Chap 7 - Introduction to Internet
Chap 7 - Introduction to Internet
INTRODUCTION TO INTERNET
Class: Comp. Sc A/L By:
By NDANG George
The term Internet is the short form of the expression “Inter-connecting Network”. It can be defined as a
giant computer network that results from the global interconnection of millions of computers and related
equipment based on the TCP/IP protocol. The Internet contains vast information quantities that are constantly
changing and extending. It is used by many individually companies, school and even government agencies.
Learning objectives
After studying this lesson, student should be able to:
- Define Internet and understand what is internet and e-mail and its uses in modern communication
- Discuss techniques of internet connections
- Discuss some Internet services (web, chat; VoIP, social networking, …)
- Differentiate Internet and intranet, intranet and extranet
- Discuss about some Internet threats and the possible remedies
X. NETIQUETE…………………………………………………………………………………...15
In 1969, the US Department of Defense started a project to allow researchers and military personnel to
communicate with each other in an emergency. The project was called ARPAnet and it is the foundation of the
Internet. During the 1970's, what would later become the Internet was developed. While mostly military personnel
and scientists used it in its early days, the advent of the World Wide Web in the early 1990's changed all that.
Today, the Internet is not owned or operated by any one entity. This worldwide computer network allows people
to communicate and exchange information in new ways. According to www.commerce.net, in April of 1999, there
were 92.2 million Internet users over the age of 16in the United States and Canada. By 2005, it is predicted 75% of
the total US population will be online.
There are several technologies that may be used for connecting a computer to the Internet. Some of the
most popular technologies include:
1- Analogue connection: Also called dial-up access, an analog Internet connection is both economical and
slow. Using a modem connected to your PC, users connect to the Internet when the computer dials a phone
number (which is provided by your ISP) and connects to the network.
4- Cable Connection: Cable connections are “always-on”, high-speed Internet connections. Cable
connection is known as broadband connections and is much faster than analogue or ISDN links. It is more
costly than analogue and ISDN connections.
5- Wireless Connection: Wireless Internet or Wireless broadband is a new Internet connection type which
use radio frequency band instead of using telephone or cable networks for the Internet connections. Wireless
Internet is an “always-on” connection that can be accessed from anywhere as long as you are geographically
within a network coverage area.
6- Satellite connection: Internet over Satellite (IoS) allows a user to access the Internet via a satellite that
orbits the earth. A satellite is placed at a fixed position above the earth’s surface.
Network Type Speed Connection Description
Dial-up connection Twisted pair with Rapidly being replaced by broadband
Up to 56Kbps
(POTS) RJ-11 connector. technologies such as DSL and cable.
Integrated Services Twister pair with
128 kbps Business access
Digital Network (ISDN) RJ-11 connector.
Digital Subscriber Line Twisted-pair with Home, small business, and enterprise
256 Kbps to8 Mbps
(DSL) RJ-45 connector. access using existing phone lines.
Coaxial cable with F
Cable modem 512 Kbps to 52 Mbps Home, business, school access
connector.
Satellite 400 kbps Satellite Dish Rural and remote areas
a) Computer - Generally any computer purchased in the last three years, particularly aPentium, should have
no problems in supporting the software you need to install. Older machines such as a 486 with only 8Mb RAM do
work, but you may want to upgrade the amount of RAM and your hard disk capacity.
b) A phone line: As a phone line, you can use your ordinary telephone line at home if you already own one.
c) A modem (modulator/demodulator): A modem is a hardware, which converts digital data into analog
signals (i.e. modulation) that can be sent over an analog telephone line and convert the analog signal back into
digital data (i.e. demodulation). The most critical aspect of the modem is its speed of operation. The speed of
modem is measured in kilobits per second (Kbps). Modern modem supports 28–56 Kbps speeds. There exist
internal and external modems.
d) An Internet account. It is an account that can be opened with an Internet service Provider. The process
of going to an ISP and getting an access account is referred to as subscription. An Internet Service Provider (ISP)
is a company or organization that provides Internet Access to user in return for money. Some examples of ISP are:
CamNet, Camtel, Africom, MTN, Orange, Ringo, YooMee
b) Social purposes: The internet is useful in maintaining contacts with friends and relatives who live abroad
permanently. The easiest communication means like the internet chatting systems and the emails are the best and
the most common for the maintaining contacts with the people around the world. One cannot imagine an online
life without social websites like Facebook or Twitter today
c) Entertainment: Not to forget internet is useful in providing with most of the fun these days. May it be all
the games, and networking conferences or the online movies, songs, dramas and quizzes, internet has provided the
users with a great opportunity to eradicate the boredom from their lives.
d) Faster Communication: The foremost target of Internet has always been speedy communication and it has
excelled way beyond the expectations. New innovations are only going to make it faster and more reliable. Now,
you can communicate in a fraction of second with a person who is sitting in the other part of the world.
e) Sharing of resources: Many resources like files, video or audios can be easily shared over the Internet
f) Information Resources: Information is probably the biggest advantage that Internet offers. Internet is a
virtual treasure trove of information. Any kind of information on any topic under the sun is available on the
Internet. The search engines like Google, Yahoo are at your service on the Internet.
g) Online Services: it has made life very convenient. With numerous online services you can now perform all
your transactions online. You can book tickets for a movie, transfer funds, pay utility bills, taxes etc., and right
from your home. Services like e-commerce are also available to enable people buying and purchasing online.
b) Theft of personal details While using the Internet, there is high probability that your personal details like
name, address and credit card number may be accessed by con artists and used for fraudulent purposes.
c) Pornography: it is definitely harmful for your children. There are numerous pornographic sites available
over the Internet and watching any of those can have very bad influence on the mental health of your children.
d) Virus threat: Virus is a program that interrupts the usual operation of your personal computer system. PCs
linked to the Internet have high probability of virus attacks and as a result of this your hard disk can crash,
e) Social Disconnect: People now only meet on social networks. More people are drifting apart from their
friends and family. Even children prefer to play online games rather than going out and mingling with other kids.
With all its falls, the Internet has the potential to make your life simple and convenient, as well as wreak
havoc in your life. Its influence is mostly dictated by the choices you make while you are online. With clever use,
you can manage to harness its unlimited potential.
→ HTTP: (Hyper Text Transfer Protocol). These four letters are likely to appear in lowercase in the address bar of
a web browser while viewing this article. They are located at the beginning of the address and are used to tell the
browser how to properly process the data on the page and display the data to a computer user.
→ FTP: (File Transfer Protocol )The primary protocol used to transfer large amounts of data from place to place
across the Internet is known as FTP. Computers known as FTP servers are places on the Internet where files can be
stored and accessed via File Transfer Protocol.
→ TCP/IP: The network protocol suite that is primarily responsible for the transfer of raw data across the Internet
is known as TCP/IP. The acronym stands for a combination of Transfer Control Protocol and Internet Protocol. The
TCP side primarily describes how computers connect and how data is to be transmitted across the Internet properly.
Internet network addressing concepts such as an IP address are part of the IP side of the TCP/IP protocol suite.
An e-mail service is a set of resources that provides the communication needs of the public on the Internet. The
most popular e-mail services are: Yahoo! Mail, Gmail, AIM Mail, AOL and Hotmail. Yahoo! Mail which is one
of the largest e-mail providers on the Internet is a web based e-mail service from Yahoo! A program that is used
to send and receive e-mails is called e-mail client. Popular e-mail clients are: Outlook express, Eudora,
Netscape communicator and Yahoo! Mail client. A storage space for e-mails on the Internet is known as E-mail
account. An E-mail account is associated with a given user ID, and is usually protected by a password to
prevent other people from reading and changing its contents without the user’s permission.
a) Facebook
Facebook is a social networking service launched in February 2004, owned and operated by Facebook, Inc.
Facebook was founded by Mark Zuckerberg. As of September 2012, Facebook has over one billion active
users. Facebook is a popular free social networking website that allows registered users to create profiles, upload
photos and video, send messages and keep in touch with friends, family and colleagues. The site, which is
available in 37 different languages, includes public features such as:
• Marketplace - allows members to post, read and respond to classified ads.
• Groups - allows members who have common interests to find each other and interact.
• Events - allows members to publicize an event, invite guests and track who plans to attend.
• Pages - allows members to create and promote a public page built around a specific topic.
• Presence technology - allows members to see which contacts are online and chat.
b) Twitter
it is an online social networking service and micro blogging service that enables its users to send and read text-based
messages of up to 140 characters, known as "tweets". It was created in March 2006 by Jack Dorsey and launched
that July. The service rapidly gained world wide popularity, with over 500 million registered users as of 2012,
Bing Search: Microsoft's entry into the burgeoning search engine market. Better
late than never.
Yahoo! Search: The 2nd largest search engine on the web (as defined by a
September 2007 Nielsen Net ratings report.
AltaVista: Launched in 1995, built by researchers at Digital Equipment
Corporation's Western Research Laboratory.
Excite: Now an Internet portal, was once one of the most recognized brands on the
Internet. One of the famous 90's dotcoms
Galaxy: More of a directory than a search engine. Launched in 1994, Galaxy
was the first searchable Internet directory.
Live Search (formerly Windows Live Search and MSN Search) Microsoft's
web search engine, designed to compete with Google and Yahoo!.
Lycos: Initial focus was broadband entertainment content, still a top 5 Internet
portal and the 13th largest online property according to Media Metrix
b) Meta-search engine:
A meta-search engine is a search tool that sends user requests to several other search engines and/or databases
and aggregates the results into a single list or displays them according to their source. Meta-search engines
enable users to enter search criteria once and access several search engines simultaneously. Meta-search engines
operate on the premise that the Web is too large for any one search engine to index it all and that more
comprehensive search results can be obtained by combining the results from several search engines. This also
may save the user from having to use multiple search engines separately.
By NDANG George Page 9
Topic: INTRODUCTION TO INTERNET
c) Subject directories
Subject directories are a collection of sites organized by a human. At the top of the directory is a general topic.
From that general topic the deeper you go into the directory, the more specific the information you will find.
Sometimes subject directories are called trees. Examples of subject directories include the following: Internet
Public Library, BUBL, Scirus, INFOMINE, The WWW Virtual Library, Intute, Librarian's Internet Index,
Statistical Sites on the WorldWide Web, The Scout Archives
- If you need a quick and easy way to set up group video conferences, look no further than Google Hangouts.
You can add up to 8 other participants for a total of 10.
- If you just need a service that lets you call other people over the Internet, then GoogleVoice is your
solution. Assign yourself a Voice-provided phone number that you can use for everything no matter what your
phone or service provider is. Through GoogleVoice, you can make free calls to anywhere in the U.S. or Canada;
everywhere else has extremely low rates.
- If it’s instant messaging that you need, use Google Talk. As a bonus, you can use Google Talk to initiate
private video chat sessions; all you need to do is install a plugin. Google Talk interfaces with Gchat (on Gmail),
iGoogle, and Orkut.
VII.8 Weblog
A weblog or a blog is a shared online diary where people can post daily entries about their personal
experiences and hobbies. The activity of updating a blog is called blogging and someone who keeps a blog is
known as a blogger. Quelques examples de serveurs de blog sont. Over blog(www.overblog.com), Blog4ever
(www.blog4ever.com), Blogger (www.blogger.com)
e) Online translation: This is a service that translates a given piece of text from onelanguage to another language
with the help of special software called online translator (e.g. Google translate).
1- Intranet
An intranet is a private network that uses Internet protocols to provide Internet services restricted within an
organization. It is protected from unauthorized users by a firewall. Intranet enhances existing communication
between employees and provides a common knowledge base and storage area for everyone in an organization or
company. It utilizes network hardware and software technologies like Ethernet, WI-Fi, TCP/IP, Web browser and
Web servers.
An intranet may consist of many interlinked LANs and also used leased lines in the WAN. The main purpose of an
Intranet is to share company information sans computing resources among employees
Benefits of Intranet
- Better internal communications: Corporate information can be stored centrally and access at any time.
- Sharing of resources at best practice
- Improve customer service - Reduction of paperwork
2- Extranet
An extranet is a private network that enables an organization to communicate and collaborate more effectively
with selected business partners, suppliers and customers. An extranet can play an important role in enhancing
business relationships and improving management. The extranet uses Internet protocols so users can navigate with
a browser, but resides on the company’s private server rather than on a public Internet server. One very valuable
application for an extranet is customer service. Online patches, upgrades, downloads, knowledge bases, and an
interactive help desk are just a few examples of ways to serve a client using an extranet.
Benefits of Extranet
An extranet can offer a wide range of benefits to a business establishment, starting from lowering costs, to
producing faster results, and improving the quality of service to customers. However, the type of benefits that those
organizations using extranets typically experience includes:
- More integrated supply chain through the use of online ordering, order tracking and inventory management.
- Reduced cost by making manuals and technical documentation available online to trading partners and
customers.
- More effective collaboration between business partner
- Improve business relationships with key trading partner because of the close collaborative working that extranet
supports.
- Improve customer service by giving customer s direct access to information
Shortcomings of extranet
- Extranets can be expensive to implement and maintain within an organization (e.g. hardware, software,
employees training cost), if hosted internally rather than by an application service provider
- Security of extranet can be a concern when hosting valuable or proprietary information
3- Comparison Internet-Extranet
An extranet is actually an Intranet that is partially accessible to authorized outsiders. Similarly, if the Intranet is
connected to the internet and allows access from the Internet, it becomes an extranet. There are many similarities
and differences between extranet and intranet.
a) Differences
Intranet Extranet
Not accessible beyond a company’s firewall accessible beyond a company’s firewall
Is an entirely internal network Has a portal to the outside world
More secure Less secure
b) Similarities
- Make use of Internet technologies and protocols - Are both private networks
- Enable easy information sharing workgroup.
1) Computer Virus
A virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge
of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through
removable media such as CDs or memory sticks.
4) SPYWARE
It’s software that is secretly installed on a computer without the user’s consent. It monitors user activity or
interferes with user control over a personal computer. Spyware programs can collect various types of personal
information, such as websites visited, credit card details, usernames or passwords, as well as install other malware,
redirect web browsers to malicious websites, divert advertising revenue to a third party or change computer
settings ( leading to degraded or unstable system performance, slow connection speeds or different home pages).
6) Adware
Adware is software which automatically plays, displays, or downloads advertisements to a computer. The
adware runs either after a software program has been installed on a computer or while the application is being
used. In some cases, adware is accepted by users in exchange for using software free-of-charge.
7) Botnet
A Botnet (also called a “zombie army”) is a collection of software robots, or bots, that run automated tasks
over the Internet. The term “botnet” is generally used to refer to a distributed network of compromised computers
(called “zombie computers”).
8) WORM
A computer worm is a self-replicating, malicious software program. Unlike a virus, it does not need to attach
itself to an existing program or require user intervention to spread. It uses a network to send copies of itself to
other computers on the network.
9) Trojan Horse
A Trojan horse or Trojan is a piece of software which conceals a payload (often malicious) while
appearing to perform a legitimate action. Trojan horses often install “backdoor programs” which allow hackers a
secret way into a computer system.
11) Rootkit:
A rootkit is a collection of tools that are used to obtain administrator-level access to a computer or a network of
computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or security
hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes.
2) Firewall: A firewall is a hardware security device that is installed between a computer network and the
Internet. It acts like a Web server, routing traffic, but also blocks external users from accessing the internal
computer system.
3) Encryption: A method of preventing third parties from capturing data while it is being transmitted over the
Internet is encryption. Encryption programs put data into a scrambled form that cannot be read without a key.
4) Authentication: There are several methods available to help small businesses prevent unauthorized access to
their computer systems. One of the most common methods is authentication of users through passwords. Since
passwords can be guessed or stolen, some companies use more sophisticated authentication technologies, such as
coded ID cards, voice recognition software, retinal scanning systems, or handprint recognition systems. All of these
systems verify that the person seeking access to the computer network is an authorized user.
5) Upgrade: To upgrade is generally to replace a hardware, software or firmware with a newer or better version,
in order to bring the system up to date or to improve its characteristics. Upgrade all web browsers to support 128-bit
encryption will help safeguard any information you want to pass securely over the web, including passwords and
other sensitive data submitted on forms.
IX. NETIQUETE
It seems complicated but it’s not. These are just simple guidelines that one needs to follow while you are online.
These will prevent you from hurting somebody you’re talking to. Internet etiquette, or netiquette guides us in
proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online. It is
very important to learn and follow these rules. Some netiquette tips are:
Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take
things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain
what they meant. It may have been a misunderstanding.
7. Be responsible online.
When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things
which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online,
and infecting other computers with viruses (on purpose) are examples of harming other people online