Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 48

Introduction to the

Internet and Web


Learning Objectives
 To know the History of Internet and WWW
 To determine the deference of Web and Internet
 To know the Structure of a Uniform Resource Locators
 To know how to properly and responsible use of the
Computer and the internet
 To be aware of the bad things that may happen in using
the internet
 To be knowledgeable in proper responses in computer
problems.
Internet

 Itis the largest network in the world that


connects hundreds of thousands of individual
networks all over the world.
 The popular term for the Internet is the
“information highway”.
 Rather than moving through geographical
space, it moves your ideas and information
through cyberspace – the space of electronic
movement of ideas and information.
Internet

 No one owns it
 It has no formal management organization.
 As it was originally developed by the
Department of defense, this lack of
centralization made it less vulnerable to
wartime or terrorist attacks.
 To access the Internet, an existing network
need to pay a small registration fee and agree
to certain standards based on the TCP/IP
(Transmission Control Protocol/Internet
Protocol) .
The uses of the Internet

 Send e-mail messages.


 Send (upload) or receive (down load) files between
computers.
 Participate in discussion groups, such as mailing lists
and newsgroups.
 Surfing the web.
What is Web?
 The Web (World Wide Web) consists of
information organized into Web pages
containing text and graphic images.
 Itcontains hypertext links, or highlighted
keywords and images that lead to related
information.
A collection of linked Web pages that has a
common theme or focus is called a Web site.
 The main page that all of the pages on a
particular Web site are organized around and
link back to is called the site’s home page.
How to access the Internet?
 Many schools and businesses have direct access to
the Internet using special high-speed communication
lines and equipment.
 Students and employees can access through the
organization’s local area networks (LAN) or through
their own personal computers.
 Another way to access the Internet is through
Internet Service Provider (ISP).
How to access the Internet?
 To access the Internet, an existing network
need to pay a small registration fee and
agree to certain standards based on the
TCP/IP (Transmission Control
Protocol/Internet Protocol) reference model.
 Each organization pays for its own networks
and its own telephone bills, but those costs
usually exist independent of the internet.
 The regional Internet companies route and
forward all traffic, and the cost is still only
that of a local telephone call.
Internet Service Provider (ISP)

 A commercial organization with permanent


connection to the Internet that sells temporary
connections to subscribers.
 Examples:
 Prodigy, America Online, Microsoft network, AT&T
Networks.
How to access the Web?

 Once you have your Internet connection, then you need


special software called a browser to access the Web.
 Web browsers are used to connect you to remote
computers, open and transfer files, display text and
images.
 Web browsers are specialized programs.
 Examples of Web browser: Netscape Navigator
(Navigator) and Internet Explorer.
Client/Server Structure of the Web

 Web is a collection of files that reside on


computers, called Web servers, that are located all
over the world and are connected to each other
through the Internet.
 When you use your Internet connection to become
part of the Web, your computer becomes a Web
client in a worldwide client/server network.
 A Web browser is the software that you run on your
computer to make it work as a web client.
Hypertext Markup Language (HTML)

 The public files on the web servers are ordinary text


files, much like the files used by word-processing
software.
 To allow Web browser software to read them, the text
must be formatted according to a generally accepted
standard.
 The standard used on the web is Hypertext markup
language (HTML).
Hypertext Markup Language (HTML)

 HTML uses codes, or tags, to tell the Web browser


software how to display the text contained in the
document.
 For example, a Web browser reading the following
line of text:
<B> A Review of the Book<I>Wind Instruments of
the 18th Century</I></B>
 recognizes the <B> and </B> tags as instructions to
display the entire line of text in bold and the <I>
and </I> tags as instructions to display the text
enclosed by those tags in italics.
Addresses on the Web:IP Addressing
 Each computer on the internet does have a unique
identification number, called an IP (Internet Protocol)
address.
 The IP addressing system currently in use on the Internet
uses a four-part number.
 Each part of the address is a number ranging from 0 to
255, and each part is separated from the previous part
by period,
 For example, 106.29.242.17
IP Addressing
 The combination of the four IP address parts provides 4.2
billion possible addresses (256 x 256 x 256 x 256).
 This number seemed adequate until 1998.
 Members of various Internet task forces are working to
develop an alternate addressing system that will
accommodate the projected growth.
 However, all of their working solutions require extensive
hardware and software changes throughout the Internet.
Domain Name Addressing
 Most web browsers do not use the IP address t
locate Web sites and individual pages.
 They use domain name addressing.
 A domain name is a unique name associated with
a specific IP address by a program that runs on
an Internet host computer.
 This program, which coordinates the IP addresses
and domain names for all computers attached to
it, is called DNS (Domain Name System )
software.
 The host computer that runs this software is
called a domain name server.
Domain Name Addressing
 Domain names can include any number of parts separated
by periods, however most domain names currently in use
have only three or four parts.
 Domain names follow hierarchical model that you can
follow from top to bottom if you read the name from the
right to the left.
 For example, the domain name gsb.uchicago.edu is the
computer connected to the Internet at the Graduate
School of Business (gsb), which is an academic unit of the
University of Chicago (uchicago), which is an educational
institution (edu).
 No other computer on the Internet has the same domain
name.
Uniform Resource Locators
 The IP address and the domain name each identify a
particular computer on the Internet.
 However, they do not indicate where a Web page’s HTML
document resides on that computer.
 To identify a Web pages exact location, Web browsers rely on
Uniform Resource Locator (URL).
 URL is a four-part addressing scheme that tells the Web
browser:
 What transfer protocol to use for transporting the file
 The domain name of the computer on which the file resides
 The pathname of the folder or directory on the computer on
which the file resides
 The name of the file
Structure of a Uniform Resource Locators

pathname
protocol

http://www.chicagosymphony.org/civicconcerts/index.htm

Domain name filename

http => Hypertext Transfer Protocol


HTTP
 The transfer protocol is the set of
rules that the computers use to move
files from one computer to another on
the Internet.
 The most common transfer protocol
used on the Internet is the Hypertext
Transfer Protocol (HTTP).
 Two other protocols that you can use
on the Internet are the File Transfer
Protocol (FTP) and the Telnet Protocol
How to find information on the Web?
A number of search tools have been developed
and available to you on certain Web sites that
provide search services to help you find
information.
 Examples:
 Yahoo  www.yahoo.com
 Excite  www.excite.com
 Lycos  www.lycos.com
 AltaVista  www/alta-vista.com
 MSN WebSearch  www.search.msn.com
How to find information on the Web?
 You can find information by two basic means.
 Search by Topic and Search by keywords.
 Some search services offer both methods, others
only one.
 Yahoo offers both.
 Search by Topic
You can navigate through topic lists
 Search by keywords
You can navigate by entering a keyword or
phase into a search text box.
History of Internet
Content

 Introduction
 Creation of ARPANET
 From ARPANET to Internet
 From Internet to the World Wide Web
 Development of the World Wide Web
 Questions
Creation of ARPANET (1)

 1957 – USSR launched Sputnik I


United States were shocked
 Advanced Research Projects
Agency
 Thechnological think-tank
 Space, ballistic missiles and nuclear
test monitoring
 Communication between
operational base and subcontracters
Creation of ARPANET (2)

 1962 – computer research program


 Leaded by John Licklider (MIT)
 Leonard Kleinrock published his first paper on
packet-switching theory
 1965 – first “wide area network” created
 Connection between Berkeley and MIT
Creation of ARPANET (3)

 1967– plans for ARPANET


were published
 MIT – NPL (UK) – RAND
 1969– Interface Message
Processor (IMP)
4 computers (UCLA, SRI,
UCSB and UTAH)
 1971– 23 host computers
(15 nodes)
From ARPANET to Internet (1)

 1972 – ARPANET went ‘public’


 ICCC

 First program for person-to-person communication


(e-mail)
 1973
 75% of all ARPANET traffic is e-mail
 First
international connection (University College of
London)
From ARPANET to Internet (2)

 1974 – TCP/IP
 Each network should work on its own
 Within each network there would be a ‘gateway’
 Packages would be routed through the fastest
available route

 Large mainframe computers


 Several years of modification and redesign
From ARPANET to Internet (3)

 1974/1982 – Networks launched


 Telenet – first commercial version of ARPANET
 MFENet – researchers into Magnetic Fusion Energy
 HEPNet – researchers into High Energy Physics
 SPAN – space physicists
 Usenet – open system focusing on e-mail and
newsgroups
 Bitnet – university scientists using IBM computers
 CSNet – Computer Scientists in universities, industry
and government
 Eunet – European version of the Unix network
 EARN – European version of Bitnet
From ARPANET to Internet (4)

 1974/1982
 Very chaotic
 Different competing techniques and protocols
 ARPANET is still the backbone

 1982– The internet is born using the TCP/IP


standard
From Internet to WWW (1)

 System expands
 Advances in computer capacities and speeds
 Introduction of glass-fibre cables
 Problems created by its own success
 More computers are linked (1984 – 1000 hosts)
 Large volume of traffic (success of e-mail)

 1984 – Introduction DNS


From Internet to WWW (2)

 Use of internet throughout the higher educational


system
 British government – Joint Academic Network
 US National Science Foundation – NSFNet

 NSFNet
 Use of TCP/IP
 Federal Agencies share cost of infrastructures
 NSFNet shared infrastructure
 Support behind the ‘Internet Activities Board’
 NSFNet provided the ‘backbone’
From Internet to WWW (3)

 NSFNet
 brokethe capacity bottleneck
 encouraged a surge in Internet use
 1984 – 1,000 hosts
 1986 – 5,000 hosts
 1987 – 28,000 hosts
 1989 – 100,000 hosts
 1990 – 300,000 hosts
 encouraged the development of private Internet
providers

 Commercial users
From Internet to WWW (4)

 1990 – ARPANET was wound up


 1990 – first search-engine (Archie)
 1991 – NSF removed restrictions on private
access
 “Information superhighway” project
The World Wide Web (1)

 1989 – WWW concept


by Tim Berners-Lee

 1990 – first browser/editor program


The World Wide Web (2)

 National Center for SuperComputing


Applications launched Mosaic X
 Commercial websites began their proliferation
 Followed by local shool/club/family sites
 The web exploded
 1994 – 3,2 million hosts and 3,000 websites
 1995 – 6,4 million hosts and 25,000 websites
 1997 – 19,5 million hosts and 1,2 million websites
 January 2001 – 110 million hosts and 30 million
websites
The World Wide Web (3)
The World Wide Web (4)

 Some facts
 1994 – Hotmail starts web based email
 1994 – World Wide Web Consortium (W3C) was founded
 1995 – JAVA source code was released
 1996 – Mirabilis (Israel) starts ICQ
 1998 – Google is founded
The World Wide Web (5)
The World Wide Web (6)
Take Care of Your Computer
 1.  This one isn’t hard to understand: keep your drinks
away, and don’t eat directly over the computer. Liquids
and electronics never mix, and crumbs under the keys
are an open invitation for insects.
 2.  Protect your computer during lightning storms by
installing surge protectors. Surge protector strips
prevent your electronic appliances from blowing out
when lightning strikes.
 3.  The computer keyboard is the 3rd dirtiest surface in
the household. Clean beneath the keys using a can of
compressed air, and spray a cloth with disinfectant to
wipe down the key surfaces. Never spray disinfectant
directly onto the keyboard as the liquid could damage
the components beneath the keys.
Take Care of Your Computer
 4.  Don’t put your laptop on the floor. The fans that suck in air to
cool down internal components can also suck up dirt, clogging up
the inside and reducing performance. Make sure the fan vents
underneath your laptop are kept clear. This prevents damage by
overheating.
 5.  If you’re using a lithium-ion battery in your laptop (most new
laptops have them), don’t let it completely run out, as this
shortens its lifespan. Recharge the battery before it is depleted ¾
of the way.
 6.  Keep magnets away from your computers. The hard drives of
older-model computers can be wiped by running magnets over
them. For new-style computers with magnets there is a risk of
damaging your hard drive.
 7.  When plugging external devices (such as USBs and cables) into
your computer, never force them in. Always plug them in gently to
prevent damage to the delicate internal components.
Take Care of Your Computer
 8.  Regularly scan your computer with certified, up-to-
date anti-virus/ anti-spyware software. The last thing
you want is a virus corrupting your operating systems,
and hackers stealing your information.
 9.  Defrag your hard drive from time to time to improve
performance. Make sure it is done at a time when you
won’t need your computer, as it can take up to several
hours.
 10.  Backup your data on a regular basis, should
something happen to your computer. There is nothing
more frustrating than losing information, and having to
replace it all over again.
Introduction to Internet safety
 There's almost no limit to what you can do online. The
Internet makes it possible to access information quickly,
communicate around the world, and much more.
Unfortunately, the Internet is also home to certain
risks, such as malware, spam, and phishing. If you want
to stay safe online, you'll need to understand these risks
and learn how to avoid them.
Common online threats and how
to avoid them
Adopting a safer mindset
 Computers can often give us a false sense of security. After
all, no one can physically harm you through a computer
screen. But to stay safe online, you'll want to take a more
cautious approach. Here's one way to think about it: Treat
the Internet as you would a shopping mall.

 Most people don't consider a mall to be an especially


dangerous place. You can go there to shop and meet up
with friends. But there are also small things you may do to
stay safe, even if you don't think about them very often.
For example, you probably wouldn't leave your car
unlocked or give your credit card number to a stranger.

 Apply this same mindset whenever you're online. You


shouldn't be afraid to use the Internet, but remember that
it comes with many of the same risks you'd face in the real
world. Throughout this tutorial, we'll show you how to
prepare for these risks so you can be online without putting
yourself in danger.
Exercises
 Get a piece of paper and write down five (5) of the
most annoying things you have seen when you were in
an internet gaming shop. It can be about anything that
is really obvious in the surroundings. Gather into groups
(2 members per group) and discuss the things that you
listed. How common are the things that you listed?
 Suppose that your group in this activity owned your own
shop, what are the rules that you would want to impose
and why? Are there any special rules that you would
want to impose?

You might also like