Académique Documents
Professionnel Documents
Culture Documents
Internet Security……………………………………………………………………p12-p16
Internet Safety……………………………………………………………………...p-16-p18
Network Communication……………………………………………………...p18-21
Exercises……………………………………………………………………………….p21-
References……………………………………………………………………………
Introduction to Internet Technologies
Welcome to Internet Technologies, the second, and final course in the I-Net+ Certification
Series.
The certification program is specifically designed to prepare you to take the I-Net+ exam by
providing an overview of entry-level knowledge of Internet technology. This is the second in a
two-part series that teaches basic Internet terms and technologies. These are terms, types, and
technologies you will use throughout your Web developing experience.
Course goals
After completing the course, you will be able to:
1. Describe and evaluate the hardware and software you need to access the Internet
2. Describe the core components of the Internet infrastructure and how they relate to
each other
3. Troubleshoot problems with Internet connectivity using various diagnostic tools
4. Describe the nature and purpose of Internet protocols
5. Explain the purpose of HTTP
6. Explore search engines and best practice techniques for searching
7. Explain the basic methods used to keep connections to the Internet secure
In this course, you will learn with two kinds of applets:
1. Slide Show
2. Tool Tip
This work is aimed at people already familiar with using the Internet, who want to know how
and why it works. When I say technology, I do not mean the software and hardware, but also
the human components which are an integral part of the overall system of the Internet.
The Internet is a worldwide collection of computer networks that began as a single network
that was originally created in 1969 by ARPA (Advanced Research Projects Agency), a U.S.
government agency that was far more interested in creating projects that would survive a
nuclear war than in creating anything useful for the civilian population.
With ARPANET, the U.S. government hoped to create a network of computers that would allow
communication between government agencies and certain educational centers that would be
able to survive a nuclear explosion. It is doubtful that the original founders of ARPANET foresaw
what we now know as "the Internet." From its humble beginnings as a military project, the
ARPANET grew slowly throughout the 70's and 80's as a community of academics.
In addition to the U.S. ARPANET, other countries developed their own computer networks
which quickly linked up to ARPANET, such as the UK's JANET (1983 onwards), and Australia's
ACSnet (mid-1970s until replaced).
The various protocols, including IP, TCP, DNS, POP, and SMTP , took shape over the years, and
by the time the World Wide Web (HTML and HTTP) was created in the early 90's, this "Internet"
had become a fully functional, fairly robust system of network communication, able to support
this new pair of protocols which eventually turned the Internet into a household word.The
series
Internet Technologies is the second of two courses in the Internet Development Series. In the
next lesson, you will learn about prerequisites to this course.
Introduction to Accessing the Internet
As an Internet developer, it is important to know the mechanics of the Internet. You need to
understand about all the components and factors involved in accessing the Internet.
This module introduces you to the hardware and software you need to access the Internet. It
also introduces you to setting up essential elements of the infrastructure such as your desktop,
browser, and email. You will round out your learning with instruction on various Internet
services and the clients that enable them.
You will find learning the information almost as simple as learning your ABCs.
After completing this module, you will be able to:
1. Evaluate the hardware and software you need to access the Internet
2. Describe how to configure a desktop computer to access the Internet
3. Explain how to optimize a browser for performance
4. Explain how to configure a browser for cookies and Active X
5. Describe which protocols to use for sending and receiving email
6. Define the purpose and types of MIME (Multipurpose Internet Mail Extensions)
In the next lesson, you will learn about the three critical components of the Internet.
internet marketing is the fastest growing and most exciting branch of marketing today. As the
world becomes ever more connected, keeping up with developments and trends is vital for
marketers trying to reach new audiences. Technology and software are changing at such a high
rate that it seems almost impossible to keep up with trends. Products and services are evolving
and adapting to the online sphere. The web is constantly shifting, growing and changing. How
do savvy internet marketers cope with all this? They harness the power of the web and its
myriad tools for their own needs. They find unique and personal ways to interact with
customers online. They plan, organize, implement and measure complex internet-wide
strategies seamlessly. Most importantly, they never stop learning, growing and adapting
themselves.
The Internet connection
There are three parts to an Internet connection:
1. The client
2. The server
3. The connection linking them
This configuration is called the client/server model. In the client/server model, one program
requests a service from another program. The client makes a request; the server answers the
request with a service. The client and server communicate with each other by both physical
(hardware) and logical (software) links.
Client
A client consists of:
1. A desktop computer (hardware)
2. A program (software) that requests information from the server
The program usually resides on a personal computer. An example of such a program is a Web
browser. When you want to see a particular Web site, the browser handles your request.
Server
Typically a server is a remote device shared by many users. A server can be:
1. A machine that stores a particular resource you want to use, such as a database or Web
pages
2. A machine that performs specific functions such as sending and receiving e-mail
Servers are available commercially from companies including Sun Microsystems, Sequent, IBM,
Unisys, Dell, Compaq, and NCR. The figure below illustrates the relation between a client and
server connected through local and regional Internet Service Providers (ISPs).
In the next lesson, you will learn about the hardware and software you need to access the
Internet.
Internet Safety,
is the knowledge of maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the self-protection
from computer crime in general.
As the number of internet users continues to grow worldwide,[1] internets, governments and
organizations have expressed concerns about the safety of children using the Internet. Safer
Internet Day is celebrated worldwide in February to raise awareness about internet safety.[2] In
the UK the Get Safe Online campaign has received sponsorship from government
agency Serious Organized Crime Agency (SOCA) and major Internet companies such
as Microsoft and eBay.[3]
Information security
Sensitive information such as personal information and identity, passwords are often
associated with personal property (for example, bank accounts) and privacy and may present
security concerns if leaked. Unauthorized access and usage of private information may result in
consequence such as identity theft, as well as theft of property. Common causes of information
security breaches include:
Phishing
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to
obtain private information such as passwords, and credit card information, etc. through the
internet. Phishing often occurs through emails and instant messaging and may contain links to
websites that direct the user to enter their private information. These fake websites are often
designed to look identical to their legitimate counterparts to avoid suspicion from the user. [4]
Internet scams
Internet scams are schemes that deceive the user in various ways in attempt to take advantage
of them. Internet scams often aim to cheat the victim of personal property directly rather than
personal information through false promises, confidence tricks and more.
Malware
Malware, particularly spyware, is malicious software disguised as legitimate software designed
to collect and transmit private information, such as passwords, without the user's consent or
knowledge. They are often distributed through e-mail, software and files from unofficial
locations. Malware is one of the most prevalent security concerns as often it is impossible to
determine whether a file is infected, despite the source of the file.
Personal safety
The growth of the internet gave rise to many important services accessible to anyone with a
connection. One of these important services is digital communication. While this service
allowed us to communicate with others through the internet, this also allowed the
communication with malicious users. While malicious users often use the internet for personal
gain, this may not be limited to financial/material gain. This is especially a concern to parents
and children, as children are often targets of these malicious users. Common threats to
personal safety include:
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an
individual, a group of individuals, or an organization. It may include the making of false
accusations or statements of fact (as in defamation), monitoring, making threats, identity theft,
damage to data or equipment, the solicitation of minors for sex, or gathering information that
may be used to harass. According to a study conducted by Baum et al. (2009), the rate of
assault through electronic means such as e-mail or instant messaging was over one in four out
of all stalking victims in the study.[5]
Cyberbullying
Cyberbullying is the attack upon an individual or group through the use of electronic means
such as instant messaging, social media, e-mail and other forms of online communication with
the intent to abuse, intimidate, or overpower. In a 2012 study of over 11,925 students in the
United States, it was indicated that 23% of adolescents reported being a victim of cyber
bullying, 30% of which reported experiencing suicidal behavior.[6][7]
Online predation
Online predation is the act of engaging an underage minor into inappropriate sexual
relationships through the internet. Online predators may attempt to initiate and seduce minors
into relationships through the use of chat rooms or internet forums. In a sample of 216
incarcerated sexual offenders, the behavior characteristics that emerged were categorized into
three groups: A) manipulative - typically a child molester; B) Opportunist - typically a rapist and
C) Coercive being a mixture of both rapists and child molesters. [8]
Obscene/offensive content
Various websites on the internet contain material that some deem offensive, distasteful or
explicit, which may often be not of the user's liking. Such websites may include internet, shock
sites, hate speech or otherwise inflammatory content. Such content may manifest in many
ways, such as pop-up ads and unsuspecting links.[9]
Sextortion
Sextortion, especially via the use of webcams, is a concern, especially for those who
use webcams for flirting and cybersex.[10][11] Often this involves a cybercriminal posing as
someone else - such as an attractive person - initiating communication of a sexual nature with
the victim. The victim is then persuaded to undress in front of a webcam, and may also be
persuaded to engage in sexual behaviour, such as masturbation.[12] The video is recorded by the
cybercriminal, who then reveals their true intent and demands money or other services (such
as more explicit images of the victim, in cases of online predation), threatening to publicly
release the video and send it to family members and friends of the victim if they do not
comply.[12] A video highlighting the dangers of sextortion has been released by the National
Crime Agency[13] in the UK to educate people, especially given the fact that blackmail of a sexual
nature may cause humiliation to a sufficient extent to cause the victim to take their own
life,[11] in addition to other efforts to educate the public on the risks of sextortion. [10]
communications network
is a collection of terminal nodes,[1] links are connected so as to
enable telecommunication between the terminals.[1] The transmission links connect the nodes
together. The nodes use circuit switching, message switching or packet switching to pass the
signal through the correct links and nodes to reach the correct destination terminal.
Each terminal in the network usually has a unique address so messages or connections can be
routed to the correct recipients. The collection of addresses in the network is called the address
space.
Benefits of telecommunications and networking
Telecommunications can greatly increase and expand resources to all types of people. For
example, businesses need a greater telecommunications network if they plan to expand their
company. With Internet, computer, and telephone networks, businesses can allocate their
resources efficiently. These core types of networks will be discussed below:
Computer network: a computer network consists of computers and devices connected to one
another. Information can be transferred from one device to the next. For example, an office
filled with computers can share files together on each separate device. Computer networks can
range from a local network area to a wide area network. The difference between the types of
networks is the size. These types of computer networks work at certain speeds, also known as
broadband. The Internet network connects computers worldwide.
Internet network: access to the network allows users to use many resources. Over time the
Internet network will replace books. This will enable users to discover information almost
instantly and apply concepts to different situations. The Internet can be used for recreational,
governmental, educational, and other purposes. Businesses in particular use the Internet
network for research or to service customers and clients.
Telephone network: the telephone network connects people to one another. This network can
be used in a variety of ways. Many businesses use the telephone network to route calls and/or
service their customers. Some businesses use a telephone network on a greater scale through a
private branch exchange. It is a system where a specific business focuses on routing and
servicing calls for another business. Majority of the time, the telephone network is used around
the world for recreational purposes.
Network structure
In general, every telecommunications network conceptually consists of three parts, or planes
(so called because they can be thought of as being, and often are, separate overlay networks):
The data plane (also user plane, bearer plane, or forwarding plane) carries the network's
users' traffic, the actual payload.
The control plane carries control information (also known as signaling).
The management plane carries the operations and administration traffic required for
network management. The management plane is sometimes considered a part of the
control plane.
Example: the TCP/IP data network
The data network is used extensively throughout the world to connect individuals and
organizations. Data networks can be connected to allow users seamless access to resources
that are hosted outside of the particular provider they are connected to. The Internet is the
best example of many data networks from different organizations all operating under a
single address space.
Terminals attached to TCP/IP networks are addressed using IP addresses. There are different
types of IP address, but the most common is IP Version 4. Each unique address consists of 4
integers between 0 and 255, usually separated by dots when written down, e.g. 82.131.34.56.
TCP/IP are the fundamental protocols that provide the control and routing of messages across
the data network. There are many different network structures that TCP/IP can be used across
to efficiently route messages, for example:
wide area networks (WAN)
metropolitan area networks (MAN)
local area networks (LAN)
Internet area networks (IAN)
campus area networks (CAN)
virtual private networks (VPN)
There are three features that differentiate MANs from LANs or WANs:
1. The area of the network size is between LANs and WANs. The MAN will have a physical
area between 5 and 50 km in diameter.[3]
2. MANs do not generally belong to a single organization. The equipment that
interconnects the network, the links, and the MAN itself are often owned by an
association or a network provider that provides or leases the service to others.[3]
3. A MAN is a means for sharing resources at high speeds within the network. It often
provide connections to WAN networks for access to resources outside the scope of the
MAN.[3]
Optical transport network
Optical transport network (OTN) is a large complex network of server hubs at different
locations on ground, connected by optical fiber cable or optical network carrier, to transport
data across different nodes. The server hubs are also known as head-ends, nodes or simply,
sites. OTNs are the backbone of Internet Service Providers and are often daisy chained and
cross connected to provide network redundancy. Such a setup facilitates uninterrupted services
and fail-over capabilities during maintenance windows, equipment failure or in case of
accidents.
The devices used to transport data are known as network transport equipment. Some of the
widely used equipment are manufactured by
Alcatel Lucent - AL7510, AL7750
Nortel Networks Corp. (acquired by Ciena Corp.) - Optera Metro series - OM4500, OM6500
Fujitsu Ltd. - FlashWave series FW4500, FW7500, FW9500
The capacity of a network is mainly dependent on the type of signaling scheme employed on
transmitting and receiving end. In the earlier days, a single wavelength light beam was used to
transmit data, which limited the bandwidth to the maximum operating frequency of the
transmitting and receiving end equipment. With the application of wavelength division
multiplexing (WDM), the bandwidth of OTN has risen up to 100Gbit/s (OTU4 Signal), by
emitting light beams of different wavelengths. Lately, AT&T, Verizon, and Rogers
Communication have been able to employ these 100G "pipes" in their metro network. Large
field areas are mostly serviced by 40G pipes (OC192/STM-64).
A 40G pipe can carry 40 different channels as a result of Dense Wave Division Multiplexing
(DWDM) transmission. Each node in the network is able to access different channels, but is
mostly tuned to a few channels. The data from a channel can be dropped to the node or new
data can be added to the node using Re-configurable Optic Add Drop Mux (ROADM) that
uses Wavelength Selective Switching (WSS) to extract and infuse a configured frequency. This
eliminates the need to convert all the channels to electric signals, extract the required
channels, and convert the rest back to optical into the OTN. Thus ROADM systems are fast, less
expensive and can be configured to access any channel in the OTN pipe.
The extracted channels at a site are connected to local devices
through muxponder or transponder cards that can split or combine 40G channels to 4x 10G
channels or 8x 2.5G channels of optical fiber.
Exercise 1. True or false.
1.
References
www.google.com
www.wikipedia.com
www.youtube.com
www.tipsandtrics.com
www.seapearl.com