1 2 Why learn about Networks ? TDT4105 - IT Grunnkurs Recently Cisco Systems conducted a survey in 14 different countries. Approx. 3000 people completed an online survey during May and June, 2011. Participants were College Students (age 18–24) and Employees (age 21–29) Nettverk, Del 1 … about 40% of the students prefer Internet rather than meeting friends.… …more than 50% indicate they could not live without the Internet… …about 50% say that Internet is almost as important as food… The Internet & the World Wide Web …Internet more important than owning a car.… How important is it to you ? Would you like to know more about it ? Bjørn J. Villa PhD Candidate Institute for Telematics, NTNU [email protected] http://www.cisco.com/en/US/solutions/ns341/ns525/ns537/ns705/ns1120/CCWTR-Chapter1-Report.pdf 3 4 Chapter 2.1 Connecting to the Internet Topics • • • • Connecting to the Internet How does the Internet work ? The World Wide Web Email and Other Ways of Communicating • The Online Gold Mine: Telephony, Multimedia etc • The Intrusive Internet ”The lnternet.. ...a global, unifying network” Section 2 of text book ”Using Information Technology” supplemented with some reflections and examples © 2010 The McGraw-Hill Companies, Inc. All rights reserved. 5 6 Connecting to the Internet Connecting to the Internet Key terms to undestand • Internet History – – – – – – – Began with 1969’s ARPANET for US Dept. of Defense 62 computers in 1974 500 computers in 1983 28,000 computers in 1987 Early 1990s, multimedia became available on internet Internet commercially available ~1995 By 2001, the number of Internet hosts surpassed 100 million Bandwidth is an expression of how much data – text, voice, video and so on Which can be sent through a communications channel in a given amount of time Broadband is a high speed connection that allows “several signals to be transmitted at once”. In the context of Broadband Internet, this would mean a connection which allows you to use it for many thing at the same time, or even to demanding services (e.g. VoD, IPTV) • To connect you need – An access device (computer) – A means of connection (phone line, cable hookup, or wireless) – An Internet Service Provider (ISP) 7 8 Connecting to the Internet Connecting to Internet • Data Transmission Speeds • Modems – Dial up – Originally measured in bits per second (bps) – 8 bits are needed to send one character, such as A or a – Currently measured in kilobits, megabits or gigabits per second (Kbps, Mbps, Gbps) • High-speed phone lines – ISDN line – DSL line bits ?? ...01000110111! 00100111010 11100010001...! – Kilo- stands for a thousand, Mega- stands for million, Giga- stands for billions – Mbps connections send 1 million bits per second – Gbps connections send 1 billion bits per second Wired access • Cable Modems – Coax / Cable TV networks with internet • Fiber – Optics • Satellite • Wi-Fi • 3G/4G/LTE Wireless access 9 10 Connecting to the Internet Connecting to the Internet Kjører Mobility CDMA 4G/LTE Går UMTS GSM GPRS HSDPA EDGE IEEE 802.16e DECT Sitter WLAN (IEEE 802.11x) Kobber ... ... 0.1 1 10 Mbit/s 100 103 104 Bandwidth Statistics for Norway, source: npt.no (Post og Teletilsynet) Different technologies have different characteristics (bandwidth, mobility.) but they can all give access to the Internet 11 12 Chapter 2.2 How does the Internet work ? How Does the Internet Work? • The internet consists of thousands of smaller networks • These link educational, commercial, nonprofit, and military organizations • Most are Client/Server networks – Client: a computer requesting data or services – Server or Host: a central computer supplying data or services requested of it © 2010 The McGraw-Hill Companies, Inc. All rights reserved. • No single organization owns or controls the Internet…..good or bad ? 13 14 How Does the Internet Work? How Does the Internet Work? • The board of trustees of the Internet Society (ISOC) oversees the standards • Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain names • American Registry for Internet Numbers (ARINN) administers the unique IP addresses for North & South America, Caribbean, and sub-Saharan Africa • Two other organizations administer the unique IP addresses for Europe (RIPE) and the Asia-Pacific region • And a whole range of other organisations… • Customer has an access to an ISP (Internet Service Provider) through a POP (Point of Presence) • A number of ISP networks in each country • National and international interconnection point • Global Internet Backbone • Internet 2 – Cooperative university/business research project – New standards for large-scale higher-speed data transmission – Requires state-of-the-art infrastructure The Internet has historically been driven by Recommendations and Best Practice, rather than strict Standards and Laws 15 16 How Does the Internet Work? • IP Addresses • Protocols – Every device connected to the internet has an address – Each IP address uniquely identifies that device – The address is four sets of 3-digit numbers (IPv4) separated by periods – The set of rules a computer follows to electronically transmit data. – TCP/IP is the internet protocol • Developed in 1978 • Used for all internet transactions • Packets – Fixed-length blocks of data for transmission – Data transmissions are broken up into packets How Does the Internet Work? http://www.warriorsofthe.net/ Ericsson Medialab 1999 • • • • Example: 95.160.10.240 Each number is between 0 and 255 Static IP or dynamic IP Since IPv4 addresses are limited, and most PCs are not connected a lot of the time, dynamic addresses are common • Each ISP has its own range of addresses 17 18 How Does the Internet Work? How Does the Internet Work? Internet is migrating from IPv4-only to also use IPv6 around the world. A huge task… IPv4 “Game Over” IPv6 Source: http://www.ripe.net 19 20 Chapter 2.3 The World Wide Web © 2010 The McGraw-Hill Companies, Inc. All rights reserved. The World Wide Web • Browsers – Software for web-surfing – Examples: Internet Explorer, Chrome, Safari, FireFox, Opera.. • Website – The location on a particular computer that has a unique address – Example: www.item.ntnu.no – The website could be anywhere – not necessarily at company headquarters 21 22 The World Wide Web The World Wide Web • Uniform Resource Locator (URL) • Domain names – A character string that points to a specific piece of information anywhere on the web – A website’s unique address – It consists of • • • • – Must be unique – Identify the website, and (normally) the type of site it is • www.whitehouse.gov is NOT the same as www.whitehouse.org • .gov means government, .org means professional or nonprofit organization. We alsos have .com .no .as .tv and so on. • A whole range of domain types, not all of which has an explicit meaning. Some are reserved for business use • In Norway, starting this year (06.06.11) – NORID opened up for registration under the priv.no domain for individuals • NORID (www.norid.no) is the official registry for all domains under .no domain (Norway) • But remember, it’s just a name…. The web protocol, http The domain name of the web server The directory or folder on that server The file within the directory, including optional extension 23 24 The World Wide Web The World Wide Web • Search Services • HTTP – The internet protocol used to access the World Wide Web • HTTPS – The secure version of HTTP • Hypertext Markup Language (HTML) – The first language used in writing and publishing web pages – The set of tags used to specify document structure, formatting, and links to other documents on the web • Hypertext links connect one web document to another – Organizations that maintain databases accessible through websites to help you find information on the internet – Examples: portals like Yahoo Search and MSN, Google, Bing etc – Databases are compiled using software programs called spiders • Spiders crawl through the World Wide Web • Follow links from one page to another • Index the words on that site – Search tools • Keywords, subjects… 25 26 Chapter 2.4 Email and Other Ways of Communicating The World Wide Web • Should you trust all information you find online? • There is no central authority that verifies all internet sites • Guidelines to evaluate Web resources – Does the information appear on a professional site maintained by a professional organization? – Does the website authority appear to be legitimate? – Is the website objective, complete, and current? 27 © 2010 The McGraw-Hill Companies, Inc. All rights reserved. 28 Email & Other Ways of Communicating over the Net • Email client / web-based • Instant messaging / RTC (Real Time Chat) • Newsgroups • FTP – File Transfer Protocol • Email based discussion groups • Social media… • …. Email & Other Ways of Communicating over the Net Time spent on Social Networking growing, and is becoming the main tool of communication 29 30 Chapter 2.5 The Online Gold Mine: Telephony, Multimedia, Webcasting, Blogs, ECommerce & the Social Web (=Internet based services) Email & Other Ways of Communicating over the Net • Independant of which methods used to communicate you should always enforce some degree of Netiquette • Netiquette – appropriate online behavior – – – – – Before you ask a question, consult the FAQ Avoid flaming Don’t SHOUT – use all capital letters Be careful with jokes Don’t send huge file attachments unless requested © 2010 The McGraw-Hill Companies, Inc. All rights reserved. 31 32 Internet based services • Internet Telephony – Uses the internet to make phone calls – Long-distance calls are either very inexpensive or free • With no PC, dial a special phone number to packetize your call • With a PC that has a sound card, microphone, Internet connection, and internet telephone software such as Netscape Conference or Microsoft NetMeeting – Currently inferior in quality to normal phone connections – Also allows videoconferencing Internet based services • Multimedia on the Web – Allows you to get images, sound, video, and animation – May require a plug-in, player, or viewer • A program that adds a specific feature to a browser so it can view certain files • Example: Adobe Acrobat Reader, RealPlayer, QuickTime – Multimedia Applets • Small programs that can be quickly downloaded and run by most browsers • Java is the most common Applet language 33 34 Email & Other Ways of Communicating over the Net Internet based services • E-Commerce – Conducting business activities online – B2B Commerce is business-to-business e-commerce – Online Finance now involves online banking, stock trading online, and e-money such as PayPal – Online auctions link buyers with sellers • eBay is the most well-known example of person-toperson auctions • Question: • How many companies do you know of which do not rely on, or at least use the Internet as part of their operation today ? Source: Limelight Networks, Sept 2010 Video based services are dominating 35 36 Chapter 2.6 The Intrusive Internet The Intrusive Internet • The internet was founded as a collaborative tool based on trust • Not everyone on the internet is honest • Snooping – Email is not private © 2010 The McGraw-Hill Companies, Inc. All rights reserved. • Corporate management has the right to view employees’ email • Email that travels over the internet may be captured and monitored and read by someone else • Not all ISPs protect their customers’ privacy 37 38 The Intrusive Internet The Intrusive Internet • Spam: Electronic Junk Mail • Spoofing – Using fake email sender names so the message appears to be from a different source, so you will trust it. – If you don’t know the sender, don’t open it. – Unsolicited email that takes up your time and may carry viruses or spyware – Delete it without opening the message – Never reply to a spam message – When you sign up for something, don’t give your email address – Use spam filters – Fight back by reporting new spammers • Phishing – Using trusted institutional names to elicit confidential information – Some common schemes look like they are from your bank or from eBay and ask you to “update” your account. – Don’t do it – the legitimate company already knows your account information! – If you want to update your information, CALL the number in the phone book, not the number in the email! • Don’t be a spammer yourself…. Where did the term come from ? Monthy Python – Spam http://www.youtube.com/watch?v=anwy2MPT5RE 39 40 The Intrusive Internet • Pharming – Redirecting you to an imposter web page. – Redirects you to an imposter web page even when you type the correct URL – How ? • Malicious software on your PC. • “Hostile” DNS servers – Remember, behind the URL an IP address exists. This translation is dynamically done by a server normally assigned to you during connection time. So if present in a new environment…. The Intrusive Internet • Cookies – – – – Little text files left on your hard disk by some websites you visit Can include your log-in name, password, and browser preferences Can be convenient But they can be used to gather information about you and your browsing habits Velkommen tilbake til www.finn.no ! 41 42 The Intrusive Internet The Intrusive Internet • Spyware – Applications that download without your knowledge – They hide on your PC and capture information about what is on the PC and what you are doing – That information is then transmitted to the spyware master’s website on the internet – Information may be used against you to steal your identity, get credit cards in your name, or for other crimes Do you often install SW from the Internet ? Are you sure you know (all) what these do ? Not in place yet… 43 44 The Intrusive Internet End, Networks, Part I You can never trust a site 100%...
© Copyright 2026 Paperzz