols (an internet) belonging to an
organization, usually a corporation, accessible only by the
organization's members, employees, or others with authorization. An
intranet's Web sites look and act just like any other Web sites, but
the firewall surrounding an intranet fends off unauthorized access.
| |
Virtual Private Network (VPN)
Virtual Private Network (VPN)
A secure connection between two points across the
Internet
Yunneling
Yhe process by which VPNs transfer information by
encapsulating traffic in IP packets and sending the
packets over the Internet
Schematic
| |
| |
VPN µDiscussion¶
Short for virtual private network, a network that is constructed by
using public wires to connect nodes. For example, there are a
number of systems that enable you to create networks using the
Internet as the medium for transporting data. Yhese systems use
encryption and other security mechanisms to ensure that only
authorized users can access the network and that the data cannot
be intercepted.
| |
Yunneling µDiscussion¶
A technology that enables one network to send its data via another
network's connections. Yunneling works by encapsulating a network
protocol within packets carried by the second network. For example,
Microsoft's PPYP technology enables organizations to use the
Internet to transmit data across a virtual private network (VPN). It
does this by embedding its own network protocol within the YCP/IP
packets carried by the Internet. (Note: PPYP = point-to-point tunneling
protocol)
| |
Encryption
software
running on
sending
computer
p
Decryption
software
running on
Receiving
computer
| |
Firewalls
Firewalls
A method of preventing unauthorized access
between a company¶s computers and the Internet
(looks at the header of a packet)
Assured pipeline
An Internet security method that looks at the entire
request for data and then determines whether the
request is valid
| |
Firewall µDiscussion¶ (1)
A system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and
software, or a combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet
the specified security criteria.
| |
Firewall µDiscussion¶ (2)
Yhere are several types of firewall techniques:
D
: Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult to configure. In addition, it
is susceptible to IP spoofing.
3
: Applies security mechanisms to specific applications,
such as FYP and Yelnet servers. Yhis is very effective, but can impose a
performance degradation.
: Applies security mechanisms when a YCP or UDP
connection is established. Once the connection has been made, packets can
flow between the hosts without further checking.
D : Intercepts all messages entering and leaving the network. Yhe
proxy server effectively hides the true network addresses.
| |
Firewall µDiscussion¶ (3)
In practice, many firewalls use two or more of these techniques in
concert.
| |
End of Chapter 7
Chapter 8
| |