Module 2 The Internet
Module 2 The Internet
In this module, the learner will have knowledge on the concepts of the
Internet, how it is being used. The advantages and limitations, the power of IP
address and the concepts behind World Wide Web and how it evolved
throughout the years.
EXPECTATIONS
MOTIVATION
1. How many times have you checked your phone this morning?
2. How many status updates have you posted in any social media
platforms today?
3. Did you use the internet after you woke up this morning?
4. What if we can understand how computers talk using their language?
LESSON
What is Internet?
They negotiate the transfer of packets of data according to a complex set rules
described as the TCP/IP protocols. The rules describe the structure of the packets and
the procedures by which the software on the machines communicate with each other.
Uses of Internet
Internet has been the most useful technology of the modern times
Which helps us not only in our daily lives, but also our personal and
Professional lives developments. The internet helps us achieve this in
several different ways.
For the students and educational purposes the internet is widely used
to gather information so as to do the research or add to the knowledge of
various subjects. Even the business professionals and the professionals like
doctors, access the internet to filter the necessary information for the iruse.
The internet is therefore the largest encyclopedia for everyone, in all
age categories. The internet has served to be more useful in maintaining
contacts with friends and relatives who live abroad permanently.
Advantages of Internet:
• Online Chat: You can access many ‘chat rooms’ on the web that can be
used to meet new people, make new friends, as well as to stay in touch
with old friends.
• Services: Many services are provided on the internet like net banking, job
searching, purchasing tickets, hotel reservations, guidance services on
array of topics engulfing every aspect of life.
• E-commerce: Along with getting information on the Internet, you can also
shop online. There are many online stores and sites that can be used to look
for products as well as buy them using your credit card.
Limitations of Internet
• Theft of Personal Information: Electronic messages sent over the Internet can be
easily snooped and tracked, revealing who is talking to whom and what they are
talking about. If you use the Internet, your personal information such as your
name, address, credit card, bank details and other information can be
accessed by unauthorized persons. If you use a credit card or internet banking
for online shopping, then your details can also be ‘stolen’.
• Virus Threat: Today, not only are humans getting viruses, but computers are also.
Computers are mainly getting these viruses from the Internet. Virus is a program
which disrupts the normal functioning of your computer systems. Computers
attached to internet are more prone to virus attacks and they can end up into
crashing your whole hard disk.
Your internet speed is the volume of data packets transferred through a connection in a
given amount of time.
Download speed is the speed at which information travels from the internet to
your internet-connected device.
Upload speed is the opposite. It is the speed at which information travels from
your internet-connected device to the internet.
With most internet plans, download speeds are much faster than upload speeds. This
makes sense because consumers generally download much more information than
they upload. Many online activities don’t really need upload bandwidth once they’re
initiated:
Most internet speeds are expressed in Mbps. Upload speeds and very slow download
speeds are sometimes measured in Kbps. However, over the past decade, top-end
internet speeds have increased, and the fastest internet speeds are now often
measured in Gbps.
Bandwidth
• Fiber is the fastest widely available internet technology. It uses fiber-optic cables,
which are capable of transmitting large amounts of information quickly.
• Cable internet uses the same types of cables that transmit cable TV services. It
has broadband capability and thus can reach high speeds.
• DSL(Digital Subscriber Line) uses a connection that looks similar to a phone line,
but the wiring inside is different and allows for broadband transmission.
• Satellite internet is delivered wirelessly to the receiver, but it still requires wires to
transport the signal from the receiver to different locations throughout the
building.
• Wifi Hotspots sites that offer Internet access over a wireless local area network
(WLAN) by way of a router that then connects to an Internet service provider.
Let’s take a look at some internet speeds and what you can do with them:
IP ADDRESS 101
The Internet Protocol (IP) is one of the core protocols in the layers of the Internet, as you
might guess from its name. It's used in all Internet communication to handle both
addressing and routing.
If you want to understand why a particular device is not connecting in the way you
would expect or you want to troubleshoot why your network may not be working, it
helps understand how IP addresses work.
Internet Protocol works the same way as any other language, by communicating using
set guidelines to pass information. All devices find, send, and exchange information
with other connected devices using this protocol. By speaking the same language, any
computer in any location can talk to one another.
• Online Stalking - Criminals can track down your IP address by merely stalking
your online activity. Any number of online activities can reveal your IP address,
from playing video games to commenting on websites and forums.
• Downloading Illegal Content using your IP address - Hackers are known to use
hacked IP addresses to download illegal content and anything else they do not
want to be traced back to them. For example, using the identity of your IP
address, criminals could download pirated movies, music, and video – which
would breach your ISP’s terms of use – and much more seriously, content related
to terrorism or child pornography.
• Tracking down your location - If they know your IP address, hackers can use
geolocation technology to identify your region, city, and state. They only need to
do a little more digging on social media to identify your home and potentially
burgle it when they know you are away.
• Directly attacking your network - Criminals can directly target your network and
launch a variety of assaults. One of the most popular is a DDoS attack
(distributed denial-of-service). This type of cyberattack occurs when hackers use
previously infected machines to generate a high volume of requests to flood the
targeted system or server.
• Hacking into your device - The internet uses ports as well as your IP address to
connect. There are thousands of ports for every IP address, and a hacker who
knows your IP can try those ports to attempt to force a connection. For example,
they could take over your phone and steal your information. If a criminal does
obtain access to your device, they could install malware on it.
SERVICES OF INTERNET
• FTP: File Transfer Protocol, is an Internet utility software used to upload and
download files.
• Gopher: an Internet application that allows you to browse many different kinds of
resources by looking at menus or listings of information available.
• WAIS: "Wide Area Information Server." This is a program that can index enormous
amounts of information and make it searchable across large networks (including
the Internet).
• WWW: the “Web”, the leading information retrieval service of the Internet (the
worldwide computer network). The Web gives users access to a vast array of
Evolution of Web
Anyone who has internet connection can see web pages which involve multimedia
tools such as text, images or videos. The proposal of Tim Berners-Lee in 1989 and Robert
Cailliau, a computer scientist was to use hypertext to integrate information into a web
as nodes where users can view. In this way, World Wide Web was designed as the first
web service.
• The goal of the symbiotic web is interaction between humans and machines in
symbiosis.
• Web 4.0 will interact with users in the same way that humans communicate with
each other.
• Web 4.0 environ will be an “always on,” connected world. Users will be able to
meet and interact interspatially on the web through the use of avatars.
• The symbiotic relationship will extend to Web 4.0 by acting as a personal
assistant or agent for the user.
o Through the use of facial recognition, an ultra-intelligent electronic agent
will recognize users whenever they log onto an internet connected
device.
o The ultra-intelligent electronic agent will constantly be available.
o The user will determine its’ look and personality via an avatar. Ask the
agent a question and it will answer. It will also be intuitive of the user’s
needs.
• Web 5.0 will also be referred
as “The
Telepathic Web”
• Web 5.0 will be present
after the year 2030 and
within this highly complex
future web
generation, some things
such as b rain implants
will be very popular.
o Brain implants
will give
people, for
example, the
ability to
communicate
with the
internet
According to futurist
through thought, to think a question and open up a web Daniel Burrus, phones
page. and other devices will no
longer require screens to
• Any sorts of payments such as groceries, will be paid for with a navigate the internet
microchip in the brain or the hand.
• The future of Web 4.0 and 5.0 is meant to revolutionize the daily
lives of humans. By creating interrelationships between human and
machine, Web 4.0 will give users unique and interconnected social
and personal lives. This open, linked and intelligent interface will be
the future of the Internet.
The three parts of the World Wide Web
Content Can be search through Bulk of information Most contents are in illegal
the regular search present are those
engines that are sensitive,
private and
personal
REFERENCES:
Federal Communications Commission. (2014, June 24). Types of Broadband Connections. Federal
Communications Commission. https://www.fcc.gov/general/types-broadband-connections
What is 5G? Part 1 - Evolution and the Next Generation. (n.d.). Www.digi.com.
https://www.digi.com/blog/post/what-is-5g-part-1-evolution-and-the-next-generatio
Kaspersky. (2021, January 13). What is an IP Address – Definition and Explanation. Www.kaspersky.com.
https://www.kaspersky.com/resource-center/definitions/what-is-an-ip-address
Introduction to the internet - ITU. (n.d.). Retrieved January 19, 2022, from https://www.itu.int/en/ITU-
D/Regional-Presence/AsiaPacific/Documents/s02-internet-introduction.pdf
Internet basics: What is the internet? - gcfglobal.org. (n.d.). Retrieved January 19, 2022, from
https://edu.gcfglobal.org/en/internetbasics/what-is-the-internet/1/
Berners-Lee, Tim; Fischetti, Mark,” Weaving the Web”, Harper San Francisco, chapter 12, ISBN 978-0-06-
251587-2, 1999.
Benito-Osorio, D., Peris-Ortiz, M., Armengot, C.R. et al. Web 5.0: the future of emotional competences in
higher education. Glob Bus Perspect 1, 274–287 (2013).
Callo, Erwin Reyes. 2017. SCIENCE in Today’s World for SENIOR HIGH SCHOOL
Empowerment Technologies. Sibs Publishing House
CarikeLoretz, V. A. P. B. (2017, March 17). The rld Wide Web – From Web 1.0 to Web 5.0. Social Media
Networks in Business. https://carikesocial.wordpress.com/2017/03/15/the-world-wide-web-
fromweb-1-0-to-web-5-0/
CISO Guide: Surface Web, Deep Web and Dark Web - Are they different? (n.d.). CISO Platform.
https://www.cisoplatform.com/profiles/blogs/surface-web-deep-web-and-dark-web-are-
theydifferent
Innovative Training Works, Inc. (2016). Empowering Technologies. First edition. Manila: Rex Bookstore.
Krauter, C. (2020, June 17). Web 1.0, 2.0 and 3.0 for dummies. Datanova.
https://datanova.com.au/web-1-0-2-0-and-3-0-for-dummies/