0% found this document useful (0 votes)
551 views50 pages

Introduction To Internet: Lesson 1: The Inroduction

This document provides an introduction to the history and resources of the internet. It discusses how the internet began as a military network called ARPANET developed by DARPA in the US Department of Defense. The document outlines some of the major events in the early history of the internet including Paul Baran's work for RAND Corporation in the 1960s developing a decentralized network architecture that could withstand a nuclear attack. It also defines the internet as a global network of interconnected computer networks using internet protocol. The objectives are to define the internet, understand its history and resources, and define the internet backbone.

Uploaded by

Lordevin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
551 views50 pages

Introduction To Internet: Lesson 1: The Inroduction

This document provides an introduction to the history and resources of the internet. It discusses how the internet began as a military network called ARPANET developed by DARPA in the US Department of Defense. The document outlines some of the major events in the early history of the internet including Paul Baran's work for RAND Corporation in the 1960s developing a decentralized network architecture that could withstand a nuclear attack. It also defines the internet as a global network of interconnected computer networks using internet protocol. The objectives are to define the internet, understand its history and resources, and define the internet backbone.

Uploaded by

Lordevin
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 50

INTRODUCTION TO

INTERNET

Compilation by: Lordevin Cabatlao


Date: June 19, 2010
Time: 3:23 PM

I. LESSON 1: The INRODUCTION


History
Objectives:
Define and describe the Internet.
To know the resources of internet
Define the Internet backbone.
A. What is Internet?
B. The History
B.1 History Preview
B.2 Overview of Internet
I. What people do when surfing?
I.1 Surfing is build for a network and made up of organization.
I.2 What are the uses of the Internet?
Communication
Information Retrieval
Presentation of Information

II. LESSON 2: Terms and Web Policies


Objectives:
To know what internet services we have
To know what is the risk when your online
Define the World Wide Web.
Explain the work of the Domain Name Service.
Explain the difference between IP address and domain name.
How to protect and stay safe online

A. Internet Addresses?
A.1 Computer Addresses
A.2 Domain Names
A.3 Personal Addresses

B. Internet Services
B.1 Internet Services
B.1.1 Email
B.1.2 Mail Lists
B.1.3 FTP
B.1.4 Gopher
B.1.5 Instant Messaging (IM)
B.1.6 IRC
B.1.7 Newsgroups
B.1.8 Voice over IP
B.1.9 World Wide Web (WWW)
C. Types of Internet Connection
C.1 Types of Internet connections
1. Terminal Dialup/Modem (Shell connection)
2. SLIP (Serial Line Internet Protocol)
3. PPP (Point-to-Point Protocol)
4. ISDN (Integrated Services Digital Network)
5. DIAS
6. Cable Modem
7. Digital Subscriber Line (DSL) connection.
8. Direct Connection (Leased circuit)
9. Satellite connections
10. Wireless connections

D. Computer Virus
Different Types of Computer Viruses
Resident Viruses
Direct Action Viruses
Overwrite Viruses
Boot Virus
Macro Virus
Directory Virus
Polymorphic Virus
File Infectors
Companion Viruses
FAT Virus
Worms
Trojans or Trojan Horses
Logic Bombs

E. How Do You Stay Safe On The Internet?

1. Viruses and Worms


What Is A Virus?
What Is A Worm?
How Do We Get Infected?
How Does A Virus Or Worm Infection Affect Us?
2. Trojan Horses
3. Rootkits
4. Crackers and Hackers
5. Spam
6. Web Bugs
7. Child Security
8. Pop-Up/Under Ads
9. Tracking Cookies
10. Spyware
F. Firewall and Protection
FIREWALL
ANTI-VIRUS
i. Different Kind of Anti-Virus

III. LESSON 3:
Introduction: Environments of web Browser
Objectives:
To Explore the Web Browser Environments.
To know what is important.
What is important about internet?
How to access through Internet

The Environments Browser menu


1. Different Types of Web Browser Explorer
2. The Browser
2.1 How Does The Internet Work?
2.2 What Can I Do On The Internet?
a. E-mail (electronic-mail)
b. Information
c. Group Discussion
d. Entertainment
e. News
f. Online Shopping
g. Free Program (Software)
h. Chat
i. Cookies
j. Cyberspace

3. How To Accessing Internet Connection and Open How to open


IE
Accessing The Internet Connection Dial-up or direct connection
o Before you can even begin to surf the net you have to be connected.
o Steps Getting Connected to the internet.
Opening The IE

4. The Environment

Parts of Internet Explorer 7


5. Activities that can do while or after surfing.
a) How to Copy or Save Image Using Internet Browser
b) Print Web Pages
c) Save Book Mark Favorite Website
d) Define Search Engine and a subject Guide.
e) Save Favorite Website on a storage disk

IV. LESSON 4: Using Web Browser / Manage User


a. Using Web Browser
1. Website
a. Internet Addresses
i. World Wide Web
ii. Domain Name and Extension Name
Domain
Extension Name
2. Creating an Account
i. Creating E-mail Account (yahoo, google, etc.)

3. Uploading and Downloading


i. Upload a File
Instructions and Rules uploading a file:
ii. Downloading a File
Procedure and Rules before Download:
iii. Buffering
Buffering Over the Internet

5. OSI Layer

Session Objectives
At the end of this session you will be able to:

Define the OSI physical layer


List the Service and functions of the physical layer
Describe the connection types used by the layer
Identify various physical topologies used by this layer
Understand the types of signaling
Define multiplexing
OSI Physical layer
Services and Functions
OSI Model

V. TERMS and TERMINOLOGIES


I. LESSON 1: The INRODUCTION
Objectives:
Define and describe the Internet.
To know the resources of internet
Define the Internet backbone.

History

A. What is Internet?

A world wide network of computer network.


Internet Connected VIA Telecommunication Links
The information Super Highway
Mother of all Network

Introduction of Internet
The internet is a global of interconnected government, academic, public and private
computer networks which is based upon the networking technologies of the Internet
Protocol Suite. It is the successor of the Advanced Research Project Agency Network
(ARPANET) developed by DARPA of the U.S Department of Defense.

The Internet is also a communications backbone underlying the World Wide Web
(WWW).

The Internet changes so quickly and the technology advances so rapidly that it can seem
almost impossible to keep up with all of it. If you're like just about everyone else involved
in the Internet, your questions are similar to those of my friend. You'll find your answers
here.

C. The History

Objectives:
To know Origin of Internet History
To Create a digital archive or source materials about the creation and
evolution of the Internet.
Generate new historical material through the collection of commentaries that
include participant's stories, observations, perspectives, and memories

B.1 History Preview


1957 (Potential Origin and Beginning -- The History of the Internet)
The USSR launches Sputnik, the first artificial earth satellite. In response, the United States
forms the Advanced Research Projects Agency (ARPA) within the Department of Defense
(DoD) to establish US lead in science and technology applicable to the military.
Backbones: None - Hosts: None

1962 RAND Paul Baran, of the RAND Corporation


(a government agency), was commissioned by the U.S. Air Force to do a study on how it
could maintain its command and control over its missiles and bombers, after a nuclear
attack. This was to be a military research network that could survive a nuclear strike,
decentralized so that if any locations (cities) in the U.S. were attacked, the military could
still have control of nuclear arms for a counter-attack.

Baran's finished document described several ways to accomplish this. His final proposal
was a packet switched network.

"Packet switching is the breaking down of data into datagrams or packets that are labeled to
indicate the origin and the destination of the information and the forwarding of these
packets from one computer to another computer until the information arrives at its final
destination computer. This was crucial to the realization of a computer network. If packets
are lost at any given point, the message can be resent by the originator."
Backbones: None - Hosts: None

1968 ARPA awarded the ARPANET contract to BBN.


BBN had selected a Honeywell minicomputer as the base on which they would build the
switch. The physical network was constructed in 1969, linking four nodes: University of
California at Los Angeles, SRI (in Stanford), University of California at Santa Barbara, and
University of Utah. The network was wired together via 50 Kbps circuits.
Backbones: 50Kbps ARPANET - Hosts: 4

1972 The first e-mail program was created by Ray Tomlinson of BBN.
The Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced
Research Projects Agency (or DARPA)

ARPANET was currently using the Network Control Protocol or NCP to transfer data. This
allowed communications between hosts running on the same network.
Backbones: 50Kbps ARPANET - Hosts: 23

1973 Development began on the protocol later to be called TCP/IP


It was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from
DARPA. This new protocol was to allow diverse computer networks to interconnect and
communicate with each other.
Backbones: 50Kbps ARPANET - Hosts: 23+

1974 First Use of term Internet


by Vint Cerf and Bob Kahn in paper on Transmission Control Protocol.
Backbones: 50Kbps ARPANET - Hosts: 23+

1976 Dr. Robert M. Metcalfe develops Ethernet


which allowed coaxial cable to move data extremely fast. This was a crucial component to
the development of LANs.
The packet satellite project went into practical use. SATNET, Atlantic packet Satellite
network, was born. This network linked the United States with Europe. Surprisingly, it used
INTELSAT satellites that were owned by a consortium of countries and not exclusively the
United States government.

UUCP (Unix-to-Unix CoPy) developed at AT&T Bell Labs and distributed with UNIX one
year later.

The Department of Defense began to experiment with the TCP/IP protocol and soon
decided to require it for use on ARPANET.
Backbones: 50Kbps ARPANET, plus satellite and radio connections - Hosts: 111+

1979 USENET (the decentralized news group network)


was created by Steve Bellovin, a graduate student at University of North Carolina, and
programmers Tom Truscott and Jim Ellis. It was based on UUCP.

The Creation of BITNET, by IBM, "Because its Time Network", introduced the "store and
forward" network. It was used for email and listservs.
Backbones: 50Kbps ARPANET, plus satellite and radio connections - Hosts: 111+

1981 National Science Foundation


Created backbone called CSNET 56 Kbps network for institutions without access to
ARPANET. Vinton Cerf proposed a plan for an inter-network connection between CSNET
and the ARPANET.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, plus satellite and radio connections -
Hosts: 213

1983 Internet Activities Board (IAB) was created in 1983.


On January 1st, every machine connected to ARPANET had to use TCP/IP. TCP/IP
became the core Internet protocol and replaced NCP entirely.

The University of Wisconsin created Domain Name System (DNS). This allowed packets
to be directed to a domain name, which would be translated by the server database into the
corresponding IP number. This made it much easier for people to access other servers,
because they no longer had to remember numbers.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, plus satellite and radio connections -
Hosts: 562

1984 The ARPANET was divided into two networks:


MILNET and ARPANET. MILNET was to serve the needs of the military and ARPANET
to support the advanced research component, Department of Defense continued to support
both networks.

Upgrade to CSNET was contracted to MCI. New circuits would be T1 lines,1.5 Mbps
which is twenty-five times faster than the old 56 Kbps lines. IBM would provide advanced
routers and Merit would manage the network. New network was to be called NSFNET
(National Science Foundation Network), and old lines were to remain called CSNET.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, plus satellite and radio connections -
Hosts: 1024

1985 The National Science Foundation


began deploying its new T1 lines, which would be finished by 1988.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, 1.544Mbps (T1) NSFNET, plus satellite
and radio connections - Hosts: 1961

1986 The Internet Engineering Task Force or IETF


was created to serve as a forum for technical coordination by contractors for DARPA
working on ARPANET, US Defense Data Network (DDN), and the Internet core gateway
system.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, 1.544Mbps (T1) NSFNET, plus satellite
and radio connections - Hosts: 2308

1987 BITNET and CSNET


merged to form the Corporation for Research and Educational Networking (CREN),
another work of the National Science Foundation.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, 1.544Mbps (T1) NSFNET, plus satellite
and radio connections - Hosts: 28,174

1988 Soon after the completion of the T1 NSFNET backbone,


traffic increased so quickly that plans immediately began on upgrading the network again.
Backbones: 50Kbps ARPANET, 56Kbps CSNET, 1.544Mbps (T1) NSFNET, plus satellite
and radio connections - Hosts: 56,000

1990 (Updated 8/2001) Merit, IBM and MCI


formed a not for profit corporation called ANS, Advanced Network & Services, which was
to conduct research into high speed networking. It soon came up with the concept of the T3,
a 45 Mbps line. NSF quickly adopted the new network and by the end of 1991 all of its
sites were connected by this new backbone.

While the T3 lines were being constructed, the Department of Defense disbanded the
ARPANET and it was replaced by the NSFNET backbone. The original 50Kbs lines of
ARPANET were taken out of service.

Tim Berners-Lee and CERN in Geneva implements a hypertext system to provide efficient
information access to the members of the international high-energy physics community.
Backbones: 56Kbps CSNET, 1.544Mbps (T1) NSFNET, plus satellite and radio
connections - Hosts: 313,000

1991CSNET (which consisted of 56Kbps lines)


was discontinued having fulfilled its important early role in the provision of academic
networking service. A key feature of CREN is that its operational costs are fully met
through dues paid by its member organizations.

The NSF established a new network, named NREN, the National Research and Education
Network. The purpose of this network is to conduct high speed networking research. It was
not to be used as a commercial network, nor was it to be used to send a lot of the data that
the Internet now transfers.
Backbones: Partial 45Mbps (T3) NSFNET, a few private backbones, plus satellite and
radio connections - Hosts: 617,000

1992 Internet Society is chartered.

World-Wide Web released by CERN.


NSFNET backbone upgraded to T3 (44.736Mbps)
Backbones: 45Mbps (T3) NSFNET, private interconnected backbones consisting mainly of
56Kbps, 1.544Mbps, plus satellite and radio connections - Hosts: 1,136,000

1993 InterNIC created by NSF


to provide specific Internet services: directory and database services (by AT&T),
registration services (by Network Solutions Inc.), and information services (by General
Atomics/CERFnet).

Marc Andreessen and NCSA and the University of Illinois develops a graphical user
interface to the WWW, called "Mosaic for X".
Backbones: 45Mbps (T3) NSFNET, private interconnected backbones consisting mainly of
56Kbps, 1.544Mbps, and 45Mpbs lines, plus satellite and radio connections - Hosts:
2,056,000

1994 No major changes were made to the physical network.


The most significant thing that happened was the growth. Many new networks were added
to the NSF backbone. Hundreds of thousands of new hosts were added to the INTERNET
during this time period.

Pizza Hut offers pizza ordering on its Web page.

First Virtual, the first cyberbank, opens.

ATM (Asynchronous Transmission Mode, 145Mbps) backbone is installed on NSFNET.


Backbones: 145Mbps (ATM) NSFNET, private interconnected backbones consisting mainly
of 56Kbps, 1.544Mbps, and 45Mpbs lines, plus satellite and radio connections - Hosts:
3,864,000
1995 The National Science Foundation announced that as of April 30, 1995
it would no longer allow direct access to the NSF backbone. The National Science
Foundation contracted with four companies that would be providers of access to the NSF
backbone (Merit). These companies would then sell connections to groups, organizations,
and companies.

$50 annual fee is imposed on domains, excluding .edu and .gov domains which are still
funded by the National Science Foundation.
Backbones: 145Mbps (ATM) NSFNET (now private), private interconnected backbones
consisting mainly of 56Kbps, 1.544Mbps, 45Mpbs, 155Mpbs lines in construction, plus
satellite and radio connections - Hosts: 6,642,000

1996 Most Internet traffic is carried by backbones of independent ISPs, including


MCI, AT&T, Sprint, UUnet, BBN planet, ANS, and more.

The Internet Society, the group that controls the INTERNET, researches new TCP/IP
technology that will be able to have more than the approximately 4.3 billion addresses
currently available. The problem that has arisen is that it is not known how both the old and
the new addressing systems will be able to work at the same time during a transition period.

Internet2 is established.

(Backbone data below was valid in 1996, please seek other references for current backbone
and host data as it is constantly expanded.)
Backbones: 145Mbps (ATM) NSFNET (now private), private interconnected backbones
consisting mainly of 56Kbps, 1.544Mbps, 45Mpbs,and 155Mpbs lines, plus satellite and
radio connections - Hosts: over 15,000,000, and growing rapidly

The Present and The Future

A new technology recommendation called IPv6 is suggested to replace the current IPv4
technology. IPv4 allows for fewer than 4.3 billion directly connected Internet devices,
problematic because the world population (as of 2009) is well over 6.5 billion
(theoretically, if ever human had a computer and mobile phone, we'd need 13 billion
addresses, which is something IPv6 can easily accomplish).

In 1999, a wireless technology called 802.11b, more commonly referred to as Wi-Fi, is


standardized. Over the years that follow, this technology begins appearing as a built-in
feature of portable computers and many handheld devices.

In 2005, the One Laptop Per Child project begins. In an attempt to provide low cost,
education-designed laptops to children around the world for a low cost (US$100 per unit)
this project helps spark the netbook industry. Netbooks are small portable computers with
extended battery life and built-in Wi-Fi connectivity.
Multi-touch technology begins to appear in handheld devices, tablet computers, and
netbooks. This technology supplements traditional touch-screen technology by allowing
advanced gesturing (several fingers moving on a screen instead of just one). Multi-touch
technology is seen as a possible alternative to traditional keyboard and mouse (touchpad)
systems.

Read Bill Buxton's Overview and History of Multi-Touch Systems entitled Multi-Touch
Systems that I Have Known and Loved

In December 2009, the first multi-touch website is reported.

B.2 Overview of Internet


The Internet is a global computer network made up of smaller computer networks; it
has
been called a "Network of Networks."
These smaller networks include:
Local Area Networks (like networked offices or computer labs, and campus-wide
networks)
Wide Area Networks (like city-wide networks)
State and Regional Networks (including regional service providers and others)
National and International Networks

There is no one inventor of the Internet. The Internet was created in the 1960s as
a huge network linking big university and government computers. The science behind
the Internet was invented during the Cold War, when the United States was in
competition against Russia for weapons and technology. So the Internet is actually pretty
oldaround forty years. Much of Internets initial development was supported by
American governmental research and network development (beginning with the
American military's ARPANET in 1969).
In fact, email has been around since 1972! In 1989 that Tim Berners-Lee, a scientist at
the European Laboratory for Particle Physics in Geneva, proposed the World Wide Web.
Now Internet Service Providers (ISPs) offer Internet access to their clients, at costs
ranging from Rs 150/- per 6 months to hundreds of rupees per year, depending on the
types of service they offer.

II. What people do when surfing?


People usually get to surfing to internet to do things that are complicated for
them. They do a short time for them while surfing depends from the user, surfing
is the very easiest thing to search for what you want to know.
Surfing is one where you can get information access to an educational
learning, where you can also communicate, for an entertainment, or an Personal
Information.
Surfing is one of the easiest way of sharing files and document or any
personal data.
I.1 Surfing is build for a network and made up of organization.

i. Communication
ii. Education
iii. Business managements / Commercial Company
iv. Government
v. Private Organization
vi. Entertainment

I.2 What are the uses of the Internet?

There are three fundamental uses of the Internet:


Communication
Information Retrieval
Presentation of Information

Communication
The Internet is used both for one-to-one communications (email and real-time
"chat" programs) and one-to-many.

Information Retrieval
The Internet allows access to public domain information, bibliographic databases,
libraries, and entertainment services, as well as to proprietary information services.

Presentation of Information
Any organization connected to the Internet can provide access to its own in-house
information (library catalogs, faculty information, etc.) to millions of people world-wide.
Individuals can also develop and provide their own information packages via their
own home pages.

II. Terms and Web Policies


Objectives:
To know the resources of internet
Navigate around the web using Internet Explorer
To know what internet services we have
To know what is the risk when your online
Define the World Wide Web.
Explain the work of the Domain Name Service.
Explain the difference between IP address and domain name.
How to protect and stay safe online

A. Internet Addresses?

Every computer, file of information, and person on the Internet is identified by a unique
"address."

A.1 Computer Addresses


Computer addresses are made up of three parts (or, in some cases, two parts),
separated

by "dots," like this:


computer-name.institution.domain

The computer name is a name given locally to identify a particular computer; it


is, in some cases, omitted from the address. The institution name is the name (or
an abbreviation) of the name of the school, company, or other institution housing
the computer. The domain name specifies either the type or the geographic
location of the computer.

A.2 Domain Names


There are several possible "domain" names, including some that identify the type
of institution, and some that identify a geographical location. They include:

edu Educational institution


com Commercial and profitable organizations
org Non-profitable organizations
net Internet infrastructure and service providers
gov Governmental agency/department
mil American military agency
int International organizations
us United States
in India
my Malaysia
ca Canada
jp Japan
biz Business
aero Aeronautics
A.3 Personal Addresses

A person's address (or their email address) places the user's "username" (or
"login") and the symbol "@" before the computer address. For example, a user
whose username is "creator", who is accessing email from the "yahoo" server of
United State Yahoo Website, would have the following address:
[email protected]

B. Internet Services

B.1 Internet Services

Internet services serve more sophisticated and multi-purpose purposes, and


increasingly make the Internet a truly useful information resource.

B.1.1 Email
It is the Internet's version of the postal service. Using the Internet, it provides the ability to
send a message, reply to a message, send a file created in another program and/or even send
the same message to a group of people. Some benefits of Email are:
Speed: A message can be sent from Chennai to Australia in a matter of seconds.
Cost: Emails are cheap. You are usually only charged for the telephone call time (local call
rate) for sending the message into the Internet, and not the cost associated with transferring
the message across the Internet.
Flexibility: It is easy to send duplicates of your messages to other people or groups for the
cost of a single message.
Record keeping: Messages sent and received can be easily stored for future reference.
In order to use Email, you will need Internet access arranged through an Internet
Service Provider (ISP), who will allocate you one or a number of Email accounts. To be able
to retrieve and send mail from these addresses, a user will need what is known as Email client
software and your ISP usually provides this although nowadays most computers come with it
pre-installed.

B.1.2 Mail Lists


These use email to support discussion groups on a wide range of specific subjects.
Once you are becoming a subscriber of a mailing list, you will receive lot of emails related to
the subject covered by the mailing list.

B.1.3 FTP
FTP was the original Internet mechanism for the storage and retrieval of information. There
are still many FTP Sites around the Internet, although many of them have been melded into
the World Wide Web. In computer science, FTP stands for "File Transfer Protocol," which is
a way of transferring files between computers. A file can be anything -- a spreadsheet, a word
document, a song, or a picture. When someone says "Please FTP me that file," for instance,
that means "Please transfer that file from your computer to mine." To FTP, you usually need
to download a special program, or application. You also usually need a password to be able to
access or send information to someone else's computer.

B.1.4 Gopher
Gopher was developed at the University of Minnesota, primarily to support its own Campus
Wide Information Server (CWIS). It provides access to information available either locally or
elsewhere on the Internet by means of a simple series of uniformly designed menus.

B.1.5 Instant Messaging (IM)


There are lots of other fun and useful IM features you can explore, like group chats, file
transfers, voice calls, video conferencing and emoticons that reflect your mood.

B.1.6 IRC
IRC stands for "Internet Relay Chat". It has been used in many countries around the world.
IRC is a multi-user chat system, where people meet on "channels" (rooms, virtual places,
usually with a certain topic of conversation) to talk in groups, or privately. There is no
restriction to the number of people that can participate in a given discussion, or the number of
channels that can be formed on IRC.

B.1.7 Newsgroups
The Internet has a place where we can gather, question, and discuss our experiences within a
wide variety of topics. It's called Usenet News. Some users also call it Net News.
Think of Usenet News as a giant, worldwide bulletin board. Anyone can freely post
something on this bulletin board. Everyone else can read the posted items and add their own
items. These voluntary contributions and free exchange of information are the foundation of
the Internet.

B.1.8 Voice over IP


Voice over IP (Voice over Internet Protocol or "VoIP") technology converts voice calls from
analog to digital to be sent over digital data networks. In Voice over IP, or VoIP, voice, data,
and video all travel along the network.

B.1.9 World Wide Web (WWW)


The newest information application on the Internet, the WWW provides standardized access
to Gopher, FTP, Telnet and more by means of home pages designed either by institutions or b
individuals. By means of the HyperText Markup Language (HTML), it allows users to
"point" at highlighted terms, following "links" to whatever information interests them. It is a
multimedia environment, allowing Internet users access to audio and video materials. There
are a number of client software packages (or browsers), including Lynx (a textonly browser),
Netscape, and Microsoft's Internet Explorer, (which are multimedia browsers).

C. Types of Internet Connection

C.1 Types of Internet connections

The options for providing user connectivity to the Internet are given below:
1. Terminal Dialup/Modem (Shell connection)
Most common option
User requirements limited to modem and communications software
Text-only access
Shell accounts were more popular before the advent of the Web. A shell account lets you
use your computer much as if it were a virtual console associated with a remote computer.
You can type commands, which are interpreted by the remote computer, and view the
resulting output on your computer. Although a few web browsers, such as Lynx, can
operate via a shell account, they dont generally support the highly graphical, multimedia
pages which web surfers have come to expect.

2. SLIP (Serial Line Internet Protocol)


Computer is treated as though it were directly connected for the period it is online
Utilizes telephone lines
User must have modem, TCP software, SLIP software, & software for Internet
applications
Multimedia access

3. PPP (Point-to-Point Protocol)


Computer is treated as though it were directly connected for the period it is online
Utilizes telephone lines
User must have modem, TCP software, PPP software, & software for Internet
applications.
Multimedia access
While your computer is connected to the Internet, you can use it to surf the Web with
your favorite browser. If your ISP allows, you can even run a web server, providing
pages that can be viewed by others around the world.

4. ISDN (Integrated Services Digital Network)


Most often used to connect remote telecommuters to office LANs
Requires ISDN phone line access
Faster than analog terminal dialup/modem service
User must have ISDN phone line, ISDN card, communications software, TCP software
& SLIP or PPP software multimedia connectivity

5. DIAS
The DIAS offers a wire-line solution for high speed symmetrical Internet access on the
existing telephone lines. It provides an "always on" internet access that is permanently
available at customer's premises. DIAS combines voice and internet data packets on a
single twisted pair wire at subscriber premises that means you can use telephone and surf
internet at the same time.

6. Cable Modem
The term Cable Modem is quite new and refers to a modem that operates over the
ordinary cable TV network cables. Basically you just connect the Cable Modem to the
TV outlet for your cable TV, and the cable TV operator connects a Cable Modem
Termination System (CMTS) in his end (the Head-End).
Actually the term Cable Modem is a bit misleading, as a Cable Modem works more
like a Local Area Network (LAN) interface than as a modem.
In a cable TV system, signals from the various channels are each given a 6-MHz slice of
the cables available bandwidth and then sent down the cable to your house. When a
cable company offers Internet access over the cable, Internet information can use the
same cables because the cable modem system puts downstream data data sent from the
Internet to an individual computer into a 6-MHz channel. On the cable, the data looks
just like a TV channel. So Internet downstream data takes up the same amount of cable
space as any single channel of programming. Upstream data information sent from an
individual back to the Internet requires even less of the cables bandwidth, just 2 MHz,
since the assumption is that most people download far more information than they
upload.
Putting both upstream and downstream data on the cable television system requires two
types of equipment: a cable modem on the customer end and a cable modem termination
system (CMTS) at the cable providers end. Between these two types of equipment, all
the computer networking, security and management of Internet access over cable
television is put into place.

7. Digital Subscriber Line (DSL) connection.


DSL is a very high-speed connection that uses the same wires as a regular telephone
line.
Here are some advantages of DSL:
1. You can leave your Internet connection open and still use the phone line for voice
calls.
2. The speed is much higher than a regular modem
3. DSL doesnt necessarily require new wiring; it can use the phone line you already
have.
4. The company that offers DSL (e.g. BSNL) will usually provide the modem as
part of the installation.
But there are disadvantages:
1. A DSL connection works better when you are closer to the providers central
office.
2. The service is not available everywhere.
Other types of DSL include:
1. Asymmetric DSL (ADSL) line The connection is faster for receiving data than
it is for sending data over the Internet
2. Very high bit-rate DSL (VDSL) This is a fast connection, but works only over
a short distance.
3. Symmetric DSL (SDSL) This connection, used mainly by small businesses,
doesnt allow you to use the phone at the same time, but the speed of receiving
and sending data is the same.
4. Rate-adaptive DSL (RADSL) This is a variation of ADSL, but the modem can
adjust the speed of the connection depending on the length and quality of the line.

8. Direct Connection (Leased circuit)


Most often used to connect sites within a specific organization; such as a university or
business requires owning or leasing of cable (from 64 kbps to T-3) users typically
connected via Ethernet LANs multimedia connectivity at its fastest.

9. Satellite connections
This connection allows you to download Internet files via a satellite connection. This is
an efficient method for receiving large Web graphics and other items, but you still need a
modem connection for other features. You must purchase the connection hardware as
well as subscribe to the service.

10. Wireless connections


Pagers, cellular phones and personal digital assistants (PDAs) now allow varying levels
of Internet access, from notification of E-mail to limited Web connections. Many of these
services remain in the experimental stage. The PPP connection is called as TCP/IP
connection or PSTN dial-up connection. ISDN connection is called as ISDN dial-up
connection. Cable Modem, DSL and Direct Connection are always-on connection. The
words connection and account related to Internet are interchangeable.

D. Computer Virus

The Internet, just like the rest of the world, is not a perfectly safe place to visit. If
you download files from the Internet, there is a chance a very small chance, but nonetheless
a chance that your computer could become infected with a virus.

Viruses are malicious programs that invade your computer. They can cause many
different kinds of damage, such as deleting data files, erasing programs, or destroying
everything they find on your hard disk. Not every virus causes damage; some simply flash
annoying messages.

Different Types of Computer Viruses


There are Different Types of Computer Viruses could be classified in
(origin, techniques, types of files they infect, where they hide, the kind of
damage they cause, the type of operating system or platform they attack) etc. Let
us have a look at them

Computer Virus is a kind of malicious software written intentionally to enter


a computer without the users permission or knowledge, with an ability to
replicate itself, thus continuing to spread. Some viruses do little but replicate
others can cause severe harm or adversely effect program and performance of
the system. A virus should never be assumed harmless and left on a system.
Most common types of viruses are mentioned below:
Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From
there it can overcome and interrupt all of the operations executed by the system:
corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses


The main purpose of this virus is to replicate and take action when it is
executed. When a specific condition is met, the virus will go into action and
infect files in the directory or folder that it is in and in directories that are
specified in the AUTOEXEC.BAT file PATH. This batch file is always located
in the root directory of the hard disk and carries out certain operations when the
computer is booted.

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally useless
once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file
completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a
crucial part of a disk, in which information on the disk itself is stored together
with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-
protected and never start your computer with an unknown floppy disk in the disk
drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus
Macro viruses infect files that are created using certain applications or
programs that contain macros. These mini-programs make it possible to
automate series of operations so that they are performed as a single action,
thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus
Directory viruses change the paths that indicate the location of a file. By
executing a program (file with the extension .EXE or .COM) which has been
infected by a virus, you are unknowingly running the virus program, while the
original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature
searches (because they are different in each encryption) and also enables them to
create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors
This type of virus infects programs or executable files (files with an .EXE or
.COM extension). When one of these programs is run, directly or indirectly, the
virus is activated, producing the damaging effects it is programmed to carry out.
The majority of existing viruses belong to this category, and can be classified
depending on the actions that they carry out.

Companion Viruses
Companion viruses can be considered file infector viruses like resident or
direct action types. They are known as companion viruses because once they get
into the system they "accompany" the other files that already exist. In other
words, in order to carry out their infection routines, companion viruses can wait
in memory until a program is run (resident viruses) or act immediately by
making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus
The file allocation table or FAT is the part of a disk used to connect
information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to
certain sections of the disk where important files are stored. Damage caused can
result in information losses from individual files or even entire directories.

Worms
A worm is a program very similar to a virus; it has the ability to self-
replicate, and can lead to negative effects on your system and most importantly
they are detected and eliminated by antiviruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D,
Mapson.

Trojans or Trojan Horses


Another unsavory breed of malicious code are Trojans or Trojan horses,
which unlike viruses do not reproduce by infecting other files, nor do they self-
replicate like worms.

Logic Bombs
They are not considered viruses because they do not replicate. They are not
even programs in their own right but rather camouflaged segments of other
programs.

Their objective is to destroy data on the computer once certain conditions have
been met. Logic bombs go undetected until launched, and the results can be
destructive.

E. How Do You Stay Safe On The Internet?

The first part of the answer to the question, "How do you stay safe on the
Internet?", is... know what the threats are that you and your computer are up
against.

Without this knowledge, how are you going to know you've got everything
covered off? Do you just rely on what the security software vendors tell you to
spend your money on?

By being aware of what the risks are, I suggest you will save yourself money
and have more effective protection when it comes to the second part of the
answer to the question "How do you stay safe on the Internet?"... selecting
effective prevention and protection to guard privacy and online security.

To help you decide what is necessary for your particular protection, in The
Three Levels Of Internet Risk Protection, I talk about the safe practices that help
protect your computer and the types of software to use -- from those that are
absolutely essential for security, to others which you may want to install to
guard privacy to the level you desire.

But back to this article, 'How Do You Stay Safe On The Internet?'... here, I'll
provide you with an introduction to each type of threat. At the end of it, you'll
have a good feel for the dangers on the Internet and how those threats can affect
you, your PC and your information... be it personal, financial, family or
business.
There are ten of the most prevalent threats covered here. Either go through them
all, or click on the links below for those you are particularly interested in:

1. Viruses and Worms


2. Trojan Horses
3. Rootkits
4. Crackers and Hackers
5. Spam
6. Web Bugs
7. Child Security
8. Pop-Up/Under Ads
9. Tracking Cookies
10. Spyware

By the way... I've tried to keep the technical language simple, but if you don't
understand some of the terms, check them out at Netlingo, which provides
definitions and explanations for all Net terminology.

1. Viruses And Worms

What Is A Virus?
A virus is a man-made computer program that infects a file or program on our
computers. Each time the infected program is run, the virus is also triggered. It
spreads itself by infecting other programs on the same computer.

What Is A Worm?
A worm is also a man-made program that replicates itself. However, unlike a
virus, it does not infect other program files on the computer. Instead, a worm
spreads itself automatically to other computers through email, over a network
and via Internet Relay Chat (IRC).

How Do We Get Infected?


Viruses and worms can infect desktop computers, laptops and network servers
and reach our PCs from email, web sites, downloaded files and loadable media
(e.g. floppy disks, CD-ROMs and DVDs).

How Does A Virus Or Worm Infection Affect Us?


Unfortunately, the effects of an infection are pretty unpleasant. The virus or
worm, can,

* Disable the computer

* Add, modify or delete files or reformat the hard disk


* Steal addresses held in our computer to send on virus-infected emails to our
friends, colleagues, clients or customers

* Send unsolicited bulk email (spam) to those in our mail address books and
other users

2. Trojan Horses

What Is A Trojan Horse?


Although Trojan horse programs are categorized as viruses, they are not true
viruses, since they do not replicate. But, like viruses, they are one of the most
destructive of the Internet risks covered in 'How Do You Stay Safe On The
Internet?' and are favored by crackers and spyware writers.

How Do We Get Infected?


Trojans are one of the sneakiest of the online risks. They are often downloaded
on the back of a free program (freeware) that has some value to the user -- a free
game, software program or music, for instance.

How Does A Trojan Infection Affect Us?


A Trojan installed on a computer allows that PC to be entered via a 'backdoor'
by any remote user that has the access code to the Trojan.

The remote attacker can enter the computer undetected, when the user is online,
to access or destroy any information stored. Alternatively, the Trojan can be
programmed to automatically send any information on our PCs back to the
attacker. This could include,

* Client or customer information or other business data

* Credit card details

* Passwords for access to your online bank, ISP or web services

* Information you would rather remain hidden

* Email addresses, which may be used for spamming

* Children's names, photographs, ages or other personal details held on the


computer

* Distributed Denial of Service (DDOS) attack on other computers via the


victim's computer

No wonder we ask 'how do you stay safe on the Internet?'


3. How Do You Stay Safe On The Internet?...
Rootkits
What Is A Rootkit?
Rootkits are not destructive in their own right... but they are designed to conceal
the presence of malicious programs on a computer.

How Do We Get Infected?


As with any malware, such as viruses, worms, Trojans and spyware, rootkits get
onto our computers by various means, such as through spam attachments being
opened, on the back of free downloads or planted by crackers who have
breached computer defenses.

How Does A Rootkit Affect Us?


Rootkits are there for one reason only... to ensure that an intruder can access our
system and take control without detection by defenses to guard privacy and
security.

One of the most common and worrying uses of rootkits, which causes us to ask
'How Do You Stay Safe On The Internet?', is to launch spam and denial of
service (DOS) attacks against other computers or networks. Another use of
rootkits is to hide Trojans, so an intruder can easily use it to extract data from
your computer, as mentioned above.

4. Crackers And Hackers

What Is A Hacker/Cracker?
The term "hacker" is a misused term. We should really be referring to a
"cracker" to describe those who break security on a computer system.

The original term "hacker" refers to computer enthusiasts who enjoy learning
everything about a computer system.

How Do We Get Attacked?


Crackers run programs that scan computer ports over the Internet to work out
which ports are accessible. If our computer shows up in one of these scans, the
cracker may decide to enter our PC.

Crackers favorite targets are the home and home office computers connected by
broadband to the Internet... because the connection is always open, there is more
opportunity to locate these computers with their scanners.

Alternatively, crackers may just exploit weaknesses that have not been 'patched'
in the computer's operating system in order to gain entry. As discussed above,
Trojans are another way crackers use to gain access to our PCs.

How Does A Cracker Affect Us?


Besides the potentially valuable information they can obtain from our PCs, such
as that listed under 'Trojans', these intruders also want our hard disk space and
Internet connection. With these resources they can use our computers to send
out spam or attack other computers on the Internet... and all this can be done
without our knowledge! Another reason why we should know, how do you stay
safe on the Internet?

5. Spam -- Unsolicited Email

What Is Spam?
Spam is defined in Dictionary.com as, "Unsolicited e-mail, often of a
commercial nature, sent indiscriminately to multiple mailing lists, individuals,
or newsgroups; junk e-mail".

Spammers peddle pornography, sexual aids, diet pills and get-rich-quick


schemes... in fact, anything that has a perceived value.

Spam is no longer just a frustration, nuisance and time-waster... it has now


become a major Internet security risk to those of us who want to know, how do
you stay safe on the Internet?

How Does Spam Attack Us?


There are many ways spammers obtain our email address and this results in the
spam bombardment most of us suffer.

However, much of this spam has malicious code or malware incorporated into it.
We can trigger this malware just by opening the email or even previewing it in
our email program.

How Does Spam Affect Us?


If you're not quite convinced that spam is dangerous, consider the following...

* 80 percent of spam e-mail messages originate from home computers! They


have been secretly taken over by spammers and are known as zombie PCs.
Spammers and cybercriminals can control thousands of these zombies, which
together form a "bot network"

* Identity theft and fraud and phishing via spam email is growing in
frequency

* 95 percent of viruses are sent through email

* Spam is often used to deliver spyware

6. Web Bugs
What Is A Web Bug?
It is an image file, usually 1x1 pixel, hidden on a web page or in an HTML e-
mail and will be of interest to those who ask 'How Do You Stay Safe On The
Internet?'

How Do We Get Infected?


Like most malware, we do not know when a web bug is present. They are
usually downloaded in spam and they can be on any webpage we visit.

How Do Web Bugs Affect Us?


A web bug tells a spammer when an e-mail has been opened, and marketers
what advertisements and web pages we have viewed.

The bugs can discover key details about our system that are very useful to
hackers. They also transmit the IP (Internet Protocol) address of all readers of an
e-mail to a spammer.

7. "Child Security"

Some form of parental control is required to prevent children being funneled to


inappropriate web sites and predators on the Net, such as in chat rooms -- it was
as a result of the mounting concern about how do you stay safe on the Internet,
particularly kids, that MSN decided to close its chat rooms.

There are also the risks of spam sent to kids. Not only are there the malware
risks, but a survey showed that more than 80 percent of children said they
receive "inappropriate" spam every day. Half of those admitted that they felt
"uncomfortable and offended" when seeing them and just didn't know how do
you stay safe on the Internet.

Despite these concerns, many parents are unclear where to go to get advice
about keeping their children safe online.

8. "Pop-Up/Under And Banner Ads"

What Are PopUp/Under And Banner Ad?


A pop-up ad appears as a separate window on top of the web page we are
viewing, whereas pop-under ads appear under the page being viewed, becoming
visible when the web page is cancelled. A banner ad is immediately on view on
a web page and can be animated or stationary.

What Is The Risk?


Popups/unders/banners can be an annoyance by interfering with our viewing
pleasure. However, some of these ads can also be a serious threat, as they can
carry Trojans, spyware or browser hijackers. Unfortunately, we can't see which
ads have hidden, malicious code to decide how do you stay safe on the Internet.

The malicious code is generally activated by clicking on the ad... the malware
being installed on our computer through vulnerabilities in our browser and a
process known as a drive-by-download.

9. "Tracking Cookies"

What Are Tracking Cookies?


When we browse web sites, the web server for the web site sends a cookie to our
web browser (e.g. Internet Explorer), which it then stores on our computer hard
drive.

Cookies are small text files containing information that identifies each user.
When you move to another page or return to the site at a later time, the web
server asks your browser for the cookie, so it can 'recognize' who you are.

How Cookies Can Affect Us


Cookies are often used by advertisers to track our browsing and buying habits
and create profiles of users for targeted marketing.

Multiple sites may read from the same cookie and share the information or, they
can sell it on without the knowledge or consent of the user.

Although not a serious security threat, cookies are a privacy risk.

10. "Spyware"

What Is Spyware?
Spyware has surpassed viruses as the number one computer Internet security
risks facing us today. Most estimates report that 80-90 percent of computers
already have been infiltrated by spyware.

Spyware is software that is installed on our hard drive to gather information


about us and our computer habits. It then transmits it through our Internet
connection to a third party, usually without our knowledge or consent.

There are two categories of spyware... surveillance or monitoring spyware and


advertising spyware, or adware.

How Does Spyware Infect Us?


Spyware is often downloaded through freeware and shareware and the P2P
(peer-to-peer) file sharing programs, like Kazaa, Imesh and Bearshare.
More aggressive forms of spyware can install themselves through "drive-by
downloads", where an invasive program is invisibly downloaded to your
computer. It can be initiated by simply visiting a Web site or viewing an HTML
e-mail message.

How Does Spyware Affect Us?


Surveillance or monitoring spyware can scan our hard drive and search
programs for sensitive information like credit card, bank information and
personal details.

It can change our browser's home page, scan browser history for web sites
visited and monitor various aspects of our computer and Internet activity! The
information is then transmitted to the attacker.

More and more companies are installing spyware to watch us at work to check
that we are not using the company network to surf prohibited sites or spending
too much time dealing with personal email.

Advertising spyware logs information, such as our name and passwords, our
browsing and Internet usage habits, online purchases and email addresses. And,
of course, it downloads advertisements... lots and lots of advertisements!

How Do You Stay Safe On The Internet?...


What Next?

Having read through the computer Internet security risks, you'll now know some
of the many dangers you're facing as soon as you go online.

Unfortunately, the home and home office computer is particularly vulnerable to


attacks from these threats. By looking at the second article on this subject, How
Do You Stay Safe On The Internet?...Why The Home/Office PC Is Susceptible,
you'll appreciate why we home users are such attractive targets.

If you're wondering what protection is critical to insulate your PC against these


risks, the answers are provided in How To Choose Your Computer Internet
Protection In 3 Easy Steps.

There, you'll see how to decide what protection is right for your PC usage and
habits.

Alternatively, if you already know the risks you want to protect against, just
click on the appropriate button on the navbar at the top left of this page.

F. Firewall and Protection


FIREWALL
Security software that can actively block unauthorized entities from
gaining access to internal resources such as systems, servers, databases, and
networks. A firewall may also act to prevent internal users from accessing
unauthorized external resources. A firewall is installed in a communications
router, server, or some other device that physically and/or logically is a first
point of access into a networked system. A packet-filtering firewall
examines all data packets, forwarding or dropping individual packets based
on predefined rules that specify where a packet is permitted to go, in
consideration of both the authenticated identification of the user and the
originating address of the request. A proxy firewall acts as an intermediary
for user access requests by setting up a second connection to the resource.
The proxy then decides if the message or file is safe. A stateful inspection
firewall examines packets, notes the port numbers that they use for each
connection, and shuts down those ports once the connection is terminated.
See also authentication, authorization, proxy firewall, and security.

ANTI-VIRUS
An 'antivirus' is different than an 'antiviral', which is medicine used
kill a virus or suppress it. Notice the similarities? In both instances, there's
something parasitic at work that needs a counter agent.
i. Different Kind of AntiVirus
Kaspersky
Norton
Avira
McCafee
AVG
NOD32
Panda
Avast
BitDefender

III. Introduction:
Environments of web Browser
Objectives:
To Explore the Web Browser Environments.
To know what is important.
What is important about internet?
How to access through Internet

A. The Environments Browser menu

1. Different Types of Web Browser Explorer

Firefox NetSurf
Internet Explorer Netscape
Google Chrome Konqueror
Opera Icab
Safari Cyberdog
Seamonkey Amaya
Camino Lynx
Amaya WorldWideWeb
Flock

2. The Browser
As you surf the Web, you will come across sites that
state, "This site is best viewed with" and then name a particular
browser. Many will even provide a link to a site where you can
download the specified browser. Sites make these recommendations
because some browsers use special protocols, allowing site creators to
offer extra features beyond the standard capabilities of hypertext
markup language (HTML). Chief among these browsers are Netscape
Navigator' Microsoft Internet Explorer, Opera and Mozilla Firefox.

2.1 How Does The Internet Work?

Computer on the internet communicate with others


using a set of protocols known as TCP/IP or Transmission Control
Protocol/Internet Protocol. A protocol is a standing format for
transferring data between two devices TCP/IP is the agreed on
Internatinoal Standard for transmitting the IP Protocol work with the
addressing schame. It allows you to enter an address and sends it to
another computer; from there the TCP takes over returning to our
Postal Service Analog.

When we access another computer on the internet, we


are accessing it VIA a number. However, we dont have to remember
or we just need to type in the domain name identities of a site on the
internet browser.

Ex. Domain Name


www.microsoft.com

2.2 What Can I Do On The Internet?

a. E-mail (electronic-mail) The internet enables us to


send and relieve messages (Email) all over the world. To use
electronic mail all we need is a computer, modem, a network
connection and an email account.

b. Information You can access any information an


any subject through the internet. That is why internet is now a very
important for research works and educational purposes.

c. Group Discussion We can meet people around the


globe with similar taste and preferences common topics of interest can
discussed, subjects such as music, region, politics, sports etc can be
an interesting way to meet some new friends.

d. Entertainment The internet offers thousands of


sites where you can watch your favorite celebrities or listening for
music play. You can also watch your favorite movie online or look for
a current movies reviews.

e. News New from CNN, NBC, ABS-CBN or from


your national newspaper can be accessed through the internet.

f. Online Shopping Ordering desired goods and


services on the internet in the comforts of our home. We need dont
need to shops outside for foods, appliances, or other things that you
need can be easily bought through the internet.

g. Free Program (Software) You can download


thousands of shareware / freeware from the internet.

*shareware the terms shareware, and postcard


where refers to small software application or
utilities created by non-profit developer. Its
usually unable free of charge for a trial period,
after the trial period the user is expected to pay
small fee for continuous use of the program.

h. Chat A form of realtime electronic


communications where participants type what they want to say, and
its repeated on the screen of all other participants in the same chat.
Internet relay chat or IRC is an internet protocol for chat and there are
many other chat systems services like DELPHI. Other commonly used
chat system are Ichat and ICQ.

i. Cookies bits of information that a web site


stores on your computers hard drive, in most cases this data helps the
site remember useful things about your computer from a session,
such as a particular color configuration, such as the type of computer
you have and the browsesrs that you use it can also record the number
of times that you visit the site and the time that you spend. However
dont worry too much about security or loss of privacy cookies cannot
tell the website youd registered or email address unless you
specifically configure for a remember.

j. Cyberspace A term coined by cyberpunk science


fiction author by William Gibson in this Novel Neuromancer. It
represents the totality of all connected computer networks and their
contents in a future cored. It has become a slang term for the internet
and the information in it.

3. How To Accessing Internet Connection and Open How to open IE

Steps by step procedure:

Accessing The Internet Connection Dial-up or direct connection

Before you can even begin to surf the net you have to be
connected.

1. Connecting through a (LAN) Local Area Network


connecting to the internet using a Network Interface
Card (NIC This is a peripheral component inside your
computer that allows your computer to get on the
network.)
2. A direct connection is made from the Local Area
Network to a high speed connection line, most likely
Leased Line from the Local Telephone Company.
3. For the home user, the most common type of internet
connection is with a modem and a telephone line.
4. Internet Telephone Connection or Dial-Up Connection a
connection that allows the user to connect using only an
internal modem modem and a connection through
telephone wire witch it give an 56kbps. Of speed.
So that people choose ISDN Integrated Services Digital
Network or DSL Digital Subscriber Line and an
additional hardware that allows data transmission for a
greater speed than a connection of telephone dialing.
5. Another High-speed option is the cable modem. This
type of modem also connects to your computer, but it
uses a network interface card instead of using a
telephone line as a transmission media to connect to the
ISP, Coaxial Cable that is used, and same cable that
used from the television.
6. Finally way of connection to the internet is using your
television and web tv, most web tv products consist of
setup box that connects to your telephone line and
television it makes a connection to the internet Via your
telephone service and then converts the downloaded
web pages to a format that can be displayed on your tv.

Steps Getting Connected to the internet.

1. Locate an internet services provider (ISP) or any online


service. Their service is primarily an internet connection
2. Once you find an ISP, you must install some type of
telecommunications software, this software enables your
computer to connect to another computer most likely
your isp or online service company will provide this
software
3. You will need to install a software application called a
web browser in order to surf the web the web is one
component of the internet two of the popular browser
are Netscapes Navigator and Microsofts Internet
Exporer.

Youve been contracted with your ISP and youve


installed your software.
You need give some instruction to your computer to dial
a Local Telephone Number or any certain procedure to
connect you to your ISPs computer which connects you
to line of internet.

Opening The IE

1. From the desktop double click the icon


(another procedure) click start button from the taskbar
then click All Programs then look for the icon Internet
Explorer

4. The Environment

Parts of Internet Explorer 7


1. Title Bar the head name of the browser.
2. Address Bar where you can encode the domain of its website.
3. Menu Bar A menu bar is a horizontal strip that contains lists of
available menus for a certain program.
4. Tab Page One of the features added to Internet Explorer 7 was the
support of tabbed browsing, already available in many other web
browsers. With tabbed browsing you can view multiple websites
inside one browser window, uncluttering your Windows Taskbar
and desktop.
5. New Tab Button Viewing a new tab for opening a new website.
6. Toolbar A row or column of on-screen buttons used to activate
functions in the application.
7. Yahoo Toolbar An easiest way to make one click navigation at
yahoo website.
8. Back Button an history button to get from its history linked
necessary page.
9. Forward Button to go forward when you get back on its browsing
page.
10. Search Web a text box where you can encode your keyword for your
searched.
11. Refresh Button to refresh the webpage for a failure or
discontinuously to the page of the browser.
12. Stop Button to stop what you were doing on the working browser.
13. Scroll Bar A vertical bar on the right side of a window or a horizontal bar
at the bottom of a window that is used to move the window
contents up and down or left and right.
14. Minimize Button to hide the explorer on its task bar.
15. Restore Button to get back the explorer on its previous state.
16. Exit Button to exit the certain browser.

4. Activities that can do while or after surfing.

a) How to Copy or Save Image Using Internet Browser


1. Right mouse click (PC) on on of the images below until a dialog box
appears.
2. If you are using Internet Explorer, select "Download image to disk." Or
select "Save this image as."
3. A box pops up asking you where you want to save the image to.
Navigate to the folder in which you want to keep your images.
4. Usually you'll want to rename the image, giving it a name that will make
sense to you a few months down the line. In the "Save image as" box,
change the name of the picture to the name you have chosen. If you
intend to use the image on a web page, make sure there are no spaces in
the name you choose.
5. You are using a PC Windows it will automatically insert this extension
for you.
6. Click on the "save" button. You now have an identical copy!

b) Print Web Pages

To print in Internet Explorer


Go to File in the browser menu and choose any of the available commands:

1. "Page Setup" - to select paper source, orientation, paper size etc when
printing.
2. "Print" - for printing the web page immediately.
3. "Print Preview" - to get a preview of what the printout will look like before
printing.

c) Save Book Mark Favorite Website


For Firefox:
1. Click "Bookmarks" Menu then
2. Click "Bookmark This Page" (a window dialog will appear)
3. Type the name of the bookmark then press "Done"

For Internet Explorer:


1. (Adding to Favorites) Click "Favorites" Menu then
2. Click "Add to Favorites" (a window dialog will appear)
3. Type the name then press "Done"

d) Define Search Engine and a subject Guide.

The only rules in search engine are to encode your exact keyword or
information you want to search.

e) Save Favorite Website on a storage disk


Internet Explorer
1. For Internet Explorer, click on the File menu.
2. Click on "Save As"
3. In the "Save as type" field, drop down the list and choose "Web Archive
(Single File)".

This will compile the entire web page and all of its other elements as a
single file.

Firefox
1. Right click on the desired web page.
2. Select the "Save page as" or use short cut " Ctrl + S"
3. In the "Save as type" field, drop down the list and choose "Web page,
Complete"

VI. Using Web Browser / Manage User


A. Using Web Browser
1. Website

a. Internet Addresses
i. World Wide Web
Internet system for worldwide hypertext linking of
multimedia documents, making the relationship of information
that is common between documents easily accessible and
completely independent of physical location.

ii. Domain Name and Extension Name


Domain
A domain name is an identification label that defines a
realm of administrative autonomy, authority, or control on the
Internet, based on the Domain Name System (DNS).

Domain names are used in various networking contexts


and application-specific naming and addressing purposes. They
are organized in subordinate levels (subdomains) of the DNS root
domain, which is nameless. The first-level set of domain names
are the top-level domains (TLDs), including the generic top-level
domains (gTLDs), such as the prominent domains com, net and
org, and the country code top-level domains (ccTLDs). Below
these top-level domains in the DNS hierarchy are the second-
level and third-level domain names that are typically open for
reservation by end-users that wish to connect local area networks
to the Internet, run web sites, or create other publicly accessible
Internet resources. The registration of these domain names is
usually administered by domain name registrars who sell their
services to the public.

Extension Name

Domain name extensions What are they?

Domain name extensions have become a big business. Over the


last few years a large number of registries have opened up and
there are now over 300 extensions to choose from. (and this
number is set to increase)

But before you rush in and buy a name with any old extension,
take a step back and ask yourself if it can truly serve your
business or plans.

If you want to sell bikes in Australia then Bikes.au might seem


like a good name to have. But unless the extension is widely
known and accepted in the Australian market this extension will
not do you any favours.

The problem is that when most people think of a site they


think .Com, .Net, .Org, and so your site and hence business could
be quickly forgotten.

2. Creating an Account
i. Creating E-mail Account (yahoo, google, etc.)
Step by steps procedure;
Instructions
Things You'll Need:
* A computer
* Internet access

1. Step 1
Go to www.yahoo.com

2. Step 2
Click on, "Mail." Click on, "Sign Up." Follow the
registration instructions. You will receive a registration
confirmation email. Confirm your registration.

3. Step 3
Congratulations! You are now ready to send and recieve
email.

3. Uploading and Downloading


ii. Upload a File
To upload is to transfer content - such as videos or photos -
from your personal computer to an internet server.

Instructions and Rules uploading a file:

1. Find a site that will allow you to upload your file to


their server. There are many websites designed for this purpose
and no one is best for all users and all files. In deciding which
one to use consider:

www.download.com
What type of files will they accept. For
example, most sites don't allow porn, while others
specialize in it.
Almost all have maximum file sizes.
Do they have enough bandwidth?
How much do they charge for the service? Most
are free, but watch out for advertising.
How long will they keep uploaded files?
Is their privacy policy acceptable?

2. Click on 'browse'.

3. Find and select the file you want to upload.

4. Click on 'upload file'.


ii. Downloading a File
To download is to transfer content - such as videos or
photos - from the internet through your personal computer.

Question: What does the term download mean, and how do


I do it?

Answer: When you download something, you are transferring


data from another computer to your computer, usually over the
internet.

Say you are a solitaire player and have decided that you would
like to have a variety of solitaire games to play on your computer.
You browse the internet and find a free program called 123 Free
Solitaire 2009. (By the way, Ive seen reviews that indicate that
its great for solitaire addicts.) The site says to Download here
(or something equivalent to that). You click on the button because
you would like to transfer the game from the web site to your
computer; you would like to download it. After you click on the
Download here button, a box will pop up that looks like this:

Here you have three options as to what you would like to do once
the file has been completely downloaded. You may click on Save
and 123 Free Solitaire 2009 will be downloaded (and saved) to
your computer. Option #2: If you dont want to save it (maybe
you just want to try it and not take up any space on your
computer), click on Run to download and install the game. If you
have suddenly decided that you never want to play cards again,
click on Cancel and the download will automatically be stopped.

Essentially when you download something, you receive whatever


it is you are downloading (in this case, its the solitaire game).

On the flip-side, if you would like to upload something, you are


going to transfer - or give - something from your computer to
someone elses.

How to download computer files, programs, and software?


This question may seem easy for many computer savvy people
who have downloaded computer programs before. However, for
the beginner computer user, they may need to know how to
download. They may also need to know why they should
download a program to their computer. This article will tell the
beginners how to download software from a computer disk and
programs from the internet. Downloading a file or program to
your computer will allow you to use the program, such as a
computer game or software program. Many online game rooms
ask computer users to download the game to their computers to
be able to access the game anytime.

Instructions : Procedure and Rules before Download


Things You'll Need:

* Time
* Patience
* Computer disk
* Computer
* Internet

1. Step 1
Insert the software disk into your computer. If you have
just purchased a personal computer (PC) game and you have the
computer disk, you need to insert it into the disc compartment of
your computer. Your computer will recognize the disk and start
running the program. Follow the guided messages that may
appear on your computer screen.

2. Step 2
Click the download file link. If you are downloading a file
or program from the internet, you will need to click on the
"Download" button or link that appears on your computer screen.
A download box may appear on your screen asking you if you
want to run the program from current location or save the
program.

3. Step 3
Choose the "save" option. This will allow you to save the
program so that you can later use it after the download is
complete. Be observant on what file name you saved it as and
which folder it is located. If you don't get a pop up box asking
you these options, don't worry because some internet browsers
save the download automatically.

4. Step 4
Click run program. If you are ready to access the software
or program you just installed on your computer, click run and the
downloaded program should open for you. Many downloaded
software programs will make a shortcut icon on your desktop so
that you will have easy access to the program later.

iii. Buffering

Preloading data into a reserved area of memory (the buffer). In


streaming audio or video from the Internet, buffering refers to
downloading a certain amount of data before starting to play the
music or movie. Having an advance supply of audio samples or
video frames in memory at all times prevents disruption if there
are momentary delays in transmission while the material is being
played. Even a live broadcast would have a few seconds of delay
built in.

Buffering Over the Internet

If a network is fast enough to keep up with playback, buffering


is not necessary. However, this is not the case over the Internet
where packets can traverse numerous routers from source to
destination, and delays can be introduced at any juncture. See
double buffering, buffer and buffer flush.

The message means 70% of a reserved area in memory is filled


at that moment. When it reaches 100%, the software (Windows
Media Player in this example) will start "playing" the video.
4. OSI Layer

Session Objectives
At the end of this session you will be able to:

Define the OSI physical layer


List the Service and functions of the physical layer
Describe the connection types used by the layer
Identify various physical topologies used by this layer
Understand the types of signaling
Define multiplexing

OSI Physical layer


The physical layer implementations co-ordinate the rules for
transmitting bits. The layer defines:

Physical Network structures.


Mechanical and electrical specifications for using the
transmission medium.
Bit transmission encoding and timing rules.

Services and Functions


The services offered by the physical layer are:

It provides a physical connection between systems via


a transmission medium.
A unique point of attachment to the transmission
medium is provided to the service user.
It delivers bits in the order in which they were
submitted to the layer.
It notifies the data link layer of any fault in
transmission.
It provides for different qualities of service, through
different transmission media.
There is no distinction in this layer between connection
oriented and connectionless mode of service. The connection is
configured only after a particular service has been created.

Physical layer services are grouped into the following


classes:

Topology: Point-to-point, multi-end-point


Type of Transmission: Synchronous or
Asynchronous
Mode of operation: Duplex, Half-Duplex, Simplex
The important functions to be performed by this layer
are:

It controls the physical link during activation


and deactivation phases.
It performs either synchronous or asynchronous
transmission of bits.
It performs management activities related to
this layer

OSI Model
Open Systems Interconnection
Developed by the International Organization for Standardization
(ISO) in 1977

Seven layers

Application
Provides user interface such as file transfer (FTP), electronic
mail(SMTP), remote login(Telnet/SSH/rlogin), WWW(http)
etc.

Presentation
Presentation Layer
Format/presentation/syntax of data

Session
Session Layer
Dialog Disciplinefull duplex or half duplex
Recoverycheck pointing mechanisms

Transport
Transport Layer
Connection oriented and connectionless service
Reliable delivery of data
Sequencing/Ordering of delivery
Avoid duplication

Network
Network Access Layer
Exchange of data between end system and network
Destination address provision
Routing functions across multiple networks
Data Link
Data Link Layer
Error detection and correction
Flow control

Physical
Physical Layer
Physical interface between data transmission device (e.g.
computer) and transmission medium or network
Characteristics of transmission medium
Mechanicalconnector type
Electricalsignal levels
Functionalfunction of individual cuircits
Proceduralsequence of events, data rates etc.

VII. TERMS and TERMINOLOGIES


INTERNET - is a worldwide collection of computer networks that links
together millions of computers.
INTERNET SERVICE PROVIDER(ISP) is a company that has a
permanent connection to the Internet
backbone and utilizes high- or medium
speed data lines to allow individuals
and companies to connect to the
backbone for access to the Internet.

Application Layer - performs the functions of file transfer, e-mail, etc. (see
OSI Model)

Architecture - how a system is designed; includes how the components are


connected to and operate with each other.

ASCII (American Standard Code for Information Interchange) - relates


a number from 0 to 255 in the binary
(base 2) form to keyboard characters.

Bandwidth - expressed in a range of frequencies using hertz as the unit of


measurement; also called analog capacity.

Baseband - describes signals and systems whose range of frequency is


measured from 0 to a maximum band-width or highest signal
frequency; sometimes used as a noun for a band of frequencies
starting at 0.

Bit - contraction of the expression binary digit; smallest unit of data in a


computer.

Bps (bits per second) - common measure of data speed for computer
modems and transmission carriers.

DSL (digital subscriber line) - technology that delivers digital data


transmission over the wires of a local telephone
network.

Domain Name Consist of Different form of Organization name and a


suffix that describe the type of organization.

Ethernet - most commonly used protocol designed to change the packets


into electrical signals that can be sent out over the wire.

Firewall - a barrier between a network and the Internet through which only
authorized users can pass;set of security policies to screen
incoming and outgoing messages; also used to isolate one part of a
network from another.
FTP (file transfer protocol) - application used to transfer a copy of a file
from one computer to another computer with one
acting as client and the other as server;a login
with a user name and password is typically
required.

Gateways - a node on a network that translates (converts protocol) from


one operating system environment to
another.

Gbps (gigabits per second; billions of bits per second) - a data transfer
speed measurement for
high- speed networks.

Host address - part of an IP address that is uniquely assigned by an


administrator.

HTTP (HyperText Transfer Protocol) - protocol users interact with (by


means of a browser) to access Web
pages over an internet or intranet.
Hz (hertz) - unit of frequency; one hertz simply means one cycle per
second, applied to any periodic event
(e.g.,one tick of a clock is 1 Hz; the
human heart beats at 1.2 Hz).
IEEE (Institute of Electronic and Electrical Engineers) - voluntary
organization of engineers that creates
consensus standards for network wiring
and other technologies; pronounced
eye-triple-E

Internet layer - part of the TCP/IP model that performs the same function
as the network layer of the OSI model.

Internetworking - connecting one network to another network

IP (internet protocol) - network layer protocol provided with TCP/IP;


connectionless, unreliable protocol that provides
features for addressing, type or service specification,
fragmentation and reassembly, and security.

IP address (internet protocol address) - logical address assigned to every


workstation, server, printer, and router
on any interconnected network.

ISDN (Integrated Services Digital Network) -a circuit-switched telephone


network system designed to allow
digital transmission of voice and data
over ordinary copper telephone wires.

ISPs (Internet service providers) - businesses or organizations that


provide consumers with access to the
Internet and related services.

Kbps (thousands of bits per second) - a measure of data transfer speed .

LAN (local area network) - network that operates within a small


geographic area, usually within a building,

Line layer - layer of the OSI physical layer that is responsible for
synchronizing and multiplexing multiple streams of data into
one SONET stream within SONET frames; also monitors and
administers SONET multiplexers.

MAN (metropolitan area network) - connects sites in and around a large


city .

MB (megabyte) - unit of information or computer storage equal to either


exactly one million bytes or, in some
cases, 1,048,567 bytes, or more rarely,
1,024,000 bytes; not to be confused
with Mb, which stands for megabits.

Mbps (megabits per second) - a unit of information storage; not to be


confused with MB or megabytes.

MHz (megahertz) - one hertz is one cycle per second - a megahertz is


equal to one million cycles per second.

NIC (network interface card) - hardware adapter that provides


communication capabilities;
responsible for building, transmitting,
receiving, and decoding frames in a
LAN environment; serves as the
interface between the networked
devices and the connecting wires
Packets - data structures that collectively represent the transmission stream
(headers and data);associated with the
network layer when the communication
protocol is connection-oriented

Peer-to-peer networks - network in which each computer is capable of


functioning as a client and a server;
users on the network can freely share
resources on their computer or access
shared resources on other computers
Surf or Surfing Means to search.

Tbps - Trillions of bits per second

TCP/IP (transmission control protocol/Internet protocol):dominant protocol


suite used in networking TCP
(transport control protocol):
connection-oriented, reliable protocol
that has end-to-end responsibility for
making sure that information arrives
without errors and in the correct order.

Topology - the physical (how the wires are laid out) and/or logical (how the
wires work) arrangement of the devices
on the network.

URL Universal Resources Location

WAN (wide area network) - geographically dispersed network of


computers.

Web Page is a document or resource of information that is suitable for the


World Wide Web and can be accessed through a web browser
and displayed on a monitor or mobile device.

Wi-Fi - describes the underlying technology of wireless local area networks


(WLAN) based on IEEE specifica-tions; originally developed for
mobile computing devices in LANs, but is now used for more
services, including Internet and VoIP phone access.

Wireless - telecommunications in which electromagnetic waves (rather than


some form of wire) carry the sig-nal over part or all of the
communication path.

WWW (World Wide Web) - server-based application that organizes


information using hypermedia.

You might also like