Introduction To Internet Notes

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

I. INTERNET AND ITS HISTORY C.

Future of the Internet


1. Internet connection will be permanent and
A. Defining and Describing the Internet
automatic.
Definition: Internet is the network of networks. 2. Augmented and virtual reality will play a major role.
Fun Fact: The Philippines is connected to the US-Japan 3. Machines might take over your job.
lines. These lines are called Internet backbones. Internet 4. Privacy will become commoditized.
users like us are connected to this backbone through 5. The ‘Internet of Things’ will fully mature.
local Internet Service Providers or ISPs. 6. Businesses and individuals will struggle to adapt to
the increasing rate of change.
How does a computer on the Internet communicate with 7. Earth won’t be the only planet with Internet access.
other computers? It is through Transmission Control
Protocol/Ip Protocol (TCP/IP) suite.
II. INTERNET RESOURCES

B. History of the Internet A. Email – E-mail or Electronic mail is a paperless


1969: Arpanet, first packet data network, was method of sending messages, notes or letters
constructed. from one person to another or even many
1970: A 4-node Arpanet was born people at the same time via Internet. E-mail is
1972: very fast compared to the normal post. E-mail
-The first e-mail program was created by Ray Tomlinson. messages usually take only few seconds to arrive
He used the @ sign. at their destination. One can send messages
-The ARPANET uses Network Control Protocol or NCP to anytime of the day or night, and, it will get
transfer data within the network. delivered immediately.
1983:
-Internet Activities Board (IAB) was created. B. Newsgroups – A newsgroup is a posted
-On January 1st, every machine connected to the discussion group on Usenet, a worldwide
ARPANET had to use TCP/IP. TCP/IP became the core network of newsgroups. Newsgroups are
Internet protocol and replaced NCP entirely. organized into subject hierarchies, with the first
-The University of Wisconsin created the Domain Name few letters of the newsgroup name indicating
System (DNS). the major subject category and sub-categories
1990: Tim Berners-Lee and CREN in Geneva implemented represented by a subtopic name.
a hypertext system to provide efficient information
access to the members of international high-energy C. Chatrooms - A chat room is a Web site, part of a
physics community, popularly known as WWW (World Web site, or part of an online service, that
Wide Web). provides a venue for communities of users with
1993: a common interest to communicate in real time.
-InterNIC created by National Science Foundation to
provide specific internet services – directory and D. VoIP (Voice over Internet Protocol) – allows you
database services (by AT&T), registration services (by to have telephone service through your internet
Network Solutions Inc.), and information services (by connection. Some services also let you do video
General Atomics/CERFnet). conferencing, such as Skype and Facebook Video
-Marc Andreessen, NCSA and the University of Illinois Calling. Many of these services are free or very
developed a graphical user interface to the WWW, called inexpensive, and some people use them as a
“Mosaic for X”. Mosaic was the first web browser. replacement for a landline, or just to save
-U.S. White House went on-line. minutes on their mobile phones.
1996: Internet hosting was 10 million and growing
1999: WAP, cellular applications, wireless devices were E. Games - Internet games are those that require a
invented/developed connection to the Internet to play, and is a type
of PC game. Computer games with multiplayer
Some Restrictions on Internet Use around the World capabilities can be referred to as Internet games,
as are online only games which you play in your
China: Requires users and ISPs to register with the police browser.
Germany: Cuts off access to some newsgroups carried on
CompuServe F. File Transfer Protocol – FTP is a method of
Saudi Arabia: Confines Internet access to universities transferring files from one computer to another.
and hospitals It means that FTP can upload and download
Singapore: Requires political and religious content information from the Internet or any kind of
providers to register with the state network. The protocol is a set of rules that
ensures a file is transmitted properly to the
receiving computer. A computer that stores files a) Do unto others, as you'd have others do unto you. Be
that can be retrieved using FTP is called an FTP polite and courteous at all times. Remember that you're
site or an FTP server. FTP is part of the not communicating with a computer screen, but with a
Transmission Control Protocol/Internet Protocol human being who has thoughts and feelings just like you.
(TCP/IP), the system that enables different types So, always think of the person on the receiving end of
of computers and networks on the Internet to your messages.
communicate.
b) Do not TYPE ALL IN-CAPITAL LETTERS for emphasis. IT
G. Telnet – Telnet is a way you can access someone LOOKS LIKE YOU ARE SHOUTING. If you need to
else’s computer, assuming they have given you emphasize a word, use asterisks, like *this* or lines, like
permission. (Such a computer is frequently _this_.
called a host computer). More technically, Telnet
is a user command and an underlying TCP/IP c) Remember that the written word is hard to interpret.
protocol for accessing remote computers. The When you speak to someone, that person can hear the
Web or HTTP protocol and the FTP protocol tone of your voice. If they can see you, they can take
allow you to request specific files from remote visual clues from your face and body to better
computers, but not to actually be logged on as a understand your meaning. All of this is lost in text, and
user of that computer. With Telnet, you log on as sometimes responses can come across as mean or rude,
a regular user with whatever privileges you may even when you did not intend them this way. This is the
have been granted to the specific application and reason some people use emoticons (visual clues) in their
data on that computer. e-mails, it saves a lot of confusion.

H. Gopher – Gopher is a system that enables d) Be careful not to use rude or bad language online.
computer users to find servers and files on the Many providers will terminate your account.
internet. Developed at the University of
Minnesota in 1991, Gopher presents menus and e) Don't break any laws. When you're on the net, follow
submenus users can select to specify their the same rules of behaviour that you would in real life.
search. Each Gopher server contains menus for Remember, if it is against the law in the real world, it is
local servers and files and is linked to other against the law in cyberspace.
Gopher servers; its menus change as the
resources available to the system change. There f) Be universal. Other users have different Web
are hundreds of Gopher servers around the browsers, different online services, different email
world. The system of all Gopher servers is called programs etc. So, don't, for example, send out e-mail
Gopherspace. with text formatting -- boldface, italics, indentations, etc.
-- because many other programs will not be able to read
I. World Wide Web - The World Wide Web is a the formatting and the recipients will receive your e-mail
virtual network of websites connected by filled with muddled codes.
hyperlinks (or "links"). Web sites are stored on
servers on the internet, so the World Wide Web g) Be brief whenever possible. No one wants to read
is a part of the internet. through a lot of unnecessary information. If you are
replying to an e-mail, try editing out unimportant
information and anything that is repeated.

III. NETIQUETTE
h) Always identify yourself. If your parents require you
Netiquette is etiquette on the Internet. Since the to use an online name instead of your real one, that's fine
Internet changes rapidly, its netiquette does too, but it's - use your online name consistently. Never send e-mail
still usually based on the Golden Rule. The need for a without including your name at the bottom of the e-mail.
sense of netiquette arises mostly when sending or Similarly, don't post forum messages without identifying
distributing e-mail, posting on Usenet groups, or yourself, this is seen as rude.
chatting. To some extent, the practice of netiquette
depends on understanding how email, the Usenet, i) Make a good impression. Remember that the written
chatting, or other aspects of the Internet actually work word is the only way you can represent yourself online,
or are practiced. so spelling and grammar count. If you are going to be
writing a large
amount of text for other people to see, make sure you
A. List out the Dos and Don’ts while communicating break it up using paragraphs, it will make it easier on the
online eye for those that will read it.
j) Be patient with newcomers. Once you have become  Fixed Internet- Home/Office – Fixed access is
an Internet expert, it is easy to forget that you started usually much faster and reliable than mobile and
out as a newbie too. Learning the rules of cyberspace is is used for connecting homes/offices.
much like learning a new language; it takes practice and The main Access mechanisms are:
includes making mistakes. So, if you come across  ADSL – over traditional Phone Lines
someone else's mistakes on the net, don't put them (most common).
down, just politely point them in the right direction for  Cable – (limited to cable TV areas)
guidance (send them a copy of these rules to get them  Fibre broadband – Currently being
started on their way!). Rolled out

 Mobile Internet – When travelling away from


B. FLAME AND SPAM
the fixed location mobile access is used. Mobile
o Avoid spamming Internet tends to be mainly a secondary access
• Spam is a term used on the Internet to refer to mechanism.
unsolicited e-mail and Usenet postings. These messages The main access methods are:
are usually intended to entice the recipient into buying a  Mobile broadband over 3G Network
product or service of some kind or into participating in a (common but slow) or 4G
get-rich-quick scheme.  Public/ Private Wii-FI (common)
• The senders (known as spammers) usually distribute
their messages to thousands or even millions of people  Cable Broadband – Cable connects you to the
at once, and they do not ask their recipients beforehand Internet through a coaxial cable usually using the
if they want to receive such mail. Therefore, you will same line as your TV service.
often hear these messages called bulk e-mail, unsolicited
e-mail, or junk e-mail.  Fibre or Fiber Broadband – Fibre broadband is a
type of broadband technology that offers a
o Avoid Flaming quicker speed and more reliable internet
• Abusive or insulting massages sent using the internet. connection than standard broadband. Its name is
• Do not send rude or offensive e-mails or postings. It's based on its plastic or glass cables, which allow
bad manners and can get seriously out of hand (flame for faster data transfer than copper wires.
wars). So, don't flame others and if you are flamed, do
not respond you will never win. If you are flamed in a  Mobile Broadband 3G, 4G and 5G – 3G, 4G and
forum or chat room, or if you receive hateful e-mail, let 5G networks are provided by mobile phone
your parents or teachers know. operators.
3G – Commercially available from 2001, the
defining aspect of 3G was increased data
transmission at a lower cost. This meant that
IV. ACCESSING THE INTERNET mobile phones had greater data capacity when
compared to older models and could support
A. Types of Access
more applications such as cameras and games.
 Indirect Access – This is most common method 4G – Unlike 3G, which facilitated the use of
used in home and office networks. The device wireless networks on smartphones, 4G allows for
e.g. computer connects to a network using extra technologies to connect with smartphones
Ethernet or WiFi and the network connects to and each other, such as LTE and WiMax.
the Internet using ADSL, cable or fibre. Standard 4G networks have speeds of 5 – 12
Mbps, which allows for greater download
 Direct Access – This is most common method speeds, making various applications easy to use.
used when traveling. The device e.g. smart 5G – The simple interpretation of 5G is that it will
phone connects directly to the Internet using be faster than 4G. 5G will be a lot faster than 4G,
3G/4G mobile networks or public Wi-Fi. with most estimates suggesting that it will be
between 1 – 10Gbps. This significant increase in
speed will allow customers to interact with
technology in a whole new way. Furthermore, 5G
could lead to the development of other
technological innovations, such as bringing
blockchain into the mainstream and enhancing
our current AI capabilities.

 Dial-Up Analogue Connection 56K – Dial-up


Internet access is a form of Internet access that
uses the facilities of the public switched
telephone network (PSTN) to establish a
connection to an Internet service provider (ISP)
by dialing a telephone number on a conventional
telephone line.
Speed: Up to 56Kbps

 ISDN - It is similar to dial-up. It establishes a


connection to your service provider when you
access the Internet.
-ISDN is not easy to install and troubleshoot and
requires you to have an ISDN box installed by
your telephone company.
-It was used by small businesses as in addition to
the ISDN line you can also use a normal
telephone line at the same time. This means you
can access the Internet as well as talking on the
telephone.

B. Internet Service Providers

An Internet service provider (ISP) is a company that


provides customers with Internet access. Data may be A hyperlink is a URL the hypertext directs the user to.
transmitted using several technologies, including dial- Clicking on them will take the user to a section in the
up, DSL, cable modem, wireless or dedicated high-speed same web page or a different web page. Hyperlinks can
interconnects. take various forms such as bold text, italic text, images,
etc. When hovering upon a hyperlink, it provides brief
Typically, ISPs also provide their customers with the information regarding what the hyperlink refers to.
ability to communicate with one another by providing
Internet email accounts, usually with numerous email
addresses at the customer’s discretion. Other services,
such as telephone and television services, may be
provided as well. The services and service combinations
may be unique to each ISP.

An Internet service provider is also known as an Internet


access provider (IAP).

Top 5 Internet Service Providers in the Philippines

1. PLDT

2. Globe

3. Converge ICT

4. SkyCable B. Browsers

5. Eastern Communications 1. Mozilla Firefox

2. Google Chrome

3. Microsoft Edge

V. BROWSING THE WEB 4. Safari

A. Hypertext and Hyperlinks 5. TOR Browser

C. Uniform Resource Locator

Hypertext refers to text elements that contain links to -URL is a location or address identifying where
access blocks of text in the same document or some documents can be found on the Internet.
other document. -Tim Berners-Lee and the Internet Engineering Task
Force working group is credited with developing the URL
in 1994.
All URLs are presented in the following order:

 Scheme name
 Colon and two slashes
 Location of the server
 The port (optional) and the location of the
resource on the server
 Fragment identifier (optional)

So, the format will look like this:

scheme://location:port/file-on-
E. Cookies
server.htm?querystring=1
-A cookie (called an Internet or Web cookie) is the term
This looks more complex that it is. The most common
given to describe a type of message that is given to a web
schemes (protocols) are HTTP and HTTPS, which any
browser by a web server. The main purpose of a cookie
WWW user will recognize. The location of the server is
is to identify users and possibly prepare customized Web
generally a domain name. Given this, the following URLs
pages or to save site login information for you.
are much simpler to understand:
-When you enter a website using cookies, you may be
http://www.google.com/default.htm
asked to fill out a form providing personal information;
https://www.google.com/default.htm like your name, email address, and interests. This
information is packaged into a cookie and sent to your
Both these URLs indicate that there is a file named
Web browser, which then stores the information for later
default.htm on a server with the address of
use. The next time you go to the same Web site, your
"google.com". One uses regular HTTP, while the other
browser will send the cookie to the Web server. The
uses a secure version of this scheme.
message is sent back to the server each time the browser
Two common elements of confusion about URLs: requests a page from the server.

The "www" is not actually part of the technical protocol. -A web server has no memory so the hosted website you
Websites just started using this to indicate the user is are visiting transfers a cookie file of the browser on your
using the World Wide Web. This is why if you go to computer's hard disk so that the site can remember who
http://google.com, it redirects to you are and your preferences. This message exchange
http://www.google.com. allows the Web server to use this information to present
you with customized Web pages. So, for example,
Most users access the Internet via a Web browser, which
instead of seeing just a generic welcome page you might
inserts port 80 on HTTP connections behind the scenes.
see a welcome page with your name on it.
This is why if you go to http://www.google.com:80, you
will see the same website as if there were no port Types of Cookies
number.
Session Cookie - Also called a transient cookie, a cookie
that is erased when you close the Web browser. The
session cookie is stored in temporary memory and is not
Finally, the following URL demonstrates a fragment
retained after the browser is closed. Session cookies do
identifier, more commonly known as a query string:
not collect information from your computer. They
http://www.google.com/some-page?search=hello typically will store information in the form of a session
identification that does not personally identify the user.
This is saying that to use the HTTP protocol to send a
request to the website at google.com (over port 80) and Persistent Cookie - Also called a permanent cookie, or a
to ask for "some-page" and send in the search variable stored cookie, a cookie that is stored on your hard drive
"hello". This is why you'll sometimes see an extremely until it expires (persistent cookies are set with expiration
long URL as many variables are being sent to the Web dates) or until you delete the cookie. Persistent cookies
server in more interactive Web applications. are used to collect identifying information about the
user, such as Web surfing behavior or user preferences
D. Favorites and Bookmarks for a specific Web site.
-A "favorite" or "bookmark" is a website address that you What Information does a Cookie store?
manually save to your Web browser of choice for easy
retrieval. Cookies normally do not compromise security, but there
is a growing trend of malicious cookies. These types of
cookies can be used to store and track your activity
online. Cookies that watch your online activity are called
malicious or tracking cookies. These are the bad cookies
to watch for, because they track you and your surfing engines have a lot in common but may have some
habits, over time, to build a profile of your interests. differing features (algorithms) - types of pages or files it
Once that profile contains enough information there is a can target, how the engine searches the index for the
good chance that your information can be sold to an entered keywords, and ranking systems to determine the
advertising company who then uses this profile order of the results based on relevance.
information to target you with interest specific adverts.
Popular Search Engines
Many antivirus programs today will flag suspicious
spyware or adware cookies when scanning your system 1. Google
for viruses.
2. Bing
Clearing Cookies (In Firefox)
3. Yahoo

4. Wolframalpha

5. DuckDuckGo

Subject Directories

-Subject directories are human driven rather than


automated. Based on standard selections criteria,
volunteers or staff review and select content. Usually
web sites are described, tagged or annotated. Subject
directories can be browsed or searched.

DMOZ – Open Directory Project - http://dmoztools.net/

RefSeek Reference Directory -


https://www.refseek.com/directory/

Virtual Reference Shelf (Library of Congress) -


http://www.loc.gov/rr/askalib/virtualref.html

Internet Sites by Subject -


http://mclennan.libguides.com/internet-sites

VI. SEARCHING THE NET

A. Search Techniques

https://www.youtube.com/watch?v=erZ3IyBCXdY

B. Search Tools (Search Engines and Directories)

Search Engines

-Web or Internet search engines look for entered


keywords in a web site index. A web crawler finds
information to put into the index file. Most search
Introduction to the Internet Sources
I. Internet and its history Web Applications Programming Language by Marmelo
V. Abante
A. Defining and describing the Internet
Future of the
B. Brief history (Video) Internet.https://www.forbes.com/sites/jaysondemers/2
016/04/18/7-predictions-for-how-the-internet-will-
C. Discussing the future of the Internet change-over-the-next-15-years/#6311b2cc22e0
II. Internet Resources VoIP.http://www.just.edu.jo/~mqais/cis99/PDF/Interne
t.pdf
A. Email
B. Newsgroups Netiquette.https://www.scribd.com/document/163387
573/Module-3-Netiquette-Notes#download
C. Chatrooms
D. Conferencing Internet Access.
E. Games https://stevessmarthomeguide.com/connect-methods/
F. File Transfer Protocol 3G, 4G, 5G. https://new.whatmobile.net/difference-3g-
G. Telnet 4g-5g/
H. Gopher Top 5 ISP in the
I. World Wide Web Phil.https://www.gadgetcouncil.com/internet-service-
providers-in-the-philippines/
III. Netiquette
Hypertext and Hyperlink.https://pediaa.com/difference-
A. List out the Dos and Don’ts while between-hypertext-and-hyperlink/
communicating online
URL.https://www.techopedia.com/definition/1352/unif
B. Flame and Spam
orm-resource-locator-url
IV. Accessing the Internet Bookmarks and
Favorites.https://www.techwalla.com/articles/what-is-
A. Types of Access
the-difference-between-favorites-bookmarks
B. Internet Services Providers
Cookies.https://www.webopedia.com/DidYouKnow/Int
V. Browsing the Web ernet/all_about_cookies.asp
A. Hypertext and hyperlinks Search
Techniques.https://www.youtube.com/watch?v=erZ3Iy
B. Browsers BCXdY&t=542s
C. Uniform resource locator Search Engines and
Directories.https://mclennan.libguides.com/searchingIn
D. Favorites and Bookmarks ternet/engines
E. Cookies
VI. Searching the Net
A. Search Techniques (Video)
B. Search Tools (Search Engines and
Directories)

You might also like