Académique Documents
Professionnel Documents
Culture Documents
INTRODUCTION
1
History of the Internet and World
Wide Web
ARPANET
Implemented in late 1960’s by ARPA (Advanced Research
2
History of the Internet and World
Wide Web (Cont.)
ARPA’s goals
Allow multiple users to send and receive info at same time
sequencing info
Greatly reduced transmission costs of dedicated
communications lines
Network designed to be operated without centralized control
packets
3
History of the Internet and World
Wide Web (Cont.)
Transmission Control Protocol (TCP)
Name of protocols for communicating over ARPAnet.
Ensured that messages were properly routed and that
they arrived intact.
Organizations implemented own networks
Used both for intra-organization and communication.
4
History of the Internet and World
Wide Web (Cont.)
Huge variety of networking hardware and software appeared
ARPA achieved inter-communication between all platforms
The Internet
Limited to universities and research institutions
purposes
5
History of the Internet and World
Wide Web (Cont.)
Internet traffic grew
Businesses spent heavily to improve Internet
software suppliers
Resulted in massive bandwidth increase and plummeting costs
Company many credit with initiating the explosive Internet of late 1990s.
6
World Wide Web Consortium (W3C)
Standardization
W3C Recommendations:
7
Services in the Internet
FTP
E-mail
Telnet
Chat
Bulletin Board System
8
File Transfer Protocol (FTP)
FTP site can be browsed as though they were files on the local computer
Files can be downloaded
FTP site may require login
FTP can also be used on the Internet for
Uploading files
Downloading files
File-managing tasks
9
Fig.1.1| FTP site access.
10
Introduction to the Internet
Explorer 7
Internet is an essential medium for worldwide
communication
Web browsers
Hyperlinks
Visual elements on web pages that when clicked, load a specified web document
Images and text
Can reference other web pages, e-mail addresses, files and more
Download files
Tabbed Browsing
Allows the user to browse multiple pages without many windows
Page Organization
Using the History Feature
List of previously visited URLs in chronological order
12
Internet Explorer 7 Features (Cont.)
AutoComplete
URLs from the history can be displayed in a drop-down list when a user types a
URL into the Address bar
Off-Line Browsing
Web pages can be saved directly to the computer’s hard drive for off-line
browsing
Not connected to the Internet
Downloads
Files from the Internet may be copied to a computer’s hard drive
Applications
Plug-ins
Extensions
13
Fig. 1.3| The History menu in Internet Explorer 7.
14
Fig. 1.4 | AutoComplete suggests possible URLs when given a partial address. 15
Fig. 1.5 | Saving a picture from a website.
16
Customizing Browser Settings
Browser settings
Determine how sites are displayed
Privacy settings for IE7 can be set under the Privacy tab. In IE7 there are six
levels of privacy
Many levels lenient to strict
Security options
Specify how much information you want to hide from unfamiliar sites
History options
Web page cache
17
Fig. 1.6 | Internet Options in Internet Explorer 7. 18
Searching the Internet
Internet is wealth of information
Search engines help locate more specific information on a given topic
Google (www.google.com)
Yahoo! (www.yahoo.com)
MSN (www.msn.com)
AltaVista (www.altavista.com)
Ask.com (www.ask.com)
MetaCrawler (www.metacrawler.com)
19
Fig. 1.7 | Searching the Internet with Internet Explorer 7. 20
Keeping Track of Your Favorite Sites
folders
Most browsers have their own version of Favorites or
Bookmarks.
21
Fig. 1.8 | The Favorites menu helps organize frequently visited websites in Internet Explorer 7. 22
Online Help
23
Fig. 1.9 | Internet Explorer 7 Help dialog. 24
E-mail
Email is e-mail, which stands for 'electronic mail'.
This means that you don't have to
hand-write or print out a 'hard copy' of your
25
Email is:
Typed into a message window on the computer screen
A message which includes the email address of the person you
are 'sending to'
A message which also includes your own 'reply-to' email
address (if you ever want anyone to write back!)
Sent and received through your modem connection to your
Internet Service Provider, whose mail server computer is in
turn connected to the rest of the Internet
Incredibly cheap: you pay for your local phone call to connect to
your local Internet Service Provider, then you pay your ISP the
agreed amount per hour while you are connected ... email
messages are usually very small files (not cluttered up with
formatting junk, pictures or other files stuck onto them) so you
can send or receive an email message in seconds!
26
Anatomy of an Email Address
An email address is required to send and receive email.
Email addresses are different from "snail mail“ addresses.
They usually consist of three parts: a user name, an "at"
symbol (@), and a domain name.
mfariz@gcflearnfree.org
28
Email Clients
To send and receive email, both the sender and recipient
must have the right tools: an Internet connection, an email
client, and an email address.
An email client (sometimes referred to as a composer) is
software that runs on a personal computer, and relies on
an Internet connection to perform some of its operations.
Email clients work with any ISP (Internet Service Provider)
that uses standard Internet email protocols. These
protocols make it possible for people using different email
client software to communicate with one another. For
example, if I use Microsoft OutlookTM, I can send and
receive email with someone who uses QUALCOMM
EudoraTM.
29
Email Clients are Different
Most email client software allows you to:
33
File Transfer Protocol (FTP)
Allows a user to copy files to/from remote
hosts
Client program connects to FTP server
… provides a login id and password
… allows the user to explore the directories
… and download and upload files with the server
34
FTP Objectives
• promote sharing of files
• encourage indirect use of remote computers
• shield user from variations in file storage
• transfer data reliably and efficiently
• “FTP, although usable directly by a user at a
terminal, is designed mainly for use by
programs”
35
Example Commands
Authentication
USER: specify the user name to log in as
now required.
4xx: transient negative completion reply
The command failed and should be retried later.
39
What is an FTP Client?
An FTP Client is software that is designed to
transfer files back-and-forth between two
computers over the Internet.
40
What is anonymous FTP?
41
FTP Data Transfer
Separate data connection
To send lists of files (LIST)
control
data 42
Creating the Data Connection
Client acts like a server
Creates a socket
Listens on socket
control
socket 43
Creating Data Connection
But, the server doesn’t know the port number
So after listening, client tells it to the server
Using the PORT command on the control connection
44
Creating Data Connection
Then, the server initiates the data connection
Connects to the socket on the client machine
… and the client accepts to complete the connection
Data now flows along second connection; first connection remains open
for more commands/replies
45
Telnet
TELNET is a protocol that provides “a general, bi-
directional, eight-bit byte oriented communications
facility”.
telnet is a program that supports the TELNET
protocol over TCP.
Many application protocols are built upon the
TELNET protocol
Telnet is a very useful protocol when properly used
but lacks graphical user interface.
46
Advantages of TELNET over FTP
47
The TELNET Protocol
TCP connection
Data and control over the same connection.
Network Virtual Terminal
Negotiated options
48
Network Virtual Terminal
The Network Virtual Terminal (NVT) is a representation of a
basic terminal and provides a standard that the computers
on either end of a Telnet connection are assumed to follow.
It defines how data and commands are sent across the
network.
Thus, NVT allows interoperability between Telnet and a
variety of heterogeneous computers and operating systems.
It consists of a virtual keyboard that generates user-
specified characters and a printer that displays specific
characters.
Clients and servers can map their local devices to the
characteristics and handling conventions of an NVT and can
assume that other servers and clients are doing the same
49
Network Virtual Terminal
50
Negotiated Options
All NVTs support a minimal set of
capabilities.
Some terminals have more capabilities
than the minimal set.
The 2 endpoints negotiate a set of
mutually acceptable options (character
set, echo mode, etc).
51
Control Functions
TELNET includes support for a series of
control functions commonly supported
by servers.
This provides a uniform mechanism for
communication of (the supported)
control functions.
52
Control Functions
Interrupt Process (IP)
– suspend/abort process.
Abort Output (AO)
– process can complete, but send no more
output to user’s terminal.
Are You There (AYT)
– check to see if system is still running.
53
Search engines or Directories
Most people are primarily interested in
tools for finding information on the World
Wide Web.
Originally there were two kinds of search
services on the Web:
Directories
Engines
54
Search directories
Search directories are hierarchical databases with
references to websites.
58
Specialized search engines
Specialized search engines focus on one type of information.
Some of them just presents sub-sets of what is found in the
regular search engine results, while others may provide
information not found there.
There are especially two kinds of specialized search engines you
might want to take a look at: news search engines and blog
search engines.
The reason for this is that news sites and blog search engines
will rank fresh information much higher than the regular search
engines.
News and blog articles form the most popular sites and blogs
may appear in these search engines less than an hour after they
have been published.
So, if you are looking for up to date information on what is
happening right now, try search engines like Google News and
Google Blog Search. 59