Introduction To Internet: Lesson 1: The Inroduction
Introduction To Internet: Lesson 1: The Inroduction
INTERNET
A. Internet Addresses?
A.1 Computer Addresses
A.2 Domain Names
A.3 Personal Addresses
B. Internet Services
B.1 Internet Services
B.1.1 Email
B.1.2 Mail Lists
B.1.3 FTP
B.1.4 Gopher
B.1.5 Instant Messaging (IM)
B.1.6 IRC
B.1.7 Newsgroups
B.1.8 Voice over IP
B.1.9 World Wide Web (WWW)
C. Types of Internet Connection
C.1 Types of Internet connections
1. Terminal Dialup/Modem (Shell connection)
2. SLIP (Serial Line Internet Protocol)
3. PPP (Point-to-Point Protocol)
4. ISDN (Integrated Services Digital Network)
5. DIAS
6. Cable Modem
7. Digital Subscriber Line (DSL) connection.
8. Direct Connection (Leased circuit)
9. Satellite connections
10. Wireless connections
D. Computer Virus
Different Types of Computer Viruses
Resident Viruses
Direct Action Viruses
Overwrite Viruses
Boot Virus
Macro Virus
Directory Virus
Polymorphic Virus
File Infectors
Companion Viruses
FAT Virus
Worms
Trojans or Trojan Horses
Logic Bombs
III. LESSON 3:
Introduction: Environments of web Browser
Objectives:
To Explore the Web Browser Environments.
To know what is important.
What is important about internet?
How to access through Internet
4. The Environment
5. OSI Layer
Session Objectives
At the end of this session you will be able to:
History
A. What is Internet?
Introduction of Internet
The internet is a global of interconnected government, academic, public and private
computer networks which is based upon the networking technologies of the Internet
Protocol Suite. It is the successor of the Advanced Research Project Agency Network
(ARPANET) developed by DARPA of the U.S Department of Defense.
The Internet is also a communications backbone underlying the World Wide Web
(WWW).
The Internet changes so quickly and the technology advances so rapidly that it can seem
almost impossible to keep up with all of it. If you're like just about everyone else involved
in the Internet, your questions are similar to those of my friend. You'll find your answers
here.
C. The History
Objectives:
To know Origin of Internet History
To Create a digital archive or source materials about the creation and
evolution of the Internet.
Generate new historical material through the collection of commentaries that
include participant's stories, observations, perspectives, and memories
Baran's finished document described several ways to accomplish this. His final proposal
was a packet switched network.
"Packet switching is the breaking down of data into datagrams or packets that are labeled to
indicate the origin and the destination of the information and the forwarding of these
packets from one computer to another computer until the information arrives at its final
destination computer. This was crucial to the realization of a computer network. If packets
are lost at any given point, the message can be resent by the originator."
Backbones: None - Hosts: None
1972 The first e-mail program was created by Ray Tomlinson of BBN.
The Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced
Research Projects Agency (or DARPA)
ARPANET was currently using the Network Control Protocol or NCP to transfer data. This
allowed communications between hosts running on the same network.
Backbones: 50Kbps ARPANET - Hosts: 23
UUCP (Unix-to-Unix CoPy) developed at AT&T Bell Labs and distributed with UNIX one
year later.
The Department of Defense began to experiment with the TCP/IP protocol and soon
decided to require it for use on ARPANET.
Backbones: 50Kbps ARPANET, plus satellite and radio connections - Hosts: 111+
The Creation of BITNET, by IBM, "Because its Time Network", introduced the "store and
forward" network. It was used for email and listservs.
Backbones: 50Kbps ARPANET, plus satellite and radio connections - Hosts: 111+
The University of Wisconsin created Domain Name System (DNS). This allowed packets
to be directed to a domain name, which would be translated by the server database into the
corresponding IP number. This made it much easier for people to access other servers,
because they no longer had to remember numbers.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, plus satellite and radio connections -
Hosts: 562
Upgrade to CSNET was contracted to MCI. New circuits would be T1 lines,1.5 Mbps
which is twenty-five times faster than the old 56 Kbps lines. IBM would provide advanced
routers and Merit would manage the network. New network was to be called NSFNET
(National Science Foundation Network), and old lines were to remain called CSNET.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, plus satellite and radio connections -
Hosts: 1024
While the T3 lines were being constructed, the Department of Defense disbanded the
ARPANET and it was replaced by the NSFNET backbone. The original 50Kbs lines of
ARPANET were taken out of service.
Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient
information access to the members of the international high-energy physics community.
Backbones: 56Kbps CSNET, 1.544Mbps (T1) NSFNET, plus satellite and radio
connections - Hosts: 313,000
The NSF established a new network, named NREN, the National Research and Education
Network. The purpose of this network is to conduct high speed networking research. It was
not to be used as a commercial network, nor was it to be used to send a lot of the data that
the Internet now transfers.
Backbones: Partial 45Mbps (T3) NSFNET, a few private backbones, plus satellite and
radio connections - Hosts: 617,000
Marc Andreessen and NCSA and the University of Illinois develops a graphical user
interface to the WWW, called "Mosaic for X".
Backbones: 45Mbps (T3) NSFNET, private interconnected backbones consisting mainly of
56Kbps, 1.544Mbps, and 45Mpbs lines, plus satellite and radio connections - Hosts:
2,056,000
$50 annual fee is imposed on domains, excluding .edu and .gov domains which are still
funded by the National Science Foundation.
Backbones: 145Mbps (ATM) NSFNET (now private), private interconnected backbones
consisting mainly of 56Kbps, 1.544Mbps, 45Mpbs, 155Mpbs lines in construction, plus
satellite and radio connections - Hosts: 6,642,000
The Internet Society, the group that controls the INTERNET, researches new TCP/IP
technology that will be able to have more than the approximately 4.3 billion addresses
currently available. The problem that has arisen is that it is not known how both the old and
the new addressing systems will be able to work at the same time during a transition period.
Internet2 is established.
(Backbone data below was valid in 1996, please seek other references for current backbone
and host data as it is constantly expanded.)
Backbones: 145Mbps (ATM) NSFNET (now private), private interconnected backbones
consisting mainly of 56Kbps, 1.544Mbps, 45Mpbs,and 155Mpbs lines, plus satellite and
radio connections - Hosts: over 15,000,000, and growing rapidly
A new technology recommendation called IPv6 is suggested to replace the current IPv4
technology. IPv4 allows for fewer than 4.3 billion directly connected Internet devices,
problematic because the world population (as of 2009) is well over 6.5 billion
(theoretically, if ever human had a computer and mobile phone, we'd need 13 billion
addresses, which is something IPv6 can easily accomplish).
In 2005, the One Laptop Per Child project begins. In an attempt to provide low cost,
education-designed laptops to children around the world for a low cost (US$100 per unit)
this project helps spark the netbook industry. Netbooks are small portable computers with
extended battery life and built-in Wi-Fi connectivity.
Multi-touch technology begins to appear in handheld devices, tablet computers, and
netbooks. This technology supplements traditional touch-screen technology by allowing
advanced gesturing (several fingers moving on a screen instead of just one). Multi-touch
technology is seen as a possible alternative to traditional keyboard and mouse (touchpad)
systems.
Read Bill Buxton's Overview and History of Multi-Touch Systems entitled Multi-Touch
Systems that I Have Known and Loved
There is no one inventor of the Internet. The Internet was created in the 1960s as
a huge network linking big university and government computers. The science behind
the Internet was invented during the Cold War, when the United States was in
competition against Russia for weapons and technology. So the Internet is actually pretty
oldaround forty years. Much of Internets initial development was supported by
American governmental research and network development (beginning with the
American military's ARPANET in 1969).
In fact, email has been around since 1972! In 1989 that Tim Berners-Lee, a scientist at
the European Laboratory for Particle Physics in Geneva, proposed the World Wide Web.
Now Internet Service Providers (ISPs) offer Internet access to their clients, at costs
ranging from Rs 150/- per 6 months to hundreds of rupees per year, depending on the
types of service they offer.
i. Communication
ii. Education
iii. Business managements / Commercial Company
iv. Government
v. Private Organization
vi. Entertainment
Communication
The Internet is used both for one-to-one communications (email and real-time
"chat" programs) and one-to-many.
Information Retrieval
The Internet allows access to public domain information, bibliographic databases,
libraries, and entertainment services, as well as to proprietary information services.
Presentation of Information
Any organization connected to the Internet can provide access to its own in-house
information (library catalogs, faculty information, etc.) to millions of people world-wide.
Individuals can also develop and provide their own information packages via their
own home pages.
A. Internet Addresses?
Every computer, file of information, and person on the Internet is identified by a unique
"address."
A person's address (or their email address) places the user's "username" (or
"login") and the symbol "@" before the computer address. For example, a user
whose username is "creator", who is accessing email from the "yahoo" server of
United State Yahoo Website, would have the following address:
[email protected]
B. Internet Services
B.1.1 Email
It is the Internet's version of the postal service. Using the Internet, it provides the ability to
send a message, reply to a message, send a file created in another program and/or even send
the same message to a group of people. Some benefits of Email are:
Speed: A message can be sent from Chennai to Australia in a matter of seconds.
Cost: Emails are cheap. You are usually only charged for the telephone call time (local call
rate) for sending the message into the Internet, and not the cost associated with transferring
the message across the Internet.
Flexibility: It is easy to send duplicates of your messages to other people or groups for the
cost of a single message.
Record keeping: Messages sent and received can be easily stored for future reference.
In order to use Email, you will need Internet access arranged through an Internet
Service Provider (ISP), who will allocate you one or a number of Email accounts. To be able
to retrieve and send mail from these addresses, a user will need what is known as Email client
software and your ISP usually provides this although nowadays most computers come with it
pre-installed.
B.1.3 FTP
FTP was the original Internet mechanism for the storage and retrieval of information. There
are still many FTP Sites around the Internet, although many of them have been melded into
the World Wide Web. In computer science, FTP stands for "File Transfer Protocol," which is
a way of transferring files between computers. A file can be anything -- a spreadsheet, a word
document, a song, or a picture. When someone says "Please FTP me that file," for instance,
that means "Please transfer that file from your computer to mine." To FTP, you usually need
to download a special program, or application. You also usually need a password to be able to
access or send information to someone else's computer.
B.1.4 Gopher
Gopher was developed at the University of Minnesota, primarily to support its own Campus
Wide Information Server (CWIS). It provides access to information available either locally or
elsewhere on the Internet by means of a simple series of uniformly designed menus.
B.1.6 IRC
IRC stands for "Internet Relay Chat". It has been used in many countries around the world.
IRC is a multi-user chat system, where people meet on "channels" (rooms, virtual places,
usually with a certain topic of conversation) to talk in groups, or privately. There is no
restriction to the number of people that can participate in a given discussion, or the number of
channels that can be formed on IRC.
B.1.7 Newsgroups
The Internet has a place where we can gather, question, and discuss our experiences within a
wide variety of topics. It's called Usenet News. Some users also call it Net News.
Think of Usenet News as a giant, worldwide bulletin board. Anyone can freely post
something on this bulletin board. Everyone else can read the posted items and add their own
items. These voluntary contributions and free exchange of information are the foundation of
the Internet.
The options for providing user connectivity to the Internet are given below:
1. Terminal Dialup/Modem (Shell connection)
Most common option
User requirements limited to modem and communications software
Text-only access
Shell accounts were more popular before the advent of the Web. A shell account lets you
use your computer much as if it were a virtual console associated with a remote computer.
You can type commands, which are interpreted by the remote computer, and view the
resulting output on your computer. Although a few web browsers, such as Lynx, can
operate via a shell account, they dont generally support the highly graphical, multimedia
pages which web surfers have come to expect.
5. DIAS
The DIAS offers a wire-line solution for high speed symmetrical Internet access on the
existing telephone lines. It provides an "always on" internet access that is permanently
available at customer's premises. DIAS combines voice and internet data packets on a
single twisted pair wire at subscriber premises that means you can use telephone and surf
internet at the same time.
6. Cable Modem
The term Cable Modem is quite new and refers to a modem that operates over the
ordinary cable TV network cables. Basically you just connect the Cable Modem to the
TV outlet for your cable TV, and the cable TV operator connects a Cable Modem
Termination System (CMTS) in his end (the Head-End).
Actually the term Cable Modem is a bit misleading, as a Cable Modem works more
like a Local Area Network (LAN) interface than as a modem.
In a cable TV system, signals from the various channels are each given a 6-MHz slice of
the cables available bandwidth and then sent down the cable to your house. When a
cable company offers Internet access over the cable, Internet information can use the
same cables because the cable modem system puts downstream data data sent from the
Internet to an individual computer into a 6-MHz channel. On the cable, the data looks
just like a TV channel. So Internet downstream data takes up the same amount of cable
space as any single channel of programming. Upstream data information sent from an
individual back to the Internet requires even less of the cables bandwidth, just 2 MHz,
since the assumption is that most people download far more information than they
upload.
Putting both upstream and downstream data on the cable television system requires two
types of equipment: a cable modem on the customer end and a cable modem termination
system (CMTS) at the cable providers end. Between these two types of equipment, all
the computer networking, security and management of Internet access over cable
television is put into place.
9. Satellite connections
This connection allows you to download Internet files via a satellite connection. This is
an efficient method for receiving large Web graphics and other items, but you still need a
modem connection for other features. You must purchase the connection hardware as
well as subscribe to the service.
D. Computer Virus
The Internet, just like the rest of the world, is not a perfectly safe place to visit. If
you download files from the Internet, there is a chance a very small chance, but nonetheless
a chance that your computer could become infected with a virus.
Viruses are malicious programs that invade your computer. They can cause many
different kinds of damage, such as deleting data files, erasing programs, or destroying
everything they find on your hard disk. Not every virus causes damage; some simply flash
annoying messages.
Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally useless
once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete the file
completely, thus losing the original content.
Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a
crucial part of a disk, in which information on the disk itself is stored together
with a program that makes it possible to boot (start) the computer from the disk.
The best way of avoiding boot viruses is to ensure that floppy disks are write-
protected and never start your computer with an unknown floppy disk in the disk
drive.
Macro Virus
Macro viruses infect files that are created using certain applications or
programs that contain macros. These mini-programs make it possible to
automate series of operations so that they are performed as a single action,
thereby saving the user from having to carry them out one by one.
Directory Virus
Directory viruses change the paths that indicate the location of a file. By
executing a program (file with the extension .EXE or .COM) which has been
infected by a virus, you are unknowingly running the virus program, while the
original file and program have been previously moved by the virus.
Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or signature
searches (because they are different in each encryption) and also enables them to
create a large number of copies of themselves.
File Infectors
This type of virus infects programs or executable files (files with an .EXE or
.COM extension). When one of these programs is run, directly or indirectly, the
virus is activated, producing the damaging effects it is programmed to carry out.
The majority of existing viruses belong to this category, and can be classified
depending on the actions that they carry out.
Companion Viruses
Companion viruses can be considered file infector viruses like resident or
direct action types. They are known as companion viruses because once they get
into the system they "accompany" the other files that already exist. In other
words, in order to carry out their infection routines, companion viruses can wait
in memory until a program is run (resident viruses) or act immediately by
making copies of themselves (direct action viruses).
FAT Virus
The file allocation table or FAT is the part of a disk used to connect
information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to
certain sections of the disk where important files are stored. Damage caused can
result in information losses from individual files or even entire directories.
Worms
A worm is a program very similar to a virus; it has the ability to self-
replicate, and can lead to negative effects on your system and most importantly
they are detected and eliminated by antiviruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D,
Mapson.
Logic Bombs
They are not considered viruses because they do not replicate. They are not
even programs in their own right but rather camouflaged segments of other
programs.
Their objective is to destroy data on the computer once certain conditions have
been met. Logic bombs go undetected until launched, and the results can be
destructive.
The first part of the answer to the question, "How do you stay safe on the
Internet?", is... know what the threats are that you and your computer are up
against.
Without this knowledge, how are you going to know you've got everything
covered off? Do you just rely on what the security software vendors tell you to
spend your money on?
By being aware of what the risks are, I suggest you will save yourself money
and have more effective protection when it comes to the second part of the
answer to the question "How do you stay safe on the Internet?"... selecting
effective prevention and protection to guard privacy and online security.
To help you decide what is necessary for your particular protection, in The
Three Levels Of Internet Risk Protection, I talk about the safe practices that help
protect your computer and the types of software to use -- from those that are
absolutely essential for security, to others which you may want to install to
guard privacy to the level you desire.
But back to this article, 'How Do You Stay Safe On The Internet?'... here, I'll
provide you with an introduction to each type of threat. At the end of it, you'll
have a good feel for the dangers on the Internet and how those threats can affect
you, your PC and your information... be it personal, financial, family or
business.
There are ten of the most prevalent threats covered here. Either go through them
all, or click on the links below for those you are particularly interested in:
By the way... I've tried to keep the technical language simple, but if you don't
understand some of the terms, check them out at Netlingo, which provides
definitions and explanations for all Net terminology.
What Is A Virus?
A virus is a man-made computer program that infects a file or program on our
computers. Each time the infected program is run, the virus is also triggered. It
spreads itself by infecting other programs on the same computer.
What Is A Worm?
A worm is also a man-made program that replicates itself. However, unlike a
virus, it does not infect other program files on the computer. Instead, a worm
spreads itself automatically to other computers through email, over a network
and via Internet Relay Chat (IRC).
* Send unsolicited bulk email (spam) to those in our mail address books and
other users
2. Trojan Horses
The remote attacker can enter the computer undetected, when the user is online,
to access or destroy any information stored. Alternatively, the Trojan can be
programmed to automatically send any information on our PCs back to the
attacker. This could include,
One of the most common and worrying uses of rootkits, which causes us to ask
'How Do You Stay Safe On The Internet?', is to launch spam and denial of
service (DOS) attacks against other computers or networks. Another use of
rootkits is to hide Trojans, so an intruder can easily use it to extract data from
your computer, as mentioned above.
What Is A Hacker/Cracker?
The term "hacker" is a misused term. We should really be referring to a
"cracker" to describe those who break security on a computer system.
The original term "hacker" refers to computer enthusiasts who enjoy learning
everything about a computer system.
Crackers favorite targets are the home and home office computers connected by
broadband to the Internet... because the connection is always open, there is more
opportunity to locate these computers with their scanners.
Alternatively, crackers may just exploit weaknesses that have not been 'patched'
in the computer's operating system in order to gain entry. As discussed above,
Trojans are another way crackers use to gain access to our PCs.
What Is Spam?
Spam is defined in Dictionary.com as, "Unsolicited e-mail, often of a
commercial nature, sent indiscriminately to multiple mailing lists, individuals,
or newsgroups; junk e-mail".
However, much of this spam has malicious code or malware incorporated into it.
We can trigger this malware just by opening the email or even previewing it in
our email program.
* Identity theft and fraud and phishing via spam email is growing in
frequency
6. Web Bugs
What Is A Web Bug?
It is an image file, usually 1x1 pixel, hidden on a web page or in an HTML e-
mail and will be of interest to those who ask 'How Do You Stay Safe On The
Internet?'
The bugs can discover key details about our system that are very useful to
hackers. They also transmit the IP (Internet Protocol) address of all readers of an
e-mail to a spammer.
7. "Child Security"
There are also the risks of spam sent to kids. Not only are there the malware
risks, but a survey showed that more than 80 percent of children said they
receive "inappropriate" spam every day. Half of those admitted that they felt
"uncomfortable and offended" when seeing them and just didn't know how do
you stay safe on the Internet.
Despite these concerns, many parents are unclear where to go to get advice
about keeping their children safe online.
The malicious code is generally activated by clicking on the ad... the malware
being installed on our computer through vulnerabilities in our browser and a
process known as a drive-by-download.
9. "Tracking Cookies"
Cookies are small text files containing information that identifies each user.
When you move to another page or return to the site at a later time, the web
server asks your browser for the cookie, so it can 'recognize' who you are.
Multiple sites may read from the same cookie and share the information or, they
can sell it on without the knowledge or consent of the user.
10. "Spyware"
What Is Spyware?
Spyware has surpassed viruses as the number one computer Internet security
risks facing us today. Most estimates report that 80-90 percent of computers
already have been infiltrated by spyware.
It can change our browser's home page, scan browser history for web sites
visited and monitor various aspects of our computer and Internet activity! The
information is then transmitted to the attacker.
More and more companies are installing spyware to watch us at work to check
that we are not using the company network to surf prohibited sites or spending
too much time dealing with personal email.
Advertising spyware logs information, such as our name and passwords, our
browsing and Internet usage habits, online purchases and email addresses. And,
of course, it downloads advertisements... lots and lots of advertisements!
Having read through the computer Internet security risks, you'll now know some
of the many dangers you're facing as soon as you go online.
There, you'll see how to decide what protection is right for your PC usage and
habits.
Alternatively, if you already know the risks you want to protect against, just
click on the appropriate button on the navbar at the top left of this page.
ANTI-VIRUS
An 'antivirus' is different than an 'antiviral', which is medicine used
kill a virus or suppress it. Notice the similarities? In both instances, there's
something parasitic at work that needs a counter agent.
i. Different Kind of AntiVirus
Kaspersky
Norton
Avira
McCafee
AVG
NOD32
Panda
Avast
BitDefender
III. Introduction:
Environments of web Browser
Objectives:
To Explore the Web Browser Environments.
To know what is important.
What is important about internet?
How to access through Internet
Firefox NetSurf
Internet Explorer Netscape
Google Chrome Konqueror
Opera Icab
Safari Cyberdog
Seamonkey Amaya
Camino Lynx
Amaya WorldWideWeb
Flock
2. The Browser
As you surf the Web, you will come across sites that
state, "This site is best viewed with" and then name a particular
browser. Many will even provide a link to a site where you can
download the specified browser. Sites make these recommendations
because some browsers use special protocols, allowing site creators to
offer extra features beyond the standard capabilities of hypertext
markup language (HTML). Chief among these browsers are Netscape
Navigator' Microsoft Internet Explorer, Opera and Mozilla Firefox.
Before you can even begin to surf the net you have to be
connected.
Opening The IE
4. The Environment
1. "Page Setup" - to select paper source, orientation, paper size etc when
printing.
2. "Print" - for printing the web page immediately.
3. "Print Preview" - to get a preview of what the printout will look like before
printing.
The only rules in search engine are to encode your exact keyword or
information you want to search.
This will compile the entire web page and all of its other elements as a
single file.
Firefox
1. Right click on the desired web page.
2. Select the "Save page as" or use short cut " Ctrl + S"
3. In the "Save as type" field, drop down the list and choose "Web page,
Complete"
a. Internet Addresses
i. World Wide Web
Internet system for worldwide hypertext linking of
multimedia documents, making the relationship of information
that is common between documents easily accessible and
completely independent of physical location.
Extension Name
But before you rush in and buy a name with any old extension,
take a step back and ask yourself if it can truly serve your
business or plans.
2. Creating an Account
i. Creating E-mail Account (yahoo, google, etc.)
Step by steps procedure;
Instructions
Things You'll Need:
* A computer
* Internet access
1. Step 1
Go to www.yahoo.com
2. Step 2
Click on, "Mail." Click on, "Sign Up." Follow the
registration instructions. You will receive a registration
confirmation email. Confirm your registration.
3. Step 3
Congratulations! You are now ready to send and recieve
email.
www.download.com
What type of files will they accept. For
example, most sites don't allow porn, while others
specialize in it.
Almost all have maximum file sizes.
Do they have enough bandwidth?
How much do they charge for the service? Most
are free, but watch out for advertising.
How long will they keep uploaded files?
Is their privacy policy acceptable?
2. Click on 'browse'.
Say you are a solitaire player and have decided that you would
like to have a variety of solitaire games to play on your computer.
You browse the internet and find a free program called 123 Free
Solitaire 2009. (By the way, Ive seen reviews that indicate that
its great for solitaire addicts.) The site says to Download here
(or something equivalent to that). You click on the button because
you would like to transfer the game from the web site to your
computer; you would like to download it. After you click on the
Download here button, a box will pop up that looks like this:
Here you have three options as to what you would like to do once
the file has been completely downloaded. You may click on Save
and 123 Free Solitaire 2009 will be downloaded (and saved) to
your computer. Option #2: If you dont want to save it (maybe
you just want to try it and not take up any space on your
computer), click on Run to download and install the game. If you
have suddenly decided that you never want to play cards again,
click on Cancel and the download will automatically be stopped.
* Time
* Patience
* Computer disk
* Computer
* Internet
1. Step 1
Insert the software disk into your computer. If you have
just purchased a personal computer (PC) game and you have the
computer disk, you need to insert it into the disc compartment of
your computer. Your computer will recognize the disk and start
running the program. Follow the guided messages that may
appear on your computer screen.
2. Step 2
Click the download file link. If you are downloading a file
or program from the internet, you will need to click on the
"Download" button or link that appears on your computer screen.
A download box may appear on your screen asking you if you
want to run the program from current location or save the
program.
3. Step 3
Choose the "save" option. This will allow you to save the
program so that you can later use it after the download is
complete. Be observant on what file name you saved it as and
which folder it is located. If you don't get a pop up box asking
you these options, don't worry because some internet browsers
save the download automatically.
4. Step 4
Click run program. If you are ready to access the software
or program you just installed on your computer, click run and the
downloaded program should open for you. Many downloaded
software programs will make a shortcut icon on your desktop so
that you will have easy access to the program later.
iii. Buffering
Session Objectives
At the end of this session you will be able to:
OSI Model
Open Systems Interconnection
Developed by the International Organization for Standardization
(ISO) in 1977
Seven layers
Application
Provides user interface such as file transfer (FTP), electronic
mail(SMTP), remote login(Telnet/SSH/rlogin), WWW(http)
etc.
Presentation
Presentation Layer
Format/presentation/syntax of data
Session
Session Layer
Dialog Disciplinefull duplex or half duplex
Recoverycheck pointing mechanisms
Transport
Transport Layer
Connection oriented and connectionless service
Reliable delivery of data
Sequencing/Ordering of delivery
Avoid duplication
Network
Network Access Layer
Exchange of data between end system and network
Destination address provision
Routing functions across multiple networks
Data Link
Data Link Layer
Error detection and correction
Flow control
Physical
Physical Layer
Physical interface between data transmission device (e.g.
computer) and transmission medium or network
Characteristics of transmission medium
Mechanicalconnector type
Electricalsignal levels
Functionalfunction of individual cuircits
Proceduralsequence of events, data rates etc.
Application Layer - performs the functions of file transfer, e-mail, etc. (see
OSI Model)
Bps (bits per second) - common measure of data speed for computer
modems and transmission carriers.
Firewall - a barrier between a network and the Internet through which only
authorized users can pass;set of security policies to screen
incoming and outgoing messages; also used to isolate one part of a
network from another.
FTP (file transfer protocol) - application used to transfer a copy of a file
from one computer to another computer with one
acting as client and the other as server;a login
with a user name and password is typically
required.
Gbps (gigabits per second; billions of bits per second) - a data transfer
speed measurement for
high- speed networks.
Internet layer - part of the TCP/IP model that performs the same function
as the network layer of the OSI model.
Line layer - layer of the OSI physical layer that is responsible for
synchronizing and multiplexing multiple streams of data into
one SONET stream within SONET frames; also monitors and
administers SONET multiplexers.
Topology - the physical (how the wires are laid out) and/or logical (how the
wires work) arrangement of the devices
on the network.