Transcript Chapter 2

Chapter Two:
Internet Fundamentals:
Operations, Management,
the Web, and Wireless
By: Laura Marshall, Mary Mauro,
and Doug Moore
“The Internet IS for everyone- but it
won't be unless WE make it so."



Quote from Vinton Cerf, co-founder of the
Internet.
Believes the Internet is a “global megaphone for
all voices”
Cerf identifies such barriers as:
• affordability, restricted access, keeping up with
demands, accessibility, legal restrictions, privacy and
confidentiality, and irresponsible uses.

Chapter 2: These barriers exist for reasonsgenerate revenues, over crowding, promotion
effectiveness, etc.
How Web Servers Work

The Main Components
-Internet – a gigantic collection of millions of computers that allows other
computers to network together and communicate. Computers are linked to the internet
through ISP’s (internet service providers)
- Clients and Servers - each computer on the internet is either 1 of 2 things: a
client or a server. Servers are machines that provide services to other machines. In turn,
those other machines that request service are clients.
- IP Addresses - to keep all the machines straight, they are all assigned a specific
unique IP (internet protocol) address. IP addresses are uniquely assigned per session – this
way ISP’s can have 1 IP address per modem, not per customer.
- Domain Names – a human-worded address (i.e. www.blogger.com) that is easier
to remember than an IP address (i.e. 168.190.1.1) They are broken down into three parts:
-The host name (“www”), the Domain Name (“blogger”), and the top level domain
name (“.com”)
- Name Servers – a set of servers called Domain Name Servers (DNS) are simple
databases that map names to IP addresses and are distributed all over the internet
- Ports – any service machine make its services available using numbered ports
- Protocols – the pre-defined way that someone who wants to use the service talks
to the server.
-
Putting it All Together – The browser breaks the URL into three parts (host, domain,
and upper domain), then communicates with a name server to translate the domain
name into an IP address, then forms a connection to the web server at an IP address on
a specific port. Following HTTP protocol, the browser sends a GET request to the server,
which in turn sends the HTML text from the server to the browser, in which the browser
finally reads the HTML tags and formats the page onto your screen.
“The Incredible Hidden Wireless
Connection”





There are many drawbacks to wireless connections.
-privacy
-security
Un-permitted people can access other people’s wireless connections
through certain access points.
-Fear of identity theft
-Credit Card Information, etc.
Even if an administer thinks he is secured and regulated, people can still
get connected and steal information through these hidden connections,
known as access points.
Also, wireless connections are linked through a chip that connects to a
GPS system that find any locations of people connected through a wireless
connection.
The use of wireless connections is a huge problem for many companies.
Many companies are afraid of using this new technology because of the
detrimental problems that could occur within their company, such as
stealing highly confidential information.