Vous êtes sur la page 1sur 30

Chapter 8

Internet

1
Internet
 It is a huge collection of computer networks

 It is of a network of networks.

 It is Widespread information exchange tool


 Each computer in the internet is given an address

2
How does the internet works?

 To make internet functional it requires


 Connectivity
 Common language (protocol)
 Connectivity
 Connectivity is the physical connection
between devices on the network
 Two Types of connectivity
 Dialup connection
 Broadband connection

3
Dialup connection
 It is made by dialing into an Internet service
provider's (ISP) computer

 Components of Dialup connection

 An account with an ISP

 A telephone connection

 Modem (external/internal)

 Communication software
4
Dialup connection con…

− Advantage
− It is flexible
− Less monthly payment
− Disadvantages
− It is not fast

5
Broad band connection

 Broad band connection uses direct connection to ISP

 Uses fixed cable or a dedicated phone line to the ISP.

 Advantages

 Faster

 Fixed monthly payment

 Disadvantages

 Expensive

 Not flexible
6
Protocol
− Protocol is common language among devices
to have a common understanding
− It is a formal rule governing the exchange of
information between devices so as to provide
reliable and efficient transfer of information
− Protocol tells how message is addressed and
govern network traffic flow by controlling
priority, routing and sequencing of messages

7
Common protocols
 TCP:
 Divides the data into packets
 Attaches packets with necessary information
to reassemble the data and check for errors.
 IP:
 It labels all the packets with a header
containing the address of the destination and
sends them on their way.

8
Internet services
− Common internet services are:
− www (World wide web)
− E-mail (Electronic mail)
− FTP(File Transport protocol)
− Telnet
− Internet relay chat(IRC)
− Internet telephony
− Video conference

9
www
 Vast collection of document stored on internet
 Can contains video, sound, graphics and text
documents
 It uses HTML to design a web document
 The way the world accessing information on the
internet is as:
 The web is not linear
 (you can use any link)
 The web is rich media internet :
 (Video, audio, text documents)
 The web is interactive

10
www internet terms
− Web server: is a program and computer which
responds to the request from the web browser
− Webpage : A single page of a web in the internet
− Web browser: is a program allow user to display
and interact with hypertext documents
− Homepage: the first hypertext document to be
shown when a user follows a link to the web server
− HTTP : The protocol used by web to transfer
hypertext documents and other internet resources

11
Uniform Resource Locator(URL)

 Tells the user exactly where the resource is located on


the internet
 It refers to the complete address of resource on the
computer
 Example:
http://www.hu.edu.et

protocol Host Domain

Question:
What is the difference b/n web server and web browser?
12
~ http://www.Google.com.et (URL)
~ http ~ protocol
~ www ~ Host
~ Google ~ domain
Purpose Country

.org ---organizational .et Ethiopian

.edu --- educational .uk United Kingdom

.net --- network


.com --- commercial
.gov --- governmental

13
How to surf the web with a Browser

− We use common browsers such as:


− Mozilla Firefox
− Internet Explorer
− Google Chrome

14
E-Mail
− Using e-mail, a user can send and receive mail

 Transmit text, messages, audio and video clips.

 Allows users to send a message to just one user or a group of users

 Possible to attach Large documents

 Users can read, print, forward, answer or delete a message.

 E-mail is much cheaper and faster in comparison to other


communication services.

 Each E-mail user is assigned a unique address, which is used by the e-


mail network to deliver the message.

15
Basic e-mail terms
 From:- sender information
 Sent : date of sending
 To: To whom the message may concern
 CC: Carbon copy
 Replay:
 Forward:
 Inbox: incoming mail
 Draft: unfinished e-mail
 Trash : deleted messages storage folder
 Sent: outgoing mail

16
FTP (File Transfer Protocol):

− FTP allows to transfer data between


computers on the Internet.
− FTP can send and receive data
− The FTP allow to download files from
computers connected to the Internet.
− Telnet :
− Telnet is a program that allows you to log into
computers on the Internet
− Remote computer accessing

17
Telnet con…

− There is no graphics in Telnet sessions, just text


− There has to be known IP address
− To logon remotely you need to have privilege

− Usenet:
− Using Usenet millions of computer users exchange
information on a vast range of topics like e-mail
− Usenet differ from e-mail because of :
− Usenet messages are stored on central computers,
− And users must connect to these computers to read
or download the messages posted to these groups
− In e-mail it is distributed among all mail box
18
Chat & Instant Messaging

 Chat programs allow users on the Internet to


communicate with each other by typing in real time.

 Search Engine:
 Search engines respond to a user entry, or query, by
searching the lists and displaying a list of documents
that match the search query.

 Some search engines Examples: Google, Mama,


Yahoo etc.

19
Malware(Computer Virus)

20
What is Malware?
− Mal-ware is a combined words of malicious
and software
− It is software designed to damage a computer
system without the owner's agreement
− Malware includes computer
− viruses,
− worms,
− Trojan horses
− spyware,
− adware, and other malicious and unwanted
software.
21
Phases of Malware
 Dormancy phase –
 This is intended to create a sense of trust in the user.
 Propagation phase –
 Malwares duplicates itself without making damage.
 Triggering phase –
 The malware is triggered by some action such as:
 Date or a particular number of replications,
 A certain sequence of keystroke.
 Damaging phase – it is of full destroying phase
 Destroying all the data in the computer
 Files cannot be stored on it,
 transposing characters in a data file
 displaying a greeting message on the screen. Etc
22
Common Types of Malware
− There are of Three common types of malware
− Virus
− Worm
− Trojan horse

23
Virus
− A computer virus attaches itself to a program or
file and spread from one computer to another,
leaving infections as it travels.
− It attached to an executable file,
− virus may exist on your computer but it actually
cannot infect your computer unless you run or
open the malicious program.
− Virus cannot be spread without a human action,

24
Virus Category
 Macro Viruses:
 Attacks Application SW( Ms. Word and excel)
 Network virus
 Logic Bomb
 Compassion virus
 .COM and .EXD
 Boot sector Virus
 Destroy boot sector of hard disk
 It widespread through floppy disk (Uncommon today )
 Multipartite Viruses
 It spread through infected media
 usually hide in the memory.
 Gradually, the virus moves to the boot sector of the hard
drive 25
Worm
− Worms spread from computer to computer,
− Unlike a virus, it has the capability to travel without
any human action.
− It has a capability to replicate itself on your system,
− Worm consumes too much system memory as a
result , Web servers, network servers and
individual computers will stop responding.
− It Allow malicious users to control your
computer remotely.
− Worm make your computer too slow

26
Trojan horse
 At the First glance will appear to be useful software
but will actually do damage once installed or run on
your computer.
 Changing your desktop, adding silly active desktop
icons or they can cause serious damage by deleting
files and destroying information on your system.
 Trojans are also known to create a backdoor on your
computer that gives malicious users access to your
system, possibly allowing confidential or personal
information to be compromised.
 Unlike viruses and worms, Trojans do not reproduce
by infecting other files nor do they self-replicate.

27
Symptoms of an infected computer

− Runs consistently slower than normal


− Stops responding or locks up often
− Crashes and restarts every few minutes
− Restarts on its own and then fails to run normally
− Applications don't work properly
− Disks or disk drives are inaccessible
− Printing doesn't work correctly
− You see unusual error messages
− You see distorted menus and dialog boxes

28
How to Protect your computer
 Use latest updates antivirus .
 Use an Internet firewall (Note: Windows XP with SP2 has
a firewall already built-in and active). A firewall is a system
that prevents unauthorized use and access to your computer.
A firewall can be either hardware or software.
 Use standard antivirus software and keep it current.
 Never open an e-mail attachment from someone you
don't know.
 Avoid opening an e-mail attachment from someone you
know, unless you know exactly what the attachment is. The
sender may be unaware that it contains a virus.
 If you use Microsoft Office applications, it's a good idea to
keep them updated too.
29
10Q!!!

30

Vous aimerez peut-être aussi