INTERNET
Lesson 1.1: Networking Fundamentals
Objectives:
1. Define network.
2. Determine some Network Standards.
3. Identify different types of network.
What is a Network?
Two or more computers connected together to share resources and information is called
Network.
“Living online” refers to the process of being able to connect to the Internet and find
information whenever it is needed.
Computers connected to network can be any type of computer.
– Each computer could be configured with different operating system.
No restrictions other than having network software understand rules and language needed to recognize
computer type and operating system.
Where the Personal Computer Fits
PC most commonly used tool to connect to network
– Microprocessor chip is the “brain” of PC.
– Communicates with other components of PC via internal connecting device called “bus”.
– To communicate with external devices, PC needs interface card.
To connect PC to network, need interface card for type of network, suitable cable, and appropriate
software.
Networking Standards
1. When two or more computers interconnected to communicate and share resources, you have a
network.
2. Protocols are rules governing that we need to follow in Networking. Example: type of cables,
interface cards, and electrical signal format.
3. Also govern how information flows between computers on network called transport protocols:
– indicates how computer needs to send information over network.
– how receiving computer checks that information was received correctly.
– how sending computer must address information so it goes to correct destination
computer.
4. Application level protocols determine how program on one computer communicates with
program on another computer.
Types of Network
Client-Server Network
Peer-to-peer Network
LAN (Local Area Network)
WAN (Wide Area Network)
Client - Server Networks
Central Server computer as all files stored here.
Provides better performance and security as server controls (who can access, what resources
and when to send).
Server can be in any type of computer with server software installed, and users clearly identified
with access rights.
Client computer can be in any type of computer with network card and appropriate software to
connect to server.
Typical on large networks where one computer (network server) dedicated to controlling
network traffic and managing resources.
Peer-to-Peer Networks
It is known as PC to PC Network.
Called peer-to-peer because all computers have equal authority.
Ideal for home and small office networks.
Inexpensive and easy to put together.
LAN and WAN
Difference lies in who is responsible for cabling.
– LAN network stays within a building.
– WAN if network crosses public street and uses publicly-supplied cabling for part of
network.
When computer or LAN connected to another computer or LAN in another city or country, public
portion of WAN represented schematically by “cloud”.
Lesson 1.2: Networking Fundamentals
Objectives:
1. Identify some requirements in order to connect to a network.
2. Enumerate the advantages and disadvantages of being connected to a network.
Requirements in connecting to a Network?
1. Connections/Cabling Options
a) Coaxial CABLE Wire with center wire surrounded with insulation and then grounded cover of
braided wire.
b) Fiber Optics Made up of bundled glass or plastic fibers (threads) to transmit data.
c) Broadband Single wire that can handle multiple paths or channels.
d) Wireless Work with radio frequencies for data transmission.
e) Infrared Wireless option works with infrared light waves to transmit data.
2. The Network Interface Card (NIC)
To connect to network, PC must have network interface card (NIC)
Each NIC has unique number or address and connector appropriate for type of cabling chosen.
Come in variety of styles and models appropriate for computer type being connected to
network.
3. The Hub
Connects all Personal Computers together to form a network:
– Cable from NIC in each PC connects to port on hub.
– Cable from hub required to connect to network
Relatively inexpensive to purchase and install
Main disadvantage of hub is all users connected to hub share equal maximum transfer speed.
The Switch
Works similar to hub, each user connected to switch has access to full bandwidth.
Can also be used to join network segments.
Network Segments
If network has two or more network interface cards, each card considered a segment.
Segments allow network traffic to flow faster, depending on which devices are used to manage
amount of requests at network.
The Bridge
Connects network segments to handle network requests.
Do not analyze or re-route messages which makes receiving information faster
Will not re-route or re-transmit information if anything is wrong with connection at either end
until first transmission received completely.
The Router
Works similar to bridges except examines destination address of information and pass it on
appropriate segments only.
Bridges may be faster than routers but will not check information coming in.
When installing wireless router to network, be sure to set up encryption security options to
prevent unauthorized access from external sources using connection.
The Firewall
Can be physical device or specialized software installed to prevent any unauthorized external
access into any network connected to Internet.
Designed to check any messages that travel through network and ensure it matches specified
security requirements set up by company.
Advantages of Networking
The Advantages or Benefits of Networking
Benefits of networking fall into two main categories:
1. Communication
2. Sharing of Resources:
a. Devices
b. Information
Note: Networking does not make individual workstations faster or more powerful!
1. Communication
To send information generated on stand-alone PC requires manual process whereas users on
network send information electronically.
Messages can be stored on network and are not lost if recipient isn’t available when messages
sent or received
Many communication software allows users to instantly message someone else without using
e-mail
– “Real time interaction”
– Multiple users can participate in same conversation
– Some limitations but can be minor issues in exchange for ability to communicate with
each other in real time.
2. Sharing Resources
A. Sharing Devices
Some devices can be expensive to set up on every PC and networking allows devices to be
shared.
Can be cost savings for capital expenditures as well as productivity time for technical support or
maintenance.
Connecting devices shared by multiple users via network allows Network Administrator to perform
updates or troubleshoot problems from server location.
Sharing Information
In network environment, files or folders on any disk can be set up to be shared.
Whenever group of people want to share information, referred to as workgroup.
– Group of users who share business documents transfer or save files to common
network.
– Common network becomes centralized server wherein server has control over which
files are accessed and which users can use those files.
Extremely helpful to network administrator for setting up rights or performing maintenance for
workgroups.
Using Dedicated Servers
Network
– Control network traffic and security
– May perform same tasks and contain same information as file or database server
File
– High speed, high capacity hard drive, usually to handle back-up needs
Web
– Stores information in web format and information accessed with browser for company
intranets
Mail
– Manages high volume of internal and external e-mail
Database
– Generally used in complex database applications where many users need to access data
at same time.
Disadvantages of Networking
The Disadvantages of Networking
1. Dependency
2. Expensive
3. Security Risk
4. Loss of Autonomy or Privacy
5. Viruses
Dependency
Big disadvantage in that organization’s activities dependent on network:
If network fails, users lose access to information and ability to communicate
electronically.
In some instances can work from local drive, but if company’s information stored and
shared from server, cost of downtime may be more expensive in long term.
Expensive
For installation and maintenance
If network complex with many users, additional need and expense to employ network
administrator
Need “disaster and recovery” plan, not just for theft or security breach, but also power outages
or potential hardware failure
Setting up or upgrading a network server should always be discussed with network
administrator or consultant who specializes in networks prior to making any decisions
Security Risk
Every person who logs into server has valid login id and password, and set up according to
company’s standards.
When setting up new user, ensure name and information about user entered correctly.
Audit each user to ensure access rights to programs and files are same.
Requests received for access rights must have signature from corresponding manager.
Delete users who no longer work for company.
Do not ever give out passwords.
Staff who work with network administrator should have own login id and password set up
Firewall set up for Internet connection that has been set up to check user id when sending or
receiving messages
If access authorized for users outside network, ensure firewall checks these user ids when
request received to access network from remote location.
Restrict any users from being able to delete files from any folder on any network drives.
Antivirus program installed on server is current and has latest protection files.
Perform maintenance checks periodically as well to see what activities may have occurred
Encourage users to have latest updates of Windows on local computers.
Loss of Autonomy or Privacy
Privacy may be concern for confidential material
“Private” drive set up on network for personal or confidential files but network administrator can
still see these files.
If shared computer, even though they log in with their own id, they can still see files on local
area network.
Note: General business rules dictate that anything you work on a company computer belongs to the
company, even though you may work on it on your own time.
Viruses
Vulnerable to virus attacks.
Some viruses, called worm viruses, specifically target servers.
New viruses being created every day and it becomes more prudent to read screen carefully
before automatically opening message or clicking highlighted button on screen.
All antivirus programs provide a feature to automatically detect in “real time”.
Remember to run scan of computer on frequent basis and check for updates.
Lesson 2: Looking at the Internet
Objectives:
1. Define Internet.
2. What an Internet Service Provider (ISP) is?
a. The requirements in order to connect to the internet.
b. The services provided by the ISP.
3. Recognize Intranet and Extranet.
Introducing the Telephone Network
The Telephone Network
Two requirements to communicate successfully:
– need to know number of other person
– must speak same language
Each country has organization responsible for telephone network in that country and ensure
network conforms to international telephony protocols or standards
Network is multifunction and used for transmitting voice, facsimile and data information over
same network
The Computer Network (Internet)
Same principles for telephones apply to Internet.
Each country has network that conforms to international standards and form interconnected
network or Internet.
Any computer connected to Internet can “talk” to any other computer connected to Internet if:
– know number (internet account) of other computer
– computers speak same language
Set of protocols used by Internet
called TCP/IP.
Multifunctional
Computers connected to Internet
typically:
– servers that provide services
– clients who use services
Servers connected based on service
type
– Computer must use same protocol
– Client requirements handled by
browser
Referred to as Super Information
Highway or Super Network
Servers actually connect to Network Access Points that provide services to “get” items.
Backbone of Internet.
Looking at Internet Service Providers (ISP)
Represent method of getting relatively inexpensive access to Internet.
Will obtain high-speed, high capacity (bandwidth) direct connection to network access point
that connects to Internet.
Resells portion of that capacity to companies or individual users.
– User’s connection to the Internet paid for on set basis.
Maintenance of connection lines
– Ensure lines work whenever users log in
– Inform all users about anticipated downtimes
Maintenance of hardware or software used at ISP’s site
– Includes modems to connect to ISP’s server
– Updates for technology advances or software
Customer support
Technical support
Protection against potential viruses or unauthorized access requests
Maintenance of connection lines
– Ensure lines work whenever users log in
– Inform all users about anticipated downtimes
Maintenance of hardware or software used at ISP’s site
– Includes modems to connect to ISP’s server
– Updates for technology advances or software
Customer support
Technical support
Protection against potential viruses or unauthorized access requests
Hardware and software considerations:
– What extra items will you need to purchase?
– Will you need to go with a wireless option?
– What extra services are you willing to pay for?
Costs
– How much is the service and what does it include?
– Do you need all the services and is there a variety of packages?
Choosing the ISP
– What about the reputation of the ISP?
– Can you rely on them for good and constant service?
– Is customer service more valuable than a low fee?
– Is ISP local or do you need to call a toll free number?
– How fast are the connections in your area?
Services Provided by the ISP
1. Telephone Access (Dial-up access)
When set up account with ISP, get telephone number to dial to connect to ISP
Need modem to convert message from sound to computer signal before it goes on the Internet
Software to set up access included in Windows, or may be provided by ISP for installation
Considered low bandwidth
Connection can be very cost effective if:
– not sure how much time may spend on Internet
– only want to send or receive e-mail
2. TV Cable Access
Process same as telephone access wherein cable modem needed to convert computer message
Connected all the time to Internet
Much faster than dial-up access but also more expensive
Very popular option for home users as usually packaged with television cable services and very
fast speeds
3. Using Online Services
Have their own networks with access points in most major cities
Provide full range of services on their networks including electronic mail
Most companies also have gateway between their networks and Internet so users access all
their
services as well as Internet
Relatively inexpensive
Requires modem to connect
When set up account, necessary
software provided
Very popular as sense of community
quickly established once signed up
4. Digital Connections
Message travels in computer signal form via cable modem
Dedicated access where each user has own line connection
T1 digital line type very fast in comparison but generally much more expensive
Recognizing Intranets and Extranets
Intranet
Private local area network in company that uses same set of network protocols as Internet
Intranet connected to Internet so employees can access resources on Internet and communicate
via electronic mail with external contacts
Danger that confidential information on intranet can be accessed by external people so firewall
then placed between intranet and Internet
Extranet
Uses Internet technology to allow company to share information with another company or
organization for purposes of e-commerce
Higher risk for unauthorized access
Lesson 3: Getting Started
Objectives:
1. Familiarize with basic terminologies: 2. Recognize Web Page Elements
• What the World Wide Web is
• web browser
• Web site
• Etc
Understanding Basic Terminology
Looking at the Information on the Internet
Two groups of computers:
– Provide service (servers)
– Make use of services (users or clients)
Many types of services available
Understanding the World Wide Web
World Wide Web is collection of all web sites hosted by all web servers connected to Internet
Web server provides service of hosting or storing company’s or person’s web site and typically
hosts many web sites.
Web browser is a software or program used to open the Web and different web sites.
Web site is collection of pages containing information. Must use hypertext transfer protocol
(HTTP) to communicate with other computers.
“Hypertext” refers to technique of accessing web pages using hyperlinks.
Web pages popular due to display although no formatting saved with these pages.
– Browser has to format page before it is displayed on screen.
– Formatting instructions included in web page and written in language called hypertext
markup language (HTML).
Recognizing Web Page Elements
URL Box Uniform Resource Locator - identifies where to find information, or
enter text to display list of matching web sites.
Field Box Enter information on form sent to web server for processing.
Banner Ad Advertising on web page.
Button Interactive graphic that activates action.
Picture Either static, animated, or hyperlink to other web pages, sites, or other
action.
Status Bar Tells you what software is busy doing or which web page or site is
displayed.
Hyperlink Text or a graphic with URL associated.
Lesson 4: Using Internet Explorer Browser
Objectives:
1. Gain knowledge on how to Start Internet Explorer Browser and
Open the Yahoo Web Page.
To Start Internet Explorer Browser
1st Strategy- Using START button
1. Click on Start Button,
2. Choose All Programs,
3. Click on Internet Explorer
2nd Strategy – Using Desktop
1. Double-click on icon.
rd
3 Strategy – Using Quick Launch Toolbar
1. Click on icon.
Home Page
After starting the web browser, the first page that will appear is called the Home Page (MSN Web Page).
To change with other Home Page:
Click Tools
Internet Options
Type other website as new Home Page.
Click on OK button.
To open the Yahoo Web Page
1. On the URL Box or Web Site Address Box just type [Link]
2. Then click the Go button that will activate action to go to the yahoo web site.
3. Wait until such time that the Yahoo Web Page appears.
Lesson 5 & 6: Surfing/ Searching for Information and Opening Other Web Sites
Objectives:
1. Define What is “Internet Surfing”.
2. Search information using Google AND Yahoo search engine.
“Surfing” the Internet
“Finding information” in the internet. It really involves the process of finding URL for site that
contains information or services required.
Lesson 9: Sending E-mail
Objectives:
1. Students will perform to send email on Yahoo.
What is E-Mail?
E-mail most popular means of Electronic Mailing which communicating from one computer to
another computer.
Follows same process as for postal mail
– Need to have name and address of recipient in order to have post office deliver.
Ways of communicating available:
– Instant messaging occurs on computers where feature included with e-mail program or
part of chat program where multiple conversations occur.
– Text messaging generally refers to the process of sending message but only text shown
at receiver’s end.
What is Electronic Mail?
Speed Can send message to someone without waiting for
reply. Can also send (or receive) messages to
multiple people.
Paper Trail Create folders to file or store messages, giving
history and storage of older messages.
Sharing Information Attach file to message to send to others.
Easy Access People outside office (or home) can continue to
send or receive messages from remote locations.
Collaborating with Others Can set up message to be sent to other people at
same time as recipient.
Cost Savings Sending e-mail is relatively low in comparison to
long distance, courier, or physical visits.