0% found this document useful (0 votes)
19 views

Comp 1 Chapter 2

The document discusses the history and technology behind the internet and world wide web. It covers topics like how data is transmitted over the internet at varying speeds, different connection types including dial-up, DSL, cable and wireless, and protocols like TCP/IP that allow communication. The document also discusses the world wide web and browsers that access websites and web pages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Comp 1 Chapter 2

The document discusses the history and technology behind the internet and world wide web. It covers topics like how data is transmitted over the internet at varying speeds, different connection types including dial-up, DSL, cable and wireless, and protocols like TCP/IP that allow communication. The document also discusses the world wide web and browsers that access websites and web pages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Chapter 2

The Internet & the World Wide Web: Exploring  Data Transmission Speeds
Cyberspace
Originally measured in bits per second (bps)
UNIT 2A: The Internet & the Web
8 bits are needed to send one character, such
The Internet began in 1969 as ARPANET. as A or a

The Internet was text-only. In the early Kbps connections send 1 thousand bits per
1990s, multimedia became available on the second
Internet, and the World Wide Web (web) was
Mbps connections send 1 million bits per
born.
second
To connect to the Internet, you need
Gbps connections send 1 billion bits per
1.An access device (computer with modem) second

2.A means of connection (phone line, cable  Uploading & Downloading


hookup, or wireless)
Upload—transmit data from local to remote
3.An Internet access provider (PLDT,Converge) computer

 2.1 Connecting to the Internet Download—transmit data from remote to local


computer
However you connect to the Internet, the
bandwidth will determine the speed of your  Narrowband (Dial-Up Modem): Low
connection. speed but inexpensive

Bandwidth: Expresses how much data can be Telephone line = narrowband, or low
sent through a communications channel in a bandwidth, low speed
given amount of time.
Dial-up connection—use of telephone modem
Baseband: Slow type of connection that to connect to Internet (used mostly in rural
allows only one signal to be areas on POTS, or plain old telephone system)
transmitted at a time.
 Telephone Modems
Broadband: High-speed connections.
Can be either internal or external
Physical connection to Internet—wired or
Maximum speed of 56 Kbps
wireless?
Most ISPs offer local access numbers
Telephone [dial-up] modem - (wired)
 High-Speed Phone Lines
High-speed phone line—DSL, T1/T3 - (wired)
More expensive but available in cities & most
Cable modem - (wired)
towns
Wireless—satellite and other through-the-air
links - (wireless)
DSL line (digital subscriber line)  Other Wireless: Wi-Fi, 3G, & 4G

Uses regular phone lines, DSL Wi-Fi—stands for “wireless fidelity”


modem,Receives data at 7 ̶ 105Mbps; sends at
Name for a set of wireless standards (802.11)
about 384 Kbps – 1 Mbps
set by IEEE
Is always on
Transmits data wirelessly up to 54 Mbps for
Need to live no farther than 4.5 miles from 300 – 500 feet from access point (hotspot)
phone company switching office
Typically used with laptops and tablets that
Not always available in rural areas have Wi-Fi hardware

T1 line—very expensive 3G = “third generation”; uses existing


cellphone system; handles voice, email,
Traditional trunk line, fiber optic or copper;
multimedia
carries 24 normal telephone circuits
4G = “fourth generation”; faster than 3G; built
Transmission rate of 1.5 ̶ 6 Mbps (T3 = 6 – 47
specifically for Internet traffic – but not
Mbps)
standard yet
The “last mile” can still be a problem
Both 3G and 4G used mostly in smartphones
Generally used by large organizations
 Internet Access Providers (ISPs)
 Cable modem
ISP: Local, regional, or national organization
TV cable system with Internet connection; that provides access to the Internet for a fee —
company usually supplies cable modem e.g., Comcast, Charter, AT&T.

Is always on Wireless Internet Service Provider (WISP) —


Enables wireless-equipped laptop/tablet and
Receives data at up to 100 Mbps; sends at
smartphone users to access Internet. e.g., AT&T,
about 2-8 Mbps T-Mobile, (Globe, smart)

 Satellite Wireless Connections  2.2 How Does the Internet Work?

Transmits data between satellite dish and The Internet is basically a huge network that
satellite orbiting earth connects hundreds of thousands of smaller
networks.
Connection is always on
Central to this arrangement are
Requires Internet access provider with 2-way
client/server networks
satellite transmission
Client: computer requesting data or
User needs to buy or lease satellite dish and
services
modem and have them connected
Server or host computer: central Data transmissions are broken up into
computer supplying data or services requested packets and re-assembled at destination (the IP
of it —Internet Protocol— address)

 Internet Connections: POP & IXPs


 IP (Internet Protocol) Addresses
Point of Presence (POP)
Every device connected to the Internet has
A collection of modems and other
an address
equipment in a local area. A local gateway
(access) to an ISP’s network. ISP connects to an Each IP address uniquely identifies that
IXP device. The address is four sets of numbers
separated by periods (e.g., 1.160.10.240)
Internet Exchange Point (IXP)
Each number is between 0 and 255
A routing computer at a point on the
Internet where several connections come Dynamic IP: addresses change with
together every use; individual computer users
are assigned static IP addresses when
IXPs are run by private companies
they log on
Allow different ISPs to exchange Internet
Static IP: addresses don’t change
traffic
(established organizations – including
 Internet Communications: ISPs – and companies have static IP
Protocols, Packets, & IP Addresses addresses, which they pay for)

Handshaking & Authentication: Connecting to  Who Runs the Internet?


your ISP’s point of presence (POP)
Basically, no one owns the Internet
Handshaking—fastest transmission speed
The board of trustees of the Internet Society
established
(ISOC) oversees the standards
Authentication—correct password & user name
Internet Corporation for Assigned Names
Protocols and Numbers (ICANN) regulates domain
names (such as .com, edu., .net) that
The set of rules a computer follows to
overlie IP addresses; ICANN does not
electronically transmit data.
control content
TCP/IP (Transmission Control
 2.3 The World Wide Web
Protocol/Internet Protocol) is the Internet
protocol (Developed in 1978 by ARPA; used for The Face of the Web: Browsers, Websites,
all Internet transactions) & Web Pages

Packets The World Wide Web brought multimedia to


the Internet.
Fixed-length blocks of data for transmission,
determined by TCP/IP
The web and the Internet are not the same; the The file within the directory, including
web is multimedia-based, and the Internet is optional extension
not. The Internet is the infrastructure that
supports the web.
 The Nuts & Bolts of the Web: HTML &
A Browser is a software that gets you to
Hyperlinks
websites and their individual web pages and
displays the content. Examples of this are= TCP/IP— General Internet Protocol
Internet Explorer, Mozilla FireFox, Apple
HTTP—Protocol Used to Access World Wide
Macintosh’s Safari, Google’s Chrome,
Web
Microsoft’s Bing.
Hypertext Markup Language (HTML)
 Website
The “markup” language used in writing and
Is the location on a particular computer
publishing web pages
(server) that has a unique address; example =
www.barnesandnoble.com, youtube.com Set of instructions used to specify
document structure, formatting, and links to
The website (server) could be anywhere —
other documents on the web
not necessarily at company headquarters
Hypertext links connect one web
 Web Page
document to another
A document on the web that can include
 Using Your Browser to Get around the
text, pictures, sound, and video
Web
The first page on a website is the Home
Web browsers interpret HTML and allow
page
you to move around the Internet and the web
The Home page contains links to other come preinstalled on most PCs.
pages on the website (and often other websites)
 5 basic elements
 How the Browser Finds Thing: URLs
URL (address)bar
Uniform Resource Locator (URL): address
Menu bar(settings for the browser)
for a web page
Toolbar (tabs, bookmarks)
A character string that points to a specific
piece of information anywhere on the web Workspace (the interactive zone of the website)

A website’s unique address Status bar (displays current status of the

It consists of web page; E.g., 100% = fully loaded)

The web protocol, http:// Browser’s Home Page

The domain name of the web server The page you see when you open your web
browser
The directory name or folder on that server
You can change the Home Page on your browser  Search Services & Search Engines

Organizations that maintain databases


accessible through websites to help you find
Back, Forward, Home
information on the internet
Use the browser’s icons to move from one
Examples: portals like Yahoo! and Bing, plus
page to another (these icons can appear on
Google, Ask.com, Gigablast
different bars in different browsers)
Search services maintain search engines—
 Navigation
programs that users can use to ask questions or
History List use keywords to find information

A list of websites you visited since you Databases of search engines are compiled using
opened up your browser for this session software programs called spiders (crawler, bots,
agents)
Allows you to easily return to a particular site
Spiders crawl through the World Wide Web.
Bookmark
Follow links from one page to another
Allows you to store the URL from a site on
Index the words on that site
your computer so you can find it again in
another browser session A search never covers the entire web. Search
engines differ only in what they cover
Interactivity with a web page
1. Individual Search Engines
Click on hyperlinks to transfer to another page
Compile their own searchable databases on
Type text in a text box and then hit Enter
the web
Click on scroll arrows to move up and down,
You search by typing keywords and receiving
or side to side, on a page “hits”. Examples are: Ask, Bing, Google, and
Yahoo!
Web portals: Starting points for finding
information 2. Subject Directories

A portal is gateway website that offers a broad Created and maintained by human editors, not
array of resources and services, online shopping electronic spiders. Allow you to search for
malls, email support, community forums, stock information by selecting lists of categories or
quotes, travel info, and links to other categories topics. Example sites: are Beaucoup! LookSmart,
Open Directory Project, and Yahoo! Directory
Examples: Yahoo!, Google, Bing, Lycos, and AOL
3. Metasearch Engines
Most require you to log in, so you can check the
home page for general information. Use the Allows you to search several search engines
subject guide to find a topic you want simultaneously. Examples are Yippy!, Dogpile,
Mamma, MetaCrawler, and Webcrawler
4. Specialized Search Engines Tags are commonly used on blogs and YouTube
– word listed at the bottom. Essentially tags are
Help locate specialized subject matter, such as
keywords used to classify content. (The # is a
info on movies, health, jobs. Examples are :
hash symbol; thus the Twitter term hashtag. )
Career.com. WebMD, Expedia, U.S. Census
Bureau Tag managing is available through delicious.com
and BlinkList, among other companies.
 Smart Searching: Three General
Strategies UNIT 2B: The Riches & Risks of Internet Use

If you’re just browsing . . .  2.4 Email, Instant Messaging, & Other


Ways of Communicating over the Net
Try a subject directory
Email
Next try a metasearch engine
Outgoing mail: sent from your computer to a
If you’re looking for specific information . . .
Simple Mail Transfer Protocol (SMTP) server run
Try a Answers.com “one-click” search by your ISP

Or go to a general search engine, then a Incoming mail: Email sent to your computer:
specialized one uses Post Office Protocol version 3 (POP3)

If you’re looking for everything on a Two ways to send & receive email:
subject
1. Email Program
Try the same search on several search engines
Enables you to send email by running email
 Wikis & Wikipedia software on your computer that interacts with
an email server at your Internet access
A wiki is a simple piece of software that can be
provider
downloaded for free and used to make a
website (also called a wiki) that can be Incoming mail is stored on the server in an
corrected or added to by anyone. electronic mailbox

Wikipedia is a free online encyclopedia that Upon access (your ID and password), mail is
anyone around the world can contribute to or sent to your software’s inbox. Examples:
edit. However, Wikipedia is not considered Microsoft Outlook, Apple Mail
reliable or authoritative by many academics and
2. Web-Based Email
librarians.
You send and receive messages by interacting
 Tagging
via a browser with a website
Tags: Do-it-yourself labels that people can
Advantage: You can easily send and receive
put on anything found on the Internet, from
messages while traveling, using any computer
articles to photos to videos, that help them to
or equipped mobile device
find their favorite sites again and to link them.
Disadvantages: ads and email hacking
Can be shared easily with other people
Examples: Yahoo! Mail and Gmail (Google)  Instant Messaging

 Email Attachments Instant messaging enables you to communicate


by email with specified other users (“buddies”)
A copy of a file or document that you send
in real time.
attached to an email to one or more people
Any user on a given email system can send a
Recipients must have compatible software to
message and have it pop up instantly on the
open the attachment; for example, if they don’t
screen of anyone logged into that system.
have Excel, they probably can’t read the
Examples: AOL/AIM, Google Chat, Windows
spreadsheet you sent them.
Messenger, Yahoo! Messenger
Be careful about opening attachments:
Done on computers; is not the same as texting.
Many viruses hide in them; scan them with
 Discussion Groups
antivirus software
Mailing Lists:
Know who has sent the attachment before you
open it One-way (to make announcements) or two-
way (for discussions) email subscription lists
 Netiquette: Appropriate Online
Behavior Email discussion groups on special-interest
topics, in which all subscribers receive email
Don’t waste people’s time.
messages sent to the group’s email address
Don’t write anything that you would not say (message to group > group to members)
to a person’s face
Newsgroups:
Include helpful subject and signature lines.
Giant electronic bulletin board for written
Be clear and concise. discussions about specific subjects. To
participate you need a newsreader program
Avoid spelling and grammatical errors.
Message Boards:
Avoid SHOUTING and flaming.
Special-interest discussion groups without
Also:
newsreaders
Be careful with jokes.
Accessed through a web browser
Avoid sloppiness, but avoid criticizing
A collection of messages on a particular topic is
other’s sloppiness.
called a thread
Don’t send huge file attachments unless
 FTP (File Transfer Protocol)
requested.
Software standard for transferring large files
When replying, quote only the relevant
between computers, including those with
portion.
different operating systems
Don’t overforward (don’t copy emails to
everyone you know).
You can also transfer files from an FTP site on Multimedia Applets
the Internet to your PC
Small programs that can be quickly
FTP sites offer many free files. FTP can be either downloaded and run by most browsers
public or proprietary
Java is the most common Applet language
You can download using your web browser or
Text & Images: great variety available
FTP client programs, such as Fetch, Cute,
FileZilla, and SmartFTP. Example: Google Earth

 2.5 The Online Gold Mine Animation


Telephony, Multimedia, Webcasting,
The rapid sequencing of still images to create
Blogs, E-Commerce, & Social
the appearance of motion
Networking
Used in video games and web images that seem
to move, such as banners
Telephony: The Internet Telephone
Video & Audio
Uses the Internet to make phone calls via VoIP
(Voice over Internet Protocol) Downloaded completely before the file can be
played, or downloaded as streaming
Long-distance calls are either very inexpensive
video/audio
or free
Examples: RealVideo and RealAudio
With no PC, dial a special phone number to
packetize your call for a standard telephone  The Web Automatically Comes to You

Use with a PC that has a sound card, Push technology: Software that automatically
microphone, Internet connection with modem downloads information to personal computers.
& ISP, and internet telephone software such as
Webcasting: Sending users customized text,
Skype and Vonage
video, audio on regular basis.
Also allows videoconferencing
RSS newsreaders (RSS aggregators): Programs
that scour the web, sometimes hourly,
Multimedia on the Web sometimes more frequently, and pull together
in one place “feeds” from several websites.
Allows you to get images, sound, video, and
animation XML and RSS have led to blogs and
blogosphere.
May require a plug-in, player, or viewer
Blogs (weblogs) are frequently updated sites on
A downloadable program that adds a specific
the web intended for public consumption that
feature to a browser so it can view certain files
contain a writer’s observations, opinions,
Examples: Flash, RealPlayer, QuickTime images, and links to other websites.

Podcasting: Internet radio or similar Internet


audio program delivered via RSS feed to a
subscriber to be played back on computer or Social-network aggregators: Collect content
digital audio device. from all of a user’s various social network
profiles into one place.
 E-Commerce: B2B, B2C, & C2C
 Web 3.0: Computer-Generated
E-Commerce (electronic commerce):
Information
conducting business activities online
In Web 3.0, information will be computer-
E-commerce has led to showrooming, the
generated with less human interaction required
phenomenon in which shoppers browse for
to discover and integrate that information.
products in stores, only to buy them from an
online rival, frequently at a lower price. Two ideas might form the basis for Web 3.0—
semantic markup and a personal browser.
B2B is business-to-business e-commerce.
Semantic markup: Data interchange formats
Business-to-consumer commerce, or
that will allow machines to understand the
B2C: is the electronic sale or exchange of goods
meaning—or “semantics”—of information on
and services from the companies directly to
the web.
the public, or end users (e.g., online banking,
online shopping, online stock trading). The Web 3.0 browser will probably act as a
personal assistant because every user will have
Consumer-to-consumer commerce, or
a unique Internet profile based on his or her
C2C, is the electronic sale or exchange of goods
browsing history. The more you use the Web,
and services between individuals (e.g.,
the more your browser learns about you and
auctions).
the less specific you'll need to be with your
 Web 2.0: The Social Web questions.

Web 2.0 refers to the web viewed as a medium  2.6 The Intrusive Internet
in which interactive experience, in the form of Snooping, Spamming, Spoofing,
blogs, wikis, forums, social networking, and so Phishing, Pharming, Cookies, Spyware,
on, plays a more important role than simply & Malware
accessing information.
Snooping
The move toward a more social, collaborative,
Email is not private
interactive, and responsive web; has led to the
“social web,” giving rise to: Corporate management has the right to view
employees’ email. Friends can send email
Social networking sites: Online
anywhere. Not all ISPs protect their customers’
communities that allow members to keep track
privacy.
of friends and share photos, videos, music,
stories, and ideas (e.g., Facebook, LinkedIn). Deleted emails can be retrieved from a hard
disk.
Media-sharing sites: Online social
networks in which members share media such
as photos, videos, music, ideas (e.g., YouTube,
Flicker, Shutterfly).
Spam: Electronic Junk Mail Cookies

Unsolicited email that takes up your time. Little text files (data) left on your storage by
some websites you visit.
Delete it without opening the message. Never
reply to a spam message. Can include your log-in name, password,
browser preferences, and credit card
Do not click on “unsubscribe” at the bottom of
information.
an email. When you sign up for something,
don’t give your email address. Every time you load a particular website, the
browser sends the cookie back to the server to
Use spam filters. Fight back by reporting new
notify the website of your previous activity.
spammers to www.abuse.net or
www.spamhaus.org. Can make visiting these websites next time
more convenient and faster.
Spoofing
But cookies can be used to gather information
Using fake email sender names so the message
about you and your browsing habits and history;
appears to be from a different source, so you
this information can be used without your
will trust it.
consent.
If you don’t know the sender, don’t open it.
A first-party cookie is a cookie from a website
Phishing that you have visited. Third-party cookies are
placed by trusted partners of the websites you
Sending forged email directing recipient to fake
visit. (Third-party cookies are frequently placed
website.
by ad networks.)
Purpose: to entice people to share personal or
 Spyware: Adware, Browser & Search
financial data.
Hijackers, & Key Loggers
Fake website looks like real website, such as a
Spyware is software surreptitiously
bank’s, or social websites
installed on your computer via the web.
Pharming
Spyware: hides on your PC/device and
Implanting malicious software on a victim’s captures information about what is on the it,
computer that redirects the user to an such as keystrokes and passwords
impostor web page even when the individual
Adware:, or pop-up generator, is a
types the correct address into his or her
kind of spyware that tracks web
browser.
surfing or online buying so that
Use websites with URLs that begin with marketers can send you targeted
“https:// and unsolicited pop-up and other
ads.
Some spyware removal programs can correct
the corruption. Browser hijackers: change settings in your
browser without your knowledge, often
changing your browser’s home page and
replacing it with another web page.

Malware

There are many forms of malicious software—


so-called malware—that can harm a computer
system, a common danger being viruses.

A virus is a rogue program that migrates


through the Internet or via operating systems
and attaches itself to different programs that
spread from one computer to another, leaving
infections.

The principal defense is to install antivirus


software, which scans a computer to detect
viruses and, sometimes, to destroy them.

You might also like