0% found this document useful (0 votes)
9 views22 pages

Internet and WWW

Uploaded by

REEE Vooo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views22 pages

Internet and WWW

Uploaded by

REEE Vooo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

The Internet

and the WWW


INTECH 2100
The Internet

§ Is a massive network of networks, a networking infrastructure


that uses TCP/IP to transmit data via various types of media.
§ It is the largest network in the world that connects hundreds of
thousands of individual networks all over the world.
How does the Internet work?
How does the Internet work?
How does the Internet work?

Data traversing the Internet is divided into smaller pieces, called packets. IP information is
attached to each packet, and this information helps routers to send packets to the right place.
Every device or domain that connects to the Internet is assigned an IP address, and as packets are
directed to the IP address attached to them, data arrives where it is needed.
Fiber Optic Lines

Source: https://learn.microsoft.com/en-us/azure/networking/microsoft-global-network
Fiber Optic Lines

https://www.insightsonindia.com/2020/12/10/lakshadweep-to-get-optical-fibre-cable/ https://www.popsci.com/article/science/google-protects-it-undersea-fiber-optic-cables-sharks/
Who Manages the IP addresses and DNS?
How do we connect to the Internet?

§ Internet Service Provider (ISP) – these are the


companies that provide us Internet connectivity
History of the Internet

§ 1950s: Computer scientist in the world began connection computers in the a same
building which commonly known now as the Local Area Network (LAN)
§ 1967: Larry Roberts, program manager of Advanced Research Projects Agency
coordinated with Wesley Clark in creating a packet-switched subnet- ARPANET
§ 1969: The initial Arpanet was deployed. (The first computer was located in a research lab
at UCLA and the second was at Stanford; each one was the size of a small house.) The
message—“LOGIN”—was short and simple, but it crashed the fledgling ARPA network,
anyway: The Stanford computer only received the note’s first two letters.
https://www.sciencemuseum.org.uk/objects-and-stories/arpanet-internet
History of the Internet (Continued)

§ 1971: Vint Cerf created the Transmission Control Protocol (TCP) followed by Internet
Protocol (IP). This allows the computer in the world to communicate.
§ 1986: The NSFNET was completed. The regional networks are connected to the
backbone which allowed nodes to communicate with each other and access the
supercomputers of NSF at Boulder, Champaign, Ithaca, Pittsburgh and Princeton and San
Diego
§ 1989: Tim Berners-Lee invented the World Wide Web (WWW)
§ 1992: ERWISE was created the first Internet Browser that has graphical user interface
The World Wide Web

§ By October of 1990, Tim had written the three fundamental technologies that remain
the foundation of today’s web.

§ HTML: Hyper Text Markup Language. The markup (formatting) language for the web.
§ URI: Uniform Resource Identifier. A kind of “address” that is unique and used to identify to each
resource on the web. It is also commonly called a URL.
§ HTTP: Hypertext Transfer Protocol. Allows for the retrieval of linked resources from across the
web.
The World Wide Web

a collection of interlinked documents called webpages


written usually in Hypertext Markup Language (HTML) that
can be accessed over the internet using a browser that
allows us to enter the Uniform Resource Locator (URL) of the
webpage we want to access
What Makes the Web?

§ Hypertext Transport Protocol(HTTP) - The transfer protocol is the set of rules that the computers
use to move files from one computer to another on the Internet.
§ Web Hosting/Server – Is the computer that runs, store, deliver web pages for the users.
§ Web Language – Computer programming that use by software engineers to create
websites/webpage that we interact.
§ Examples: Hypertext Markup Language (HTML), Java Script, Cascading Style Sheets (CSS)
§ Web Browser – Software that we use to access world wide web and translate Web Language to be
understandable for the users.
§ Examples: Google Chrome, Internet Explorer, Firefox
What Makes the Web?

§ Domain Name Service (DNS) - translate domain names into IP Addresses, which computers
can understand.
§ Example of IP Address: 192.168.1.1

§ Uniform Resource Locators URL – use to locate the exact position of a Web Page/Site.
Structure of a Uniform Resource Locators

protocol pathname

http://www.chicagosymphony.org/civicconcerts/index.htm

Domain name filename


Relation of Internet and World Wide Web

§ Internet has many services


§ Email
§ Instant Message
§ Voice Over Internet Protocol
§ Web
§ Application Connectivity
§ Etc.
§ Web is the most popular Service
§ Web use the internet to exist in the virtual world
Computer Security and Privacy

§ Computer security is the protection of resources that are considered as


valuable asset in a computer system.
§ Confidentiality is ensuring that a resource can only be accessed by an
authorized user.
§ Availability is when an authorized person should be able to access a resource
anytime.
§ Integrity is preserved by allowing modifications of an authorized person only.
§ Privacy is the protection of one’s personal info against unauthorized access.
Threats to Security and Privacy

§ Vulnerability is a weakness in the system which maybe in its design


structure or operation.
§ Botnet – collection of computers controlled by a group of malicious
users
§ Distributed Denial of Service – when a system fails to respond to
the requests of legitimate users
§ Phising – use of email to collect personal info from a recipient
Threats to Security and Privacy

§ VRootkit – a program that gives a user a root privilege of infected


system
§ Spam – unsolicited emails with advertisements sent to a large
number of people
§ Trojan Horse – malicious code that hides itself in an expectedly
harmless program
§ Virus – piece of code or program that performs malicious
operations in a computer
§ Worm – can propagate in a machine or whole network even
without action of the user
Methods of Preventing Attacks

§ Policies and Procedures


§ Physical control- focuses in the environment
§ Hardware control- access to a system is controlled with the use of
special devices
§ Software control- restrictions are enforced in the code or on the form of
features within a program such as OS or database management system
§ Encryption- the process of scrambling data to make it unreadable for
unauthorized users.

You might also like