SlideShare ist ein Scribd-Unternehmen logo
1 von 61
Chapter 6
       The Internet

Computer Concepts 2012
6 Chapter Contents
     Section A: Internet Technology
     Section B: Fixed Internet Access
     Section C: Portable and Mobile Internet
      Access
     Section D: Internet Services
     Section E: Internet Security




Chapter 6: The Internet                         2
6 FastPoll True/False Questions
         Answer A for True and B for False
    060100 NAPs such as Earthlink and Comcast offer
     dial-up and cable Internet access.
    060200 TCP, IP, UDP, HTTP, and FTP are
     examples of protocols used on the Internet.
    060300 204.127.129.100 is an example of an IP
     address.
    060400 .edu and .ca are examples of top-level
     domains.
    060500 Internet-based servers can handle multiple
     tasks using different ports.
Chapter 6: The Internet                                  3
6 FastPoll True/False Questions
         Answer A for True and B for False
    060600 Utilities such as Ping and Traceroute help
     you gauge the speed of your Internet connection.
    060700 10 Mbps is a narrowband Internet
     connection.
    060800 Dial-up, ISDN, and DSL provide Internet
     access using telephone cabling.
    060900 Cable Internet service is fast because it has
     lots of latency.
    061000 WiMAX uses low-earth orbiting satellites to
     transport data to the Internet.
Chapter 6: The Internet                                 4
6 FastPoll True/False Questions
         Answer A for True and B for False
    061100 Portable Internet access includes portable
     WiMAX and Wi-Fi.
    061200 UTMS, EDGE, and HSUPA are examples
     of broadband ISPs.
    061300 VoIP uses circuit switching technology to
     send analog data.
    061400 SETI@home is a popular Wi-Fi service
     provider for non-business consumers.
    061500 Cloud computing uses distributed grid
     computing to predict weather.
Chapter 6: The Internet                                  5
6 FastPoll True/False Questions
         Answer A for True and B for False
    061600 FTP makes it easy to anonymously use a
     search engine.
    061700 BitTorrent is an Internet security protocol.
    061800 Consumers should use port probes to
     encrypt data sent over the Internet.
    061900 NATs are used by hackers to intercept
     packets traveling over the Internet.




Chapter 6: The Internet                                    6
6
                                                   SECTION   A
         Internet Technology
     Background
     Internet Infrastructure
     Internet Protocols, Addresses, and Domains
     Connection Speed




Chapter 6: The Internet                                      7
6 Question
     062100 One reason the Internet works is because TCP/IP
      offers a global addressing standard. Which one of the
      following is accurate in the context of Internet addresses?
       – A. IPv6 addresses such as 204.127.129.1 are dedicated
          to educational institutions.
       – B. Top level domains like EarthLink or AOL are adequate
          for most consumers.
       – C. A domain name, such as amazon.com corresponds to
          a unique IP address.
       – D. A dynamic IP address begins with www.


Chapter 6: The Internet                                         8
6 Background
     The ARPANET, created in
      1969, connected computers at
      UCLA, Stanford Research
      Institute, University of Utah, and
      University of California at Santa
      Barbara
     Today, the Internet connects
      computers all over the globe and
      supplies information to people of all
      ages and interests
     With an estimated 500 million nodes
      and more than 2 billion users, the
      Internet is huge


Chapter 6: The Internet                       9
6 Internet Infrastructure
     The Internet is not owned or operated by any single
      corporation or government
     The Internet backbone is a network of high-capacity
      communications links that provides the main routes for data
      traffic across the Internet
     Backbone links and routers are maintained by network
      service providers (NSPs)
     NSP equipment and links are tied together by network
      access points (NAPs)
     An Internet service provider (ISP) is a company that offers
      Internet access to individuals, businesses, and smaller ISPs




Chapter 6: The Internet                                          10
6 Internet Infrastructure




Chapter 6: The Internet      11
6 Internet Infrastructure
     To communicate with an ISP, your computer uses some type
      of communications device, such as a modem




Chapter 6: The Internet                                     12
6 Internet Protocols,
         Addresses, and Domains
     A computer can have a
      permanently assigned
      static IP address or a
      temporarily assigned
      dynamic IP address




Chapter 6: The Internet           13
6 Internet Protocols,
         Addresses, and Domains




Chapter 6: The Internet           14
6 Internet Protocols,
         Addresses, and Domains




Chapter 6: The Internet           15
6 Connection Speed
     Data travels over the Internet at an incredible speed
     The elapsed time for data to make a round trip from point A
      to point B and back to point A is referred to as latency
       – Ping
       – Traceroute
     Upstream vs. downstream speed




Chapter 6: The Internet                                             16
6 Connection Speed
     When upstream speeds differ from downstream speeds, you
      have an asymmetric Internet connection
     When upstream and downstream speeds are the same, you
      have a symmetric Internet connection
     Internet connection options
       – Fixed Internet access
       – Portable Internet access
       – Mobile Internet access




Chapter 6: The Internet                                     17
6
                                          SECTION   B
         Fixed Internet Access
     Dial-up Connections
     DSL, ISDN, and Dedicated Lines
     Cable Internet Service
     Satellite Internet Service
     Fixed Wireless Service
     Fixed Internet Connection Roundup




Chapter 6: The Internet                             18
6 Question
    062200 Although ISPs offer Internet access though
     dial-up, satellites, WiMAX, ISDN, and DSL, cable
     Internet is currently the preferred access method.
     Why?
      – A. It is the least expensive.
      – B. It is the fastest and most widely available
        technology.
      – C. It has the highest latency.
      – D. It was the original Internet access technology.

Chapter 6: The Internet                                  19
6 Dial-up Connections
     A dial-up connection is a fixed Internet connection that uses
      a voiceband modem and telephone lines to transport data
      between your computer and your ISP




Chapter 6: The Internet                                               20
6 Dial-up Connections
     A voiceband modem converts the signals from your
      computer into audible analog signals that can travel over
      telephone lines
     Modem speed is measured in bits per second




Chapter 6: The Internet                                           21
6 DSL, ISDN, and
         Dedicated Lines
     T1, T3, and T4 lines are leased from the telephone company
      and offer fast, high-capacity data transmission
     ISDN (Integrated Services Digital Network) is a type of fixed
      Internet connection that moves data at speeds of 64 Kbps or
      128 Kbps over ordinary telephone lines
       – ISDN terminal adapter connects a computer to a
         telephone wall jack and converts signals to travel over
         ISDN connection




Chapter 6: The Internet                                           22
6 DSL, ISDN, and
         Dedicated Lines
     DSL is a high-speed, digital, always-on Internet access
      technology that runs over standard phone lines
       – DSL service provider will provide
         instructions for installation
           • DSL modem




Chapter 6: The Internet                                         23
6 Cable Internet Service
     Cable Internet service distributes always-on, broadband
      Internet access over the same infrastructure that offers cable
      television service




Chapter 6: The Internet                                            24
6 Cable Internet Service
     Cable modems convert your computer’s signal into one that
      can travel over the CATV network
     Always-on connection
     DOCSIS-compliant cable
      modems




Chapter 6: The Internet                                           25
6 Satellite Internet Service
     Satellite Internet service distributes always-on, high-speed
      asymmetric Internet access by broadcasting signals to and
      from a personal satellite dish
     A satellite modem is a device that modulates data signals
      from a computer into a frequency band that can be carried to
      the satellite dish where it is converted to another frequency,
      amplified, and transmitted




Chapter 6: The Internet                                            26
6 Satellite Internet Service




Chapter 6: The Internet         27
6 Fixed Wireless Service
     Fixed wireless Internet service broadcasts signals in order to
      offer Internet access to large areas
       – WiMAX
       – A WiMAX system transmits data
         to and from WiMAX antennas
         mounted on towers
       – Under ideal conditions, WiMAX
         can transmit data at 70 Mbps




Chapter 6: The Internet                                            28
6 Fixed Internet Connection
         Roundup




Chapter 6: The Internet        29
6
                                      SECTION   C
         Portable and Mobile Internet Access
     Internet to Go
     Wi-Fi Hotspots
     Portable and Mobile WiMAX
     Portable Satellite Service
     Cellular Data Service




Chapter 6: The Internet                         30
6 Question
    062300 What is the difference between portable
        Internet access and mobile Internet access?
          – A. With portable access you cannot work online
             while moving very far.
          – B. Mobile access is less expensive than portable
             access.
          – C. Portable access requires cables, whereas
             mobile access does not.
          – D. Portable access requires a cell phone,
             whereas mobile access requires a notebook
             computer.
Chapter 6: The Internet                                     31
6 Internet To Go
     Portable Internet access can be defined as the ability to
      easily move your Internet service
      from one location to
      another
     Mobile Internet access
      offers a continuous
      Internet connection as
      you are walking or
      riding in a bus, car,
      train, or plane



Chapter 6: The Internet                                           32
6 Wi-Fi Hotspots
     A Wi-Fi hotspot is an area
      in which the public can
      access a Wi-Fi network that
      offers Internet service
     Wi-Fi does not typically
      provide acceptable mobile
      Internet access because
      you can only remain
      connected within range of
      the network’s hotspot



Chapter 6: The Internet             33
6 Portable and Mobile WiMAX
     WiMAX can be used as a portable
      technology because Internet access is
      available to subscribers anywhere within a
      tower’s coverage area
     You use the same Internet service provider
      whether you are at home or on the
      road.
     Mobile WiMAX




Chapter 6: The Internet                            34
6 Portable Satellite Service




Chapter 6: The Internet         35
6 Cellular Data Services
     Using cell phone technology to access
      the Internet offers mobility that is not yet
      possible with most of today’s wired or
      wireless computer network technologies




Chapter 6: The Internet                              36
6 Cellular Data Services
     The fastest cellular technologies
      for Internet access are EDGE,
      EV-DO, and HSUPA
     Some manufacturers offer
      netbook computers with built-in
      circuitry for mobile broadband
      access
     Some cell phones connect to
      your computer and act as a
      wireless modem to transmit data
      over the Internet
     Some cell phones, such as the
      Droid X, can act as a Wi-Fi
      hotspot by becoming the router
      for a wireless network
Chapter 6: The Internet                   37
6
                              SECTION   D
         Internet Services
     Real-Time Messaging
     Voice over IP
     Cloud Computing
     Grid Computing
     FTP
     File Sharing Networks




Chapter 6: The Internet                 38
6 Question
     062400 On the Internet, application protocols provide
      consumers with many useful services. Which one of the
      following correctly describes an Internet-based application
      protocol?
       – A. Chat and Instant messaging use Internet VoIP
          protocol.
       – B. Files can be shared over the Internet using FTP or
          BitTorrent protocols.
       – C. Cloud protocols such as SETI control distributed
          processing grids.
       – D. P2P is used to encrypt personal information to keep it
          private.
Chapter 6: The Internet                                          39
6 Real-Time Messaging
     A networked-based, real-time messaging system allows
      people to exchange short messages while they are online
       – Instant messaging (IM)
       – Chat




Chapter 6: The Internet                                         40
6 Voice over IP
     VoIP (Voice over Internet
      Protocol) or Voice over IP, is a
      technology in which a broadband
      Internet connection is used to
      place telephone calls instead of
      the regular phone system
     If you want to set up free
      computer-to-computer
     VoIP, you, and the people you
      communicate with can download
      and install freeware or open
      source VoIP clients




Chapter 6: The Internet                  41
6 Forums, Wikis, Blogs,
         and Tweets
    An Internet forum is a Web-based online discussion
     site where participants post comments to discussion
     threads
    A wiki allows participants to modify material
    A blog (short for Web log) is similar to an online
     diary; it is maintained by one person and contains a
     series of entries on one or more topics
    A tweet is a short message of 140 characters or
     less, posted to the Twitter Web site

Chapter 6: The Internet                                 42
6 Forums, Wikis, Blogs,
         and Tweets




Chapter 6: The Internet    43
6 Cloud Computing
    The concept of cloud computing depends on a
     grid of servers and storage devices that offer
     Internet-accessible computing services ranging
     from hardware to office productivity applications and
     complex corporate data processing
      – Google Apps
      – Amazon’s Elastic Compute Cloud




Chapter 6: The Internet                                  44
6 Cloud Computing




Chapter 6: The Internet   45
6 Grid Computing
    A grid computing system is a
     network of computers
     harnessed together to
     perform processing tasks
          – SETI@home project




Chapter 6: The Internet             46
6 FTP




Chapter 6: The Internet   47
6 File Sharing
     P2P file sharing uses peer-
      to-peer (P2P) protocols that
      allow users to obtain files
      from other users located
      anywhere on the Internet
     BitTorrent is a file sharing
      protocol that distributes the
      role of file server across a
      collection of dispersed
      computers



Chapter 6: The Internet               48
6
                                 SECTION   E
         Internet Security
     Intrusion Attempts
     Securing Ports
     Routers and NAT
     Virtual Private Networks




Chapter 6: The Internet                    49
6 Question
    062500 Securing your computer from Internet-
     based intrusions is an important aspect of computer
     security. Which one of the following is NOT a useful
     security technique?
      – A. Setting up NAT on a router
      – B. Activating firewall software
      – C. Checking the status of software ports
      – D. Activating your computer’s file sharing options


Chapter 6: The Internet                                  50
6 Intrusion Attempts
     An intrusion is any access to data or programs by
      hackers, criminals, or other unauthorized persons
     Looking for open ports is one of the most common ways of
      gaining unauthorized access to a network-based computer
     A port probe (or port scan) uses automated software to
      locate computers that have open ports and are vulnerable to
      unauthorized access




Chapter 6: The Internet                                         51
6 Intrusion Attempts




Chapter 6: The Internet   52
6 Securing Ports




Chapter 6: The Internet   53
6 Securing Ports
     One of the easiest steps to
      enhance your computer’s
      security is to turn it off
      when you aren’t using it
     A firewall is software or
      hardware designed to filter
      out suspicious packets
      attempting to enter or leave
      a computer




Chapter 6: The Internet              54
6 Routers and NAT
     Routers are intended to work on LANs to monitor and direct
      packets being transported from one device to another
     A routable IP address is one that can be accessed by
      packets on the Internet
     A private IP address is a non-routable IP address that can
      be used within a LAN, but not for Internet data transport




Chapter 6: The Internet                                            55
6 Routers and NAT




Chapter 6: The Internet   56
6 Routers and NAT
     Network address
      translation (NAT) is the
      process your router uses to
      keep track of packets and
      their corresponding private
      or public IP addresses




Chapter 6: The Internet             57
6 Virtual Private Networks
     It is possible to secure remote connections by setting up
      virtual private network (VPN) access to a remote access
      server in the corporate office
     Access to a VPN is usually by invitation only. Employees
      who need to access a VPN are given the necessary
      instructions, addresses, and passwords to make connections




Chapter 6: The Internet                                       58
6 Virtual Private Networks




Chapter 6: The Internet       59
6 What Do You Think?
     063100 Should governments be allowed to block access to Web
      sites based on local religions, politics, and customs?
       – A. Yes          B. No             C. Not sure
     063200 Do you believe that a privately held Internet service
      provider like AOL has the right to censor the data posted on Web
      sites it hosts?
        A. Yes          B. No             C. Not sure
     063300 Should companies like Microsoft, Yahoo!, and Cisco
      Systems provide blocking technology to foreign governments?
       – A. Yes          B. No             C. Not sure
     063400 Would you use filtering software that was preprogrammed
      to block pornographic and nuisance Web sites?
       – A. Yes          B. No             C. Not sure
Chapter 6: The Internet                                              60
Chapter 6 Complete

Computer Concepts 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation on DSL & ADSL
Presentation on DSL & ADSLPresentation on DSL & ADSL
Presentation on DSL & ADSLrewa_monami
 
2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection 2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection hazirma
 
Internet connectivity
Internet connectivity Internet connectivity
Internet connectivity Shibin S B
 
Modems
ModemsModems
ModemsBits
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connectionsyashgaba
 
A.D.S.L. presentation
A.D.S.L. presentationA.D.S.L. presentation
A.D.S.L. presentationRama Kaushik
 
Asymmetric Digital Subscriber Line Adsl
Asymmetric Digital Subscriber Line AdslAsymmetric Digital Subscriber Line Adsl
Asymmetric Digital Subscriber Line AdslMilan Milicevic
 
Types of Internet Connections - R.D.sivakumar
Types of Internet Connections - R.D.sivakumarTypes of Internet Connections - R.D.sivakumar
Types of Internet Connections - R.D.sivakumarSivakumar R D .
 
Asymmetric digital subscriber line
Asymmetric digital subscriber lineAsymmetric digital subscriber line
Asymmetric digital subscriber lineAshwani Kumar
 
Broadband Presentation
Broadband PresentationBroadband Presentation
Broadband Presentationali409
 
A seminar presention_on_dsl_technology
A seminar presention_on_dsl_technologyA seminar presention_on_dsl_technology
A seminar presention_on_dsl_technologyDokka Srinivasu
 
broad band networks
 broad band networks broad band networks
broad band networksVikas Jagtap
 

Was ist angesagt? (20)

Presentation on DSL & ADSL
Presentation on DSL & ADSLPresentation on DSL & ADSL
Presentation on DSL & ADSL
 
2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection 2.2.1.2 The Internet Connection
2.2.1.2 The Internet Connection
 
Dsl technology report
Dsl technology  reportDsl technology  report
Dsl technology report
 
Broadband technology
Broadband technologyBroadband technology
Broadband technology
 
Internet connectivity
Internet connectivity Internet connectivity
Internet connectivity
 
A seminar presentation on dsl
A seminar presentation on dslA seminar presentation on dsl
A seminar presentation on dsl
 
Modems
ModemsModems
Modems
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connections
 
A.D.S.L. presentation
A.D.S.L. presentationA.D.S.L. presentation
A.D.S.L. presentation
 
Dsl
DslDsl
Dsl
 
Asymmetric Digital Subscriber Line Adsl
Asymmetric Digital Subscriber Line AdslAsymmetric Digital Subscriber Line Adsl
Asymmetric Digital Subscriber Line Adsl
 
Types of Internet Connections - R.D.sivakumar
Types of Internet Connections - R.D.sivakumarTypes of Internet Connections - R.D.sivakumar
Types of Internet Connections - R.D.sivakumar
 
Broadband
Broadband Broadband
Broadband
 
Adsl
AdslAdsl
Adsl
 
ADSL Presentation
ADSL PresentationADSL Presentation
ADSL Presentation
 
Asymmetric digital subscriber line
Asymmetric digital subscriber lineAsymmetric digital subscriber line
Asymmetric digital subscriber line
 
DSL
DSLDSL
DSL
 
Broadband Presentation
Broadband PresentationBroadband Presentation
Broadband Presentation
 
A seminar presention_on_dsl_technology
A seminar presention_on_dsl_technologyA seminar presention_on_dsl_technology
A seminar presention_on_dsl_technology
 
broad band networks
 broad band networks broad band networks
broad band networks
 

Ähnlich wie Chapter 06

Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connectionsAmandeep Kaur
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV NetworkSandesh Naik
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfAliMurat5
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyVan Chau
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologySukanya Ben
 
FCC 2016 - DAS & Small Cells Workshop
FCC 2016 - DAS & Small Cells WorkshopFCC 2016 - DAS & Small Cells Workshop
FCC 2016 - DAS & Small Cells WorkshopArt King
 
Internet access
Internet accessInternet access
Internet accessanna891114
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSwajahat Gul
 

Ähnlich wie Chapter 06 (20)

Assignment no 4
Assignment no 4Assignment no 4
Assignment no 4
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connections
 
Internet Access via Cable TV Network
Internet Access via Cable TV NetworkInternet Access via Cable TV Network
Internet Access via Cable TV Network
 
INT 1010 06-4.pdf
INT 1010 06-4.pdfINT 1010 06-4.pdf
INT 1010 06-4.pdf
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Data communications
Data communicationsData communications
Data communications
 
Ch08
Ch08Ch08
Ch08
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdfchapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
chapter7telecommunicationstheinternetandwirelesstechnology-210609031433.pdf
 
Chapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technologyChapter 7 telecommunications the internet and wireless technology
Chapter 7 telecommunications the internet and wireless technology
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
FCC 2016 - DAS & Small Cells Workshop
FCC 2016 - DAS & Small Cells WorkshopFCC 2016 - DAS & Small Cells Workshop
FCC 2016 - DAS & Small Cells Workshop
 
Internet access
Internet accessInternet access
Internet access
 
THE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDSTHE INTERNET AND NETWORK STANARDS
THE INTERNET AND NETWORK STANARDS
 
Slide share
Slide shareSlide share
Slide share
 
internet connection
internet connectioninternet connection
internet connection
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 

Kürzlich hochgeladen

The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 

Kürzlich hochgeladen (20)

The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 

Chapter 06

  • 1. Chapter 6 The Internet Computer Concepts 2012
  • 2. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable and Mobile Internet Access  Section D: Internet Services  Section E: Internet Security Chapter 6: The Internet 2
  • 3. 6 FastPoll True/False Questions Answer A for True and B for False 060100 NAPs such as Earthlink and Comcast offer dial-up and cable Internet access. 060200 TCP, IP, UDP, HTTP, and FTP are examples of protocols used on the Internet. 060300 204.127.129.100 is an example of an IP address. 060400 .edu and .ca are examples of top-level domains. 060500 Internet-based servers can handle multiple tasks using different ports. Chapter 6: The Internet 3
  • 4. 6 FastPoll True/False Questions Answer A for True and B for False 060600 Utilities such as Ping and Traceroute help you gauge the speed of your Internet connection. 060700 10 Mbps is a narrowband Internet connection. 060800 Dial-up, ISDN, and DSL provide Internet access using telephone cabling. 060900 Cable Internet service is fast because it has lots of latency. 061000 WiMAX uses low-earth orbiting satellites to transport data to the Internet. Chapter 6: The Internet 4
  • 5. 6 FastPoll True/False Questions Answer A for True and B for False 061100 Portable Internet access includes portable WiMAX and Wi-Fi. 061200 UTMS, EDGE, and HSUPA are examples of broadband ISPs. 061300 VoIP uses circuit switching technology to send analog data. 061400 SETI@home is a popular Wi-Fi service provider for non-business consumers. 061500 Cloud computing uses distributed grid computing to predict weather. Chapter 6: The Internet 5
  • 6. 6 FastPoll True/False Questions Answer A for True and B for False 061600 FTP makes it easy to anonymously use a search engine. 061700 BitTorrent is an Internet security protocol. 061800 Consumers should use port probes to encrypt data sent over the Internet. 061900 NATs are used by hackers to intercept packets traveling over the Internet. Chapter 6: The Internet 6
  • 7. 6 SECTION A Internet Technology  Background  Internet Infrastructure  Internet Protocols, Addresses, and Domains  Connection Speed Chapter 6: The Internet 7
  • 8. 6 Question  062100 One reason the Internet works is because TCP/IP offers a global addressing standard. Which one of the following is accurate in the context of Internet addresses? – A. IPv6 addresses such as 204.127.129.1 are dedicated to educational institutions. – B. Top level domains like EarthLink or AOL are adequate for most consumers. – C. A domain name, such as amazon.com corresponds to a unique IP address. – D. A dynamic IP address begins with www. Chapter 6: The Internet 8
  • 9. 6 Background  The ARPANET, created in 1969, connected computers at UCLA, Stanford Research Institute, University of Utah, and University of California at Santa Barbara  Today, the Internet connects computers all over the globe and supplies information to people of all ages and interests  With an estimated 500 million nodes and more than 2 billion users, the Internet is huge Chapter 6: The Internet 9
  • 10. 6 Internet Infrastructure  The Internet is not owned or operated by any single corporation or government  The Internet backbone is a network of high-capacity communications links that provides the main routes for data traffic across the Internet  Backbone links and routers are maintained by network service providers (NSPs)  NSP equipment and links are tied together by network access points (NAPs)  An Internet service provider (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs Chapter 6: The Internet 10
  • 11. 6 Internet Infrastructure Chapter 6: The Internet 11
  • 12. 6 Internet Infrastructure  To communicate with an ISP, your computer uses some type of communications device, such as a modem Chapter 6: The Internet 12
  • 13. 6 Internet Protocols, Addresses, and Domains  A computer can have a permanently assigned static IP address or a temporarily assigned dynamic IP address Chapter 6: The Internet 13
  • 14. 6 Internet Protocols, Addresses, and Domains Chapter 6: The Internet 14
  • 15. 6 Internet Protocols, Addresses, and Domains Chapter 6: The Internet 15
  • 16. 6 Connection Speed  Data travels over the Internet at an incredible speed  The elapsed time for data to make a round trip from point A to point B and back to point A is referred to as latency – Ping – Traceroute  Upstream vs. downstream speed Chapter 6: The Internet 16
  • 17. 6 Connection Speed  When upstream speeds differ from downstream speeds, you have an asymmetric Internet connection  When upstream and downstream speeds are the same, you have a symmetric Internet connection  Internet connection options – Fixed Internet access – Portable Internet access – Mobile Internet access Chapter 6: The Internet 17
  • 18. 6 SECTION B Fixed Internet Access  Dial-up Connections  DSL, ISDN, and Dedicated Lines  Cable Internet Service  Satellite Internet Service  Fixed Wireless Service  Fixed Internet Connection Roundup Chapter 6: The Internet 18
  • 19. 6 Question 062200 Although ISPs offer Internet access though dial-up, satellites, WiMAX, ISDN, and DSL, cable Internet is currently the preferred access method. Why? – A. It is the least expensive. – B. It is the fastest and most widely available technology. – C. It has the highest latency. – D. It was the original Internet access technology. Chapter 6: The Internet 19
  • 20. 6 Dial-up Connections  A dial-up connection is a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP Chapter 6: The Internet 20
  • 21. 6 Dial-up Connections  A voiceband modem converts the signals from your computer into audible analog signals that can travel over telephone lines  Modem speed is measured in bits per second Chapter 6: The Internet 21
  • 22. 6 DSL, ISDN, and Dedicated Lines  T1, T3, and T4 lines are leased from the telephone company and offer fast, high-capacity data transmission  ISDN (Integrated Services Digital Network) is a type of fixed Internet connection that moves data at speeds of 64 Kbps or 128 Kbps over ordinary telephone lines – ISDN terminal adapter connects a computer to a telephone wall jack and converts signals to travel over ISDN connection Chapter 6: The Internet 22
  • 23. 6 DSL, ISDN, and Dedicated Lines  DSL is a high-speed, digital, always-on Internet access technology that runs over standard phone lines – DSL service provider will provide instructions for installation • DSL modem Chapter 6: The Internet 23
  • 24. 6 Cable Internet Service  Cable Internet service distributes always-on, broadband Internet access over the same infrastructure that offers cable television service Chapter 6: The Internet 24
  • 25. 6 Cable Internet Service  Cable modems convert your computer’s signal into one that can travel over the CATV network  Always-on connection  DOCSIS-compliant cable modems Chapter 6: The Internet 25
  • 26. 6 Satellite Internet Service  Satellite Internet service distributes always-on, high-speed asymmetric Internet access by broadcasting signals to and from a personal satellite dish  A satellite modem is a device that modulates data signals from a computer into a frequency band that can be carried to the satellite dish where it is converted to another frequency, amplified, and transmitted Chapter 6: The Internet 26
  • 27. 6 Satellite Internet Service Chapter 6: The Internet 27
  • 28. 6 Fixed Wireless Service  Fixed wireless Internet service broadcasts signals in order to offer Internet access to large areas – WiMAX – A WiMAX system transmits data to and from WiMAX antennas mounted on towers – Under ideal conditions, WiMAX can transmit data at 70 Mbps Chapter 6: The Internet 28
  • 29. 6 Fixed Internet Connection Roundup Chapter 6: The Internet 29
  • 30. 6 SECTION C Portable and Mobile Internet Access  Internet to Go  Wi-Fi Hotspots  Portable and Mobile WiMAX  Portable Satellite Service  Cellular Data Service Chapter 6: The Internet 30
  • 31. 6 Question 062300 What is the difference between portable Internet access and mobile Internet access? – A. With portable access you cannot work online while moving very far. – B. Mobile access is less expensive than portable access. – C. Portable access requires cables, whereas mobile access does not. – D. Portable access requires a cell phone, whereas mobile access requires a notebook computer. Chapter 6: The Internet 31
  • 32. 6 Internet To Go  Portable Internet access can be defined as the ability to easily move your Internet service from one location to another  Mobile Internet access offers a continuous Internet connection as you are walking or riding in a bus, car, train, or plane Chapter 6: The Internet 32
  • 33. 6 Wi-Fi Hotspots  A Wi-Fi hotspot is an area in which the public can access a Wi-Fi network that offers Internet service  Wi-Fi does not typically provide acceptable mobile Internet access because you can only remain connected within range of the network’s hotspot Chapter 6: The Internet 33
  • 34. 6 Portable and Mobile WiMAX  WiMAX can be used as a portable technology because Internet access is available to subscribers anywhere within a tower’s coverage area  You use the same Internet service provider whether you are at home or on the road.  Mobile WiMAX Chapter 6: The Internet 34
  • 35. 6 Portable Satellite Service Chapter 6: The Internet 35
  • 36. 6 Cellular Data Services  Using cell phone technology to access the Internet offers mobility that is not yet possible with most of today’s wired or wireless computer network technologies Chapter 6: The Internet 36
  • 37. 6 Cellular Data Services  The fastest cellular technologies for Internet access are EDGE, EV-DO, and HSUPA  Some manufacturers offer netbook computers with built-in circuitry for mobile broadband access  Some cell phones connect to your computer and act as a wireless modem to transmit data over the Internet  Some cell phones, such as the Droid X, can act as a Wi-Fi hotspot by becoming the router for a wireless network Chapter 6: The Internet 37
  • 38. 6 SECTION D Internet Services  Real-Time Messaging  Voice over IP  Cloud Computing  Grid Computing  FTP  File Sharing Networks Chapter 6: The Internet 38
  • 39. 6 Question  062400 On the Internet, application protocols provide consumers with many useful services. Which one of the following correctly describes an Internet-based application protocol? – A. Chat and Instant messaging use Internet VoIP protocol. – B. Files can be shared over the Internet using FTP or BitTorrent protocols. – C. Cloud protocols such as SETI control distributed processing grids. – D. P2P is used to encrypt personal information to keep it private. Chapter 6: The Internet 39
  • 40. 6 Real-Time Messaging  A networked-based, real-time messaging system allows people to exchange short messages while they are online – Instant messaging (IM) – Chat Chapter 6: The Internet 40
  • 41. 6 Voice over IP  VoIP (Voice over Internet Protocol) or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system  If you want to set up free computer-to-computer  VoIP, you, and the people you communicate with can download and install freeware or open source VoIP clients Chapter 6: The Internet 41
  • 42. 6 Forums, Wikis, Blogs, and Tweets An Internet forum is a Web-based online discussion site where participants post comments to discussion threads A wiki allows participants to modify material A blog (short for Web log) is similar to an online diary; it is maintained by one person and contains a series of entries on one or more topics A tweet is a short message of 140 characters or less, posted to the Twitter Web site Chapter 6: The Internet 42
  • 43. 6 Forums, Wikis, Blogs, and Tweets Chapter 6: The Internet 43
  • 44. 6 Cloud Computing The concept of cloud computing depends on a grid of servers and storage devices that offer Internet-accessible computing services ranging from hardware to office productivity applications and complex corporate data processing – Google Apps – Amazon’s Elastic Compute Cloud Chapter 6: The Internet 44
  • 45. 6 Cloud Computing Chapter 6: The Internet 45
  • 46. 6 Grid Computing A grid computing system is a network of computers harnessed together to perform processing tasks – SETI@home project Chapter 6: The Internet 46
  • 47. 6 FTP Chapter 6: The Internet 47
  • 48. 6 File Sharing  P2P file sharing uses peer- to-peer (P2P) protocols that allow users to obtain files from other users located anywhere on the Internet  BitTorrent is a file sharing protocol that distributes the role of file server across a collection of dispersed computers Chapter 6: The Internet 48
  • 49. 6 SECTION E Internet Security  Intrusion Attempts  Securing Ports  Routers and NAT  Virtual Private Networks Chapter 6: The Internet 49
  • 50. 6 Question 062500 Securing your computer from Internet- based intrusions is an important aspect of computer security. Which one of the following is NOT a useful security technique? – A. Setting up NAT on a router – B. Activating firewall software – C. Checking the status of software ports – D. Activating your computer’s file sharing options Chapter 6: The Internet 50
  • 51. 6 Intrusion Attempts  An intrusion is any access to data or programs by hackers, criminals, or other unauthorized persons  Looking for open ports is one of the most common ways of gaining unauthorized access to a network-based computer  A port probe (or port scan) uses automated software to locate computers that have open ports and are vulnerable to unauthorized access Chapter 6: The Internet 51
  • 52. 6 Intrusion Attempts Chapter 6: The Internet 52
  • 53. 6 Securing Ports Chapter 6: The Internet 53
  • 54. 6 Securing Ports  One of the easiest steps to enhance your computer’s security is to turn it off when you aren’t using it  A firewall is software or hardware designed to filter out suspicious packets attempting to enter or leave a computer Chapter 6: The Internet 54
  • 55. 6 Routers and NAT  Routers are intended to work on LANs to monitor and direct packets being transported from one device to another  A routable IP address is one that can be accessed by packets on the Internet  A private IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport Chapter 6: The Internet 55
  • 56. 6 Routers and NAT Chapter 6: The Internet 56
  • 57. 6 Routers and NAT  Network address translation (NAT) is the process your router uses to keep track of packets and their corresponding private or public IP addresses Chapter 6: The Internet 57
  • 58. 6 Virtual Private Networks  It is possible to secure remote connections by setting up virtual private network (VPN) access to a remote access server in the corporate office  Access to a VPN is usually by invitation only. Employees who need to access a VPN are given the necessary instructions, addresses, and passwords to make connections Chapter 6: The Internet 58
  • 59. 6 Virtual Private Networks Chapter 6: The Internet 59
  • 60. 6 What Do You Think?  063100 Should governments be allowed to block access to Web sites based on local religions, politics, and customs? – A. Yes B. No C. Not sure  063200 Do you believe that a privately held Internet service provider like AOL has the right to censor the data posted on Web sites it hosts?  A. Yes B. No C. Not sure  063300 Should companies like Microsoft, Yahoo!, and Cisco Systems provide blocking technology to foreign governments? – A. Yes B. No C. Not sure  063400 Would you use filtering software that was preprogrammed to block pornographic and nuisance Web sites? – A. Yes B. No C. Not sure Chapter 6: The Internet 60

Hinweis der Redaktion

  1. Figure 6-8