Here Are Concise and Readable Notes On The Provided Sources
Here Are Concise and Readable Notes On The Provided Sources
o Share resources
o 1990: ARPANET was eliminated, its legacy evolving into the internet.
o 1991: Tim Berners-Lee created HTML, HTTP, the first Web browser and Web
server.
o 1993: Marc Andreessen and Eric Bina developed the MOSAIC browser.
o 1994: Marc Andreessen and Jim Clark founded Netscape Communication and
the Netscape Navigator browser.
• Owners of the Internet: No single person or organization owns the Internet entirely.
It's more of a concept relying on physical infrastructure. Organizations establish its
structure but don't own it. Thousands of people and organizations own different parts.
• Anatomy of Internet: Enormous group of computers linked by cable and satellites using
common network protocols. Includes both hardware and software.
o HTML (HyperText Markup Language): Standardized system for tagging text files
for web page effects.
o FTP (File Transfer Protocol): Facility for downloading and uploading files.
o Home page: Page the computer goes to upon initial internet login.
o Link/Hyperlink: Text on a web page that takes the user to another web location
when clicked.
• Netiquette: Internet Etiquette, governing socially acceptable online conduct. Respecting
privacy and avoiding annoying others. Important in e-mail, online chats, and
newsgroups.
• Internet Applications:
• Impact of Internet on Society: Large impact on way of living. Saves money and time
(e.g., price comparisons). Changed relationships, education (online degrees),
fundraising, and political action.
• Crime on/through the Internet: Any illegal online action. Includes cyberbullying,
financial extortion, data theft, password trafficking, copyright violations, online child
pornography, credit card theft, phishing, virus spreading, domain hijacking. Punishing
offenders is complicated due to geographic spread.
• Internet Connectivity: Various types, broadly classified into Level One, Level Two, and
Level Three.
• Level One Connectivity (Gateway Access): Access from a network not on the Internet,
limited access to internet tools allowed by the provider (e.g., AOL, CompuServe). Often
limited to e-mail access.
o ISDN (Integrated Services Digital Network): Up to 128 Kbps using digital phone
lines.
• Hardware Requirement: Minimum specs (Windows XP+, processor, RAM, sound card,
etc.). Recommended DSL or Cable connection with minimum speeds.
• Selection of a Modem:
o Ensure interfaces: Modem must connect to the device (USB, PC card, etc.).
o Don't forget about price: Internal modems cheapest, others more expensive.
• Software Requirement:
• Modem Configuration: Connect modem to power, then Ethernet cable to PC. Open
browser, type http://192.168.1.1/ for configuration page. Default username/password
often admin/admin.
o ISDN Connection: Integrated Services Digital Network for voice, video, and data
over digital/normal phone lines. Supports 64 Kbps. Mostly for leased lines, uses
Terminal Adapter (TA), not a modem. Two types: Basic Rate Interface (BRI) (2 B-
channels, 1 D-channel) and Primary Rate Interface (PRI) (23 B-channels, 1 D-
channel in US). Original ISDN uses baseband, B-ISDN uses broadband (fiber optic,
up to 1.5 Mbps, not widely used).
o Advantages of ISDN: Digital, less error, direct fast connection, higher bandwidth,
multiple users, multitasking.
o Disadvantages of ISDN: More expensive installation, not easy to set up, not
available in all exchanges.
• Protocol Options:
o Secure Shell (SSH): Secure channel for data exchange between networked
devices, primarily on Linux/Unix for shell accounts. Replaces Telnet, encrypts
data (passwords).
o PPP (Point-to-Point Protocol): Data link protocol for direct connection between
two nodes. Encapsulation for IP over point-to-point links. Full duplex, works on
various media, preferred over SLIP (synchronous/asynchronous, shares line, error
detection).
• Service Options:
• Local Area Network (LAN): Group of computers in a limited geographical area (home,
school, office). Can be wired or wireless. Size limited to a few kilometers. Designed for
resource sharing (hardware, software, data). Common topologies: bus, ring, star.
Wireless LANs are the newest evolution. Basic structures: Peer-to-Peer and
Client/Server.
• Wide Area Network (WAN): Spans a large geographical area (state, country). Different
from MAN due to distance. The Internet is the best example. Connects computers and
users in different locations via telephone lines, fiber optics, or satellites. Uses TCP/IP
with routers, switches, firewalls, and modems.
• Node: System/device connected to a network (computer, PDA, phone, etc.). Each has a
unique network address (MAC address).
• Servers: Network computers with large storage capacity and assigned roles, controlling
other computers and labor division. Provide services to other computers, hold files,
programs, and network OS.
• Clients: Any computer on a common network other than the server. Less powerful than
servers, access network and shared resources.
• Peer to Peer Network: No dedicated servers or hierarchy, all computers are equal peers.
Each acts as Client/Server, no central administrator. Good for small organizations in the
same area, where security isn't a major issue and limited growth is expected.
• Domain Name System (DNS): Invented for e-mail on ARPANET, now supports the global
Internet. Network of servers mapping domain names (e.g., www.livinginternet.com) to
IP addresses. Allows domain names to remain constant despite network topology/IP
changes. Client/server architecture, distributes mapping job among domain servers.
• Domain Name and their Organization: Alphanumeric identifiers for hosts on the
Internet. Structure described in RFC 819, syntax in RFC 822. Four main types:
o Top-level domains: Rightmost part (e.g., .com, .gov, .edu, .org, .mil, .net).
o Ring Topology: Each computer connected to the next, forming a ring. Data travels
node to node, each handling every packet. Single pathway, so link failure can
disrupt the network. Signals travel in one direction, each computer retransmits,
active network, no termination needed.
o Hybrid Topology: Uses two or more different topologies (bus, mesh, ring, star,
tree).
o Mesh Topology: All computers interconnected to every other via dedicated links.
Each node relays data. N(N-1)/2 links for N nodes. Point-to-point connections
(wired/wireless).
• Overview of Internet Security: Protecting websites and electronic files from hackers and
viruses in the vast internet. Essential for business users' confidence. Cyber criminals
constantly find new ways around security. Techniques to ensure data is not read or
compromised without authorization, often involving encryption and passwords.
Connecting to a network involves risk. Basic measures: passwords, file permissions,
backups. Security is paramount in system enhancements.
• Aspects and need of security: Threats are expanding, business practices transforming.
Fight against well-financed criminals, not just pranksters. Concerned about web-based
malware, worms, application attacks. Primary customers are now citizens, organizations,
partners. Valued information in large databases linked globally. Need attention to server
configuration, application security, patching, authentication, malicious traffic. Need to
filter malicious websites, apply patches quickly, develop secure applications, secure
desktops/servers, use strong authentication, train employees, isolate data. Vendor
security tools are bundling, discounts for using only their products (even if not best
practice). Older products may not be top performers, support may decline as product
lines expand, push for long-term contracts. Limited price competition except for large
purchases. Vendors are improving threat identification and updates. Security must be a
core service-delivery requirement, not an add-on. Independent agency implementation
is inefficient. Need long-term strategies.
• E-mail threats and Secure E-mail: E-mail is like a postcard, can be intercepted. Secrecy
requires sender/receiver agreement on a secret key, logistical problems for distant
recipients. Public key cryptography (public/private key pair) solves this. Message signing
is another way to ensure secrecy.
• Web security and Privacy concepts: 'Internet options' in control panel allow setting
privacy and security levels for browsers. 'Security options' block unwanted/unsecure
sites, 'privacy option' blocks cookies by zone.
• What are cookies?: Small text strings stored on a user's computer by a web browser.
Message from a web server stored by the browser in a text file, sent back with each
page request. Main purpose is to identify users and possibly customize pages. Used to
collect demographic info, personalize user experience, monitor advertisements. Text
files that can be deleted, cannot spread viruses or access hard drive, do not act
maliciously.
• The Simple Network Management Protocol (SNMP): Framework for managing internet
devices using TCP/IP. Provides operations for monitoring and maintaining. Uses a
manager (runs client program) and agent (runs server program). Management through
interaction between manager and agent. Agent keeps performance info in a database
accessible by the manager. Application level protocol with a few managers controlling
agents. Management based on: manager checking agent by requesting behavior info,
manager forcing tasks by setting values, agent warning manager of unusual situations.
SNMP defines packet format, interprets results, creates statistics, responsible for
reading/changing object variable names and values.
• VPN (Virtual Private Network): Allows a computer to connect to a corporate LAN over
the internet. Important, widely used technology. Carried over a shared/public network
(usually internet), encrypts messages accessible only to VPN client and server. Less costly
than dedicated connections (WAN) by using internet efficiency without compromising
security.
o VPN Client: Both sides need compatible VPN software and protocols. For remote
access, software depends on the VPN. Dedicated VPN solutions sell client
software for distribution.
o Authentication methods:
▪ One time password systems: Token displays a current password verified
by the server.
o Callback: Security feature where server hangs up after user dials in and enters
credentials, then calls back at a pre-defined number.
o Packet Filters: Network administrators can limit user access to specific network
services (e.g., send email but not copy files).
• Information Privacy: User data (files, emails) not seen by others without permission.
Private communication when sender and receiver can read the message.
• Encryption: Message sent in secret code so it can't be read without the code (key) and
encryption method. Reader needs the key to decode the message.